Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Author
Title
Subject
Issue Date
Material Type
Language
Access Rights
Help
OAR@UM Help
FAQs
OAR@UM Policies
Submission Forms
Sign on to:
My OAR@UM
OAR@UM
Browsing by Subject Computer security
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 30 to 49 of 73
< previous
next >
Issue Date
Title
Author(s)
2022
The general data protection regulation 3 years after implementation : a comparison between local government administration in Poland and the republic of Lithuania
Lisiak-Felicka, Dominika
;
Szmit, Maciej
;
Vaičiūnienė, Jolanta
2023
The impact of Android UI attacks on malware forensic footprints
Bugeja, Manwel (2023)
2022
Implications of Industry 4.0 for security in contemporary organizations : perspective of information strategies
Zaskórski, Piotr
;
Woźniak, Jacek
2014
Improving the effectiveness of incremental mutation testing
Bajada, Luke (2014)
2015
Information systems security and audit firms
Spiteri, Cristian
2022
The integration of digital banking with traditional banking values
Lyu, Qiushi (2022)
2006
Investigating the use of Bi-words for learning SPAM
Bartolo, Mark (2006)
2017
An investigation into the perception of security for mobile devices
Giacchino, Kurt
2021
The legal and security aspects of ICT and industry 4.0 importance for financial industry 4.0 development
Jakubczak, Weronika
;
Gołębiowska, Anna
;
Prokopowicz, Dariusz
2012
Legal aspects of distributed denial of service attacks
Schembri, Katia (2012)
2016
A machine learning based approach for intrusion prevention using honeypot interaction patterns as training data
Zammit, Daniel
2023
Maintaining workstations’ operating systems within manufacturer’s support window : an organisational impact analysis
Attard, Gracie (2023)
2023
Maritime industry cybersecurity : a review of contemporary threats
Karaś, Adrianna
2017
Memory forensics of control flow integrity violations
Cilia, Rachel
2017
Memory forensics of insecure android inter-app communications
Vella, Mark Joseph
;
Cilia, Rachel
2020
Memory forensics of Qakbot
Borg, Steve (2020)
1997
Misuse of the information highway : criminal sanctions and some legal remedies
Mifsud Bonnici, Aron
2023
Navigating cyber insurance : a systematic review of strategies for risk mitigation and challenges for stakeholders
Vassallo, Rhys (2023)
2001
The notion of hacking in computer crime : a comparative analysis of computer crime legislation
Camilleri, Kevin A.
2014
Obfuscation-resistant, code-injection detection at the network level
Bellizzi, Jennifer (2014)