Browsing by Subject Computer security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 16 to 35 of 71 < previous   next >
Issue DateTitleAuthor(s)
2010Danger theory and intrusion detection : possibilities and limitations of the analogyVella, Mark Joseph; Roper, Marc; Terzis, Sotirios
2013Data protection in an ever-changing technological environmentCaruana, Claudio
2017Detection of fast flux botnetsAzzopardi, FrankPaul
2012Distress detectionVella, Mark Joseph
2012Distress detection (poster abstract)Vella, Mark Joseph; Terzis, Sotirios; Roper, Marc
2008Dynamic event-based runtime monitoring of real-time and contextual propertiesColombo, Christian; Pace, Gordon J.; Schneider, Gerardo
2018Enhancing virtual machine introspection-based memory analysis with event triggersMuscat, Matthew; Vella, Mark Joseph
2021EtherClue : digital investigation of attacks on Ethereum smart contractsAquilina, Simon Joseph; Casino, Fran; Vella, Mark Joseph; Ellul, Joshua; Patsakis, Constantinos
2016File carving for digital investigationBorg, Duncan
2022Financial cybercrimes in Poland : in the search of victimization factorsGarlicki, Jan; Mider, Daniel
2009-09FLACOS’09 Workshop proceedingsPace, Gordon J.; Schneider, Gerardo
2002FTP security extensionsFarrugia, James P. (2002)
2022The general data protection regulation 3 years after implementation : a comparison between local government administration in Poland and the republic of LithuaniaLisiak-Felicka, Dominika; Szmit, Maciej; Vaičiūnienė, Jolanta
2023The impact of Android UI attacks on malware forensic footprintsBugeja, Manwel (2023)
2022Implications of Industry 4.0 for security in contemporary organizations : perspective of information strategiesZaskórski, Piotr; Woźniak, Jacek
2014Improving the effectiveness of incremental mutation testingBajada, Luke (2014)
2015Information systems security and audit firmsSpiteri, Cristian
2022The integration of digital banking with traditional banking valuesLyu, Qiushi (2022)
2006Investigating the use of Bi-words for learning SPAMBartolo, Mark (2006)
2017An investigation into the perception of security for mobile devicesGiacchino, Kurt