Browsing by Subject Computer security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 26 to 45 of 73 < previous   next >
Issue DateTitleAuthor(s)
2016File carving for digital investigationBorg, Duncan
2022Financial cybercrimes in Poland : in the search of victimization factorsGarlicki, Jan; Mider, Daniel
2009-09FLACOS’09 Workshop proceedingsPace, Gordon J.; Schneider, Gerardo
2002FTP security extensionsFarrugia, James P. (2002)
2022The general data protection regulation 3 years after implementation : a comparison between local government administration in Poland and the republic of LithuaniaLisiak-Felicka, Dominika; Szmit, Maciej; Vaičiūnienė, Jolanta
2023The impact of Android UI attacks on malware forensic footprintsBugeja, Manwel (2023)
2022Implications of Industry 4.0 for security in contemporary organizations : perspective of information strategiesZaskórski, Piotr; Woźniak, Jacek
2014Improving the effectiveness of incremental mutation testingBajada, Luke (2014)
2015Information systems security and audit firmsSpiteri, Cristian
2022The integration of digital banking with traditional banking valuesLyu, Qiushi (2022)
2006Investigating the use of Bi-words for learning SPAMBartolo, Mark (2006)
2017An investigation into the perception of security for mobile devicesGiacchino, Kurt
2021The legal and security aspects of ICT and industry 4.0 importance for financial industry 4.0 developmentJakubczak, Weronika; Gołębiowska, Anna; Prokopowicz, Dariusz
2012Legal aspects of distributed denial of service attacksSchembri, Katia (2012)
2016A machine learning based approach for intrusion prevention using honeypot interaction patterns as training dataZammit, Daniel
2023Maintaining workstations’ operating systems within manufacturer’s support window : an organisational impact analysisAttard, Gracie (2023)
2023Maritime industry cybersecurity : a review of contemporary threatsKaraś, Adrianna
2017Memory forensics of control flow integrity violationsCilia, Rachel
2017Memory forensics of insecure android inter-app communicationsVella, Mark Joseph; Cilia, Rachel
2020Memory forensics of QakbotBorg, Steve (2020)