Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Author
Title
Subject
Issue Date
Material Type
Language
Access Rights
Help
OAR@UM Help
FAQs
OAR@UM Policies
Submission Forms
Sign on to:
My OAR@UM
OAR@UM
Browsing by Subject Computer security
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 16 to 35 of 71
< previous
next >
Issue Date
Title
Author(s)
2010
Danger theory and intrusion detection : possibilities and limitations of the analogy
Vella, Mark Joseph
;
Roper, Marc
;
Terzis, Sotirios
2013
Data protection in an ever-changing technological environment
Caruana, Claudio
2017
Detection of fast flux botnets
Azzopardi, FrankPaul
2012
Distress detection
Vella, Mark Joseph
2012
Distress detection (poster abstract)
Vella, Mark Joseph
;
Terzis, Sotirios
;
Roper, Marc
2008
Dynamic event-based runtime monitoring of real-time and contextual properties
Colombo, Christian
;
Pace, Gordon J.
;
Schneider, Gerardo
2018
Enhancing virtual machine introspection-based memory analysis with event triggers
Muscat, Matthew
;
Vella, Mark Joseph
2021
EtherClue : digital investigation of attacks on Ethereum smart contracts
Aquilina, Simon Joseph
;
Casino, Fran
;
Vella, Mark Joseph
;
Ellul, Joshua
;
Patsakis, Constantinos
2016
File carving for digital investigation
Borg, Duncan
2022
Financial cybercrimes in Poland : in the search of victimization factors
Garlicki, Jan
;
Mider, Daniel
2009-09
FLACOS’09 Workshop proceedings
Pace, Gordon J.
;
Schneider, Gerardo
2002
FTP security extensions
Farrugia, James P. (2002)
2022
The general data protection regulation 3 years after implementation : a comparison between local government administration in Poland and the republic of Lithuania
Lisiak-Felicka, Dominika
;
Szmit, Maciej
;
Vaičiūnienė, Jolanta
2023
The impact of Android UI attacks on malware forensic footprints
Bugeja, Manwel (2023)
2022
Implications of Industry 4.0 for security in contemporary organizations : perspective of information strategies
Zaskórski, Piotr
;
Woźniak, Jacek
2014
Improving the effectiveness of incremental mutation testing
Bajada, Luke (2014)
2015
Information systems security and audit firms
Spiteri, Cristian
2022
The integration of digital banking with traditional banking values
Lyu, Qiushi (2022)
2006
Investigating the use of Bi-words for learning SPAM
Bartolo, Mark (2006)
2017
An investigation into the perception of security for mobile devices
Giacchino, Kurt