Browsing by Subject Computer security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 47 to 66 of 73 < previous   next >
Issue DateTitleAuthor(s)
2023Navigating cyber insurance : a systematic review of strategies for risk mitigation and challenges for stakeholdersVassallo, Rhys (2023)
2001The notion of hacking in computer crime : a comparative analysis of computer crime legislationCamilleri, Kevin A.
2014Obfuscation-resistant, code-injection detection at the network levelBellizzi, Jennifer (2014)
2009Offline runtime verification with real-time properties : a case studyColombo, Christian; Pace, Gordon J.; Abela, Patrick
2015On verifying Hennessy-Milner logic with recursion at runtimeFrancalanza, Adrian; Aceto, Luca; Ingólfsdóttir, Anna
2006An ontology of security threats to web applicationsCachia, Ernest; Micallef, Mark
2021Peer2Peer communication via Testnet systems of blockchain networks : a new playground for cyberterrorists?Pfeiffer, Alexander; Wernbacher, Thomas; Bezzina, Stephen
2012PolyLARVA : runtime verification with configurable resource-aware monitoring boundariesColombo, Christian; Francalanza, Adrian; Mizzi, Ruth; Pace, Gordon J.
2021Pornographic content classification using deep-learningTabone, André; Camilleri, Kenneth P.; Bonnici, Alexandra; Cristina, Stefania; Farrugia, Reuben A.; Borg, Mark
2008A practical approach to runtime verification of real-time properties for Java programsColombo, Christian; Pace, Gordon J.; Schneider, Gerardo
2018Privacy and surveillance as a result of the digital worldGirlando, Alessandra
2008Proceedings of FLACOS’08Pace, Gordon J.; Schneider, Gerardo
2009Resource-bounded runtime verification of Java programs with real-time propertiesColombo, Christian; Pace, Gordon J.; Schneider, Gerardo
2024A review of the consent management literatureBonnici West, Christian; Grima, Simon
2014Secure installation of un-trusted applications-
2004Secure P2P backup systemPsaila, Walter (2004)
2002Security issues on the internet : a technical overviewMontebello, Matthew; Attard, Gillian; Attard, David
2004A single sign-on authentication framework for security-critical Web applicationsSchembri, Bernard (2004)
2022Smart secure homes : a solution to the cyber security threats in our smart homesSinagra, Jayden (2022)
2019Specifications of requirements to ensure proper implementation of security policies in cloud-based multi-tenant systemsZahra, Rebecca; Vella, Joseph G.; Cachia, Ernest