Browsing by Subject Computer security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 36 to 55 of 71 < previous   next >
Issue DateTitleAuthor(s)
2021The legal and security aspects of ICT and industry 4.0 importance for financial industry 4.0 developmentJakubczak, Weronika; Gołębiowska, Anna; Prokopowicz, Dariusz
2012Legal aspects of distributed denial of service attacksSchembri, Katia (2012)
2016A machine learning based approach for intrusion prevention using honeypot interaction patterns as training dataZammit, Daniel
2023Maintaining workstations’ operating systems within manufacturer’s support window : an organisational impact analysisAttard, Gracie (2023)
2023Maritime industry cybersecurity : a review of contemporary threatsKaraś, Adrianna
2017Memory forensics of control flow integrity violationsCilia, Rachel
2017Memory forensics of insecure android inter-app communicationsVella, Mark Joseph; Cilia, Rachel
2020Memory forensics of QakbotBorg, Steve (2020)
1997Misuse of the information highway : criminal sanctions and some legal remediesMifsud Bonnici, Aron
2023Navigating cyber insurance : a systematic review of strategies for risk mitigation and challenges for stakeholdersVassallo, Rhys (2023)
2001The notion of hacking in computer crime : a comparative analysis of computer crime legislationCamilleri, Kevin A.
2014Obfuscation-resistant, code-injection detection at the network levelBellizzi, Jennifer (2014)
2009Offline runtime verification with real-time properties : a case studyColombo, Christian; Pace, Gordon J.; Abela, Patrick
2015On verifying Hennessy-Milner logic with recursion at runtimeFrancalanza, Adrian; Aceto, Luca; Ingólfsdóttir, Anna
2006An ontology of security threats to web applicationsCachia, Ernest; Micallef, Mark
2021Peer2Peer communication via Testnet systems of blockchain networks : a new playground for cyberterrorists?Pfeiffer, Alexander; Wernbacher, Thomas; Bezzina, Stephen
2012PolyLARVA : runtime verification with configurable resource-aware monitoring boundariesColombo, Christian; Francalanza, Adrian; Mizzi, Ruth; Pace, Gordon J.
2021Pornographic content classification using deep-learningTabone, André; Camilleri, Kenneth P.; Bonnici, Alexandra; Cristina, Stefania; Farrugia, Reuben A.; Borg, Mark
2008A practical approach to runtime verification of real-time properties for Java programsColombo, Christian; Pace, Gordon J.; Schneider, Gerardo
2018Privacy and surveillance as a result of the digital worldGirlando, Alessandra