Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Author
Title
Subject
Issue Date
Material Type
Language
Access Rights
Help
OAR@UM Help
FAQs
OAR@UM Policies
Submission Forms
Sign on to:
My OAR@UM
OAR@UM
Browsing by Subject Computer security
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 47 to 66 of 73
< previous
next >
Issue Date
Title
Author(s)
2023
Navigating cyber insurance : a systematic review of strategies for risk mitigation and challenges for stakeholders
Vassallo, Rhys (2023)
2001
The notion of hacking in computer crime : a comparative analysis of computer crime legislation
Camilleri, Kevin A.
2014
Obfuscation-resistant, code-injection detection at the network level
Bellizzi, Jennifer (2014)
2009
Offline runtime verification with real-time properties : a case study
Colombo, Christian
;
Pace, Gordon J.
;
Abela, Patrick
2015
On verifying Hennessy-Milner logic with recursion at runtime
Francalanza, Adrian
;
Aceto, Luca
;
Ingólfsdóttir, Anna
2006
An ontology of security threats to web applications
Cachia, Ernest
;
Micallef, Mark
2021
Peer2Peer communication via Testnet systems of blockchain networks : a new playground for cyberterrorists?
Pfeiffer, Alexander
;
Wernbacher, Thomas
;
Bezzina, Stephen
2012
PolyLARVA : runtime verification with configurable resource-aware monitoring boundaries
Colombo, Christian
;
Francalanza, Adrian
;
Mizzi, Ruth
;
Pace, Gordon J.
2021
Pornographic content classification using deep-learning
Tabone, André
;
Camilleri, Kenneth P.
;
Bonnici, Alexandra
;
Cristina, Stefania
;
Farrugia, Reuben A.
;
Borg, Mark
2008
A practical approach to runtime verification of real-time properties for Java programs
Colombo, Christian
;
Pace, Gordon J.
;
Schneider, Gerardo
2018
Privacy and surveillance as a result of the digital world
Girlando, Alessandra
2008
Proceedings of FLACOS’08
Pace, Gordon J.
;
Schneider, Gerardo
2009
Resource-bounded runtime verification of Java programs with real-time properties
Colombo, Christian
;
Pace, Gordon J.
;
Schneider, Gerardo
2024
A review of the consent management literature
Bonnici West, Christian
;
Grima, Simon
2014
Secure installation of un-trusted applications
-
2004
Secure P2P backup system
Psaila, Walter (2004)
2002
Security issues on the internet : a technical overview
Montebello, Matthew
;
Attard, Gillian
;
Attard, David
2004
A single sign-on authentication framework for security-critical Web applications
Schembri, Bernard (2004)
2022
Smart secure homes : a solution to the cyber security threats in our smart homes
Sinagra, Jayden (2022)
2019
Specifications of requirements to ensure proper implementation of security policies in cloud-based multi-tenant systems
Zahra, Rebecca
;
Vella, Joseph G.
;
Cachia, Ernest