Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Author
Title
Subject
Issue Date
Material Type
Language
Access Rights
Help
OAR@UM Help
FAQs
OAR@UM Policies
Submission Forms
Sign on to:
My OAR@UM
OAR@UM
Browsing by Subject Computer networks -- Security measures
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 14 to 33 of 37
< previous
next >
Issue Date
Title
Author(s)
2013
Information security in enterprises - ontology perspective
Schiavone, Stephen
;
Garg, Lalit
;
Summers, Kelly
2015
Information systems security and audit firms
Spiteri, Cristian
2016
A legal analysis of cyberterrorism : threats and emerging legal responses
Mulligan, Kristina
2012
Legal aspects of distributed denial of service attacks
Schembri, Katia (2012)
2001
Legal aspects of Internet security and on-line privacy
Ghio, Antonio
2003
A log analysis based intrusion detection system for the creation of a specification based intrusion prevention system
Muscat, Andre
2016
A machine learning based approach for intrusion prevention using honeypot interaction patterns as training data
Zammit, Daniel
2017
Memory forensics of control flow integrity violations
Cilia, Rachel
2007
A multi-tier, multi-role security framework for e-commerce systems
Cachia, Ernest
;
Micallef, Mark
2012-11
Novel attack resilience by fusing events related to objectives
Vella, Mark Joseph
2014
Ontology of information security in enterprises
Schiavone, Stephen
;
Garg, Lalit
;
Summers, Kelly
2018
Privacy and surveillance as a result of the digital world
Girlando, Alessandra
2008
Process fact extraction from the web
Buhagiar, Stephanie (2008)
2016
Protecting online services : a proxy-based machine learning architecture
Grech, Andrew
2015
Script fuzzing with an attacker’s mind-set
Galea, John
;
Vella, Mark Joseph
2014
Secure installation of un-trusted applications
-
2002
Security issues on the internet : a technical overview
Montebello, Matthew
;
Attard, Gillian
;
Attard, David
2011
Software security vulnerability analysis within a server environment
Gatt, Maurizio (2011)
2012
A study on the context-specific nature of actionable alert identification
Tanti, Erica (2012)
2015
SUDUTA : script UAF detection using taint analysis
Galea, John
;
Vella, Mark Joseph