Browsing by Subject Computer networks -- Security measures

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 22 to 39 of 39 < previous 
Issue DateTitleAuthor(s)
2016A machine learning based approach for intrusion prevention using honeypot interaction patterns as training dataZammit, Daniel
2017Memory forensics of control flow integrity violationsCilia, Rachel
2007A multi-tier, multi-role security framework for e-commerce systemsCachia, Ernest; Micallef, Mark
2012-11Novel attack resilience by fusing events related to objectivesVella, Mark Joseph
2014Ontology of information security in enterprisesSchiavone, Stephen; Garg, Lalit; Summers, Kelly
2018Privacy and surveillance as a result of the digital worldGirlando, Alessandra
2008Process fact extraction from the webBuhagiar, Stephanie (2008)
2016Protecting online services : a proxy-based machine learning architectureGrech, Andrew
2015Script fuzzing with an attacker’s mind-setGalea, John; Vella, Mark Joseph
2014Secure installation of un-trusted applications-
2002Security issues on the internet : a technical overviewMontebello, Matthew; Attard, Gillian; Attard, David
2011Software security vulnerability analysis within a server environmentGatt, Maurizio (2011)
2012A study on the context-specific nature of actionable alert identificationTanti, Erica (2012)
2015SUDUTA : script UAF detection using taint analysisGalea, John; Vella, Mark Joseph
2013The use of smartphones for secure transactionsCilia, Joseph (2013)
2017Using thumbnail affinity for fragmentation point detection of JPEG filesBirmingham, Brandon; Farrugia, Reuben A.; Vella, Mark Joseph
2023VEDRANDO : a novel way to reveal stealthy attack steps on android through memory forensicsBellizzi, Jennifer; Losiouk, Eleonora; Conti, Mauro; Colombo, Christian; Vella, Mark
2000A virtual marketplace based on mobile agent technologyCalleja, Francis (2000)