Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Author
Title
Subject
Issue Date
Material Type
Language
Access Rights
Help
OAR@UM Help
FAQs
OAR@UM Policies
Submission Forms
Sign on to:
My OAR@UM
OAR@UM
Browsing by Subject Computer security
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 38 to 57 of 73
< previous
next >
Issue Date
Title
Author(s)
2021
The legal and security aspects of ICT and industry 4.0 importance for financial industry 4.0 development
Jakubczak, Weronika
;
Gołębiowska, Anna
;
Prokopowicz, Dariusz
2012
Legal aspects of distributed denial of service attacks
Schembri, Katia (2012)
2016
A machine learning based approach for intrusion prevention using honeypot interaction patterns as training data
Zammit, Daniel
2023
Maintaining workstations’ operating systems within manufacturer’s support window : an organisational impact analysis
Attard, Gracie (2023)
2023
Maritime industry cybersecurity : a review of contemporary threats
Karaś, Adrianna
2017
Memory forensics of control flow integrity violations
Cilia, Rachel
2017
Memory forensics of insecure android inter-app communications
Vella, Mark Joseph
;
Cilia, Rachel
2020
Memory forensics of Qakbot
Borg, Steve (2020)
1997
Misuse of the information highway : criminal sanctions and some legal remedies
Mifsud Bonnici, Aron
2023
Navigating cyber insurance : a systematic review of strategies for risk mitigation and challenges for stakeholders
Vassallo, Rhys (2023)
2001
The notion of hacking in computer crime : a comparative analysis of computer crime legislation
Camilleri, Kevin A.
2014
Obfuscation-resistant, code-injection detection at the network level
Bellizzi, Jennifer (2014)
2009
Offline runtime verification with real-time properties : a case study
Colombo, Christian
;
Pace, Gordon J.
;
Abela, Patrick
2015
On verifying Hennessy-Milner logic with recursion at runtime
Francalanza, Adrian
;
Aceto, Luca
;
Ingólfsdóttir, Anna
2006
An ontology of security threats to web applications
Cachia, Ernest
;
Micallef, Mark
2021
Peer2Peer communication via Testnet systems of blockchain networks : a new playground for cyberterrorists?
Pfeiffer, Alexander
;
Wernbacher, Thomas
;
Bezzina, Stephen
2012
PolyLARVA : runtime verification with configurable resource-aware monitoring boundaries
Colombo, Christian
;
Francalanza, Adrian
;
Mizzi, Ruth
;
Pace, Gordon J.
2021
Pornographic content classification using deep-learning
Tabone, André
;
Camilleri, Kenneth P.
;
Bonnici, Alexandra
;
Cristina, Stefania
;
Farrugia, Reuben A.
;
Borg, Mark
2008
A practical approach to runtime verification of real-time properties for Java programs
Colombo, Christian
;
Pace, Gordon J.
;
Schneider, Gerardo
2018
Privacy and surveillance as a result of the digital world
Girlando, Alessandra