Browsing by Subject Computer networks -- Security measures

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 14 to 33 of 37 < previous   next >
Issue DateTitleAuthor(s)
2013Information security in enterprises - ontology perspectiveSchiavone, Stephen; Garg, Lalit; Summers, Kelly
2015Information systems security and audit firmsSpiteri, Cristian
2016A legal analysis of cyberterrorism : threats and emerging legal responsesMulligan, Kristina
2012Legal aspects of distributed denial of service attacksSchembri, Katia (2012)
2001Legal aspects of Internet security and on-line privacyGhio, Antonio
2003A log analysis based intrusion detection system for the creation of a specification based intrusion prevention systemMuscat, Andre
2016A machine learning based approach for intrusion prevention using honeypot interaction patterns as training dataZammit, Daniel
2017Memory forensics of control flow integrity violationsCilia, Rachel
2007A multi-tier, multi-role security framework for e-commerce systemsCachia, Ernest; Micallef, Mark
2012-11Novel attack resilience by fusing events related to objectivesVella, Mark Joseph
2014Ontology of information security in enterprisesSchiavone, Stephen; Garg, Lalit; Summers, Kelly
2018Privacy and surveillance as a result of the digital worldGirlando, Alessandra
2008Process fact extraction from the webBuhagiar, Stephanie (2008)
2016Protecting online services : a proxy-based machine learning architectureGrech, Andrew
2015Script fuzzing with an attacker’s mind-setGalea, John; Vella, Mark Joseph
2014Secure installation of un-trusted applications-
2002Security issues on the internet : a technical overviewMontebello, Matthew; Attard, Gillian; Attard, David
2011Software security vulnerability analysis within a server environmentGatt, Maurizio (2011)
2012A study on the context-specific nature of actionable alert identificationTanti, Erica (2012)
2015SUDUTA : script UAF detection using taint analysisGalea, John; Vella, Mark Joseph