Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Author
Title
Subject
Issue Date
Material Type
Language
Access Rights
Help
OAR@UM Help
FAQs
OAR@UM Policies
Submission Forms
Sign on to:
My OAR@UM
OAR@UM
Browsing by Subject Computer security
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 26 to 45 of 73
< previous
next >
Issue Date
Title
Author(s)
2016
File carving for digital investigation
Borg, Duncan
2022
Financial cybercrimes in Poland : in the search of victimization factors
Garlicki, Jan
;
Mider, Daniel
2009-09
FLACOS’09 Workshop proceedings
Pace, Gordon J.
;
Schneider, Gerardo
2002
FTP security extensions
Farrugia, James P. (2002)
2022
The general data protection regulation 3 years after implementation : a comparison between local government administration in Poland and the republic of Lithuania
Lisiak-Felicka, Dominika
;
Szmit, Maciej
;
Vaičiūnienė, Jolanta
2023
The impact of Android UI attacks on malware forensic footprints
Bugeja, Manwel (2023)
2022
Implications of Industry 4.0 for security in contemporary organizations : perspective of information strategies
Zaskórski, Piotr
;
Woźniak, Jacek
2014
Improving the effectiveness of incremental mutation testing
Bajada, Luke (2014)
2015
Information systems security and audit firms
Spiteri, Cristian
2022
The integration of digital banking with traditional banking values
Lyu, Qiushi (2022)
2006
Investigating the use of Bi-words for learning SPAM
Bartolo, Mark (2006)
2017
An investigation into the perception of security for mobile devices
Giacchino, Kurt
2021
The legal and security aspects of ICT and industry 4.0 importance for financial industry 4.0 development
Jakubczak, Weronika
;
Gołębiowska, Anna
;
Prokopowicz, Dariusz
2012
Legal aspects of distributed denial of service attacks
Schembri, Katia (2012)
2016
A machine learning based approach for intrusion prevention using honeypot interaction patterns as training data
Zammit, Daniel
2023
Maintaining workstations’ operating systems within manufacturer’s support window : an organisational impact analysis
Attard, Gracie (2023)
2023
Maritime industry cybersecurity : a review of contemporary threats
Karaś, Adrianna
2017
Memory forensics of control flow integrity violations
Cilia, Rachel
2017
Memory forensics of insecure android inter-app communications
Vella, Mark Joseph
;
Cilia, Rachel
2020
Memory forensics of Qakbot
Borg, Steve (2020)