Browsing by Subject Computer security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 30 to 49 of 73 < previous   next >
Issue DateTitleAuthor(s)
2022The general data protection regulation 3 years after implementation : a comparison between local government administration in Poland and the republic of LithuaniaLisiak-Felicka, Dominika; Szmit, Maciej; Vaičiūnienė, Jolanta
2023The impact of Android UI attacks on malware forensic footprintsBugeja, Manwel (2023)
2022Implications of Industry 4.0 for security in contemporary organizations : perspective of information strategiesZaskórski, Piotr; Woźniak, Jacek
2014Improving the effectiveness of incremental mutation testingBajada, Luke (2014)
2015Information systems security and audit firmsSpiteri, Cristian
2022The integration of digital banking with traditional banking valuesLyu, Qiushi (2022)
2006Investigating the use of Bi-words for learning SPAMBartolo, Mark (2006)
2017An investigation into the perception of security for mobile devicesGiacchino, Kurt
2021The legal and security aspects of ICT and industry 4.0 importance for financial industry 4.0 developmentJakubczak, Weronika; Gołębiowska, Anna; Prokopowicz, Dariusz
2012Legal aspects of distributed denial of service attacksSchembri, Katia (2012)
2016A machine learning based approach for intrusion prevention using honeypot interaction patterns as training dataZammit, Daniel
2023Maintaining workstations’ operating systems within manufacturer’s support window : an organisational impact analysisAttard, Gracie (2023)
2023Maritime industry cybersecurity : a review of contemporary threatsKaraś, Adrianna
2017Memory forensics of control flow integrity violationsCilia, Rachel
2017Memory forensics of insecure android inter-app communicationsVella, Mark Joseph; Cilia, Rachel
2020Memory forensics of QakbotBorg, Steve (2020)
1997Misuse of the information highway : criminal sanctions and some legal remediesMifsud Bonnici, Aron
2023Navigating cyber insurance : a systematic review of strategies for risk mitigation and challenges for stakeholdersVassallo, Rhys (2023)
2001The notion of hacking in computer crime : a comparative analysis of computer crime legislationCamilleri, Kevin A.
2014Obfuscation-resistant, code-injection detection at the network levelBellizzi, Jennifer (2014)