Browsing by Subject Computer security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 37 to 56 of 69 < previous   next >
Issue DateTitleAuthor(s)
2016A machine learning based approach for intrusion prevention using honeypot interaction patterns as training dataZammit, Daniel
2023Maintaining workstations’ operating systems within manufacturer’s support window : an organisational impact analysisAttard, Gracie (2023)
2023Maritime industry cybersecurity : a review of contemporary threatsKaraś, Adrianna
2017Memory forensics of control flow integrity violationsCilia, Rachel
2017Memory forensics of insecure android inter-app communicationsVella, Mark Joseph; Cilia, Rachel
2020Memory forensics of QakbotBorg, Steve (2020)
1997Misuse of the information highway : criminal sanctions and some legal remediesMifsud Bonnici, Aron
2023Navigating cyber insurance : a systematic review of strategies for risk mitigation and challenges for stakeholdersVassallo, Rhys (2023)
2001The notion of hacking in computer crime : a comparative analysis of computer crime legislationCamilleri, Kevin A.
2014Obfuscation-resistant, code-injection detection at the network levelBellizzi, Jennifer (2014)
2009Offline runtime verification with real-time properties : a case studyColombo, Christian; Pace, Gordon J.; Abela, Patrick
2015On verifying Hennessy-Milner logic with recursion at runtimeFrancalanza, Adrian; Aceto, Luca; Ingólfsdóttir, Anna
2006An ontology of security threats to web applicationsCachia, Ernest; Micallef, Mark
2021Peer2Peer communication via Testnet systems of blockchain networks : a new playground for cyberterrorists?Pfeiffer, Alexander; Wernbacher, Thomas; Bezzina, Stephen
2012PolyLARVA : runtime verification with configurable resource-aware monitoring boundariesColombo, Christian; Francalanza, Adrian; Mizzi, Ruth; Pace, Gordon J.
2021Pornographic content classification using deep-learningTabone, André; Camilleri, Kenneth P.; Bonnici, Alexandra; Cristina, Stefania; Farrugia, Reuben A.; Borg, Mark
2008A practical approach to runtime verification of real-time properties for Java programsColombo, Christian; Pace, Gordon J.; Schneider, Gerardo
2018Privacy and surveillance as a result of the digital worldGirlando, Alessandra
2008Proceedings of FLACOS’08Pace, Gordon J.; Schneider, Gerardo
2009Resource-bounded runtime verification of Java programs with real-time propertiesColombo, Christian; Pace, Gordon J.; Schneider, Gerardo