Browsing by Subject Malware (Computer software)

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 24  next >
Issue DateTitleAuthor(s)
2017AndroNeo : hardening Android malware sandboxes by predicting evasion heuristicsLeguesse, Yonas; Vella, Mark Joseph; Ellul, Joshua
2011Auditing intrusion threats targeting Windows-based workstationsMifsud, Francesco (2011)
2014Automated web site blacklistingCohen, Keith (2014)
2021Casting exploit analysis as a Weird Machine reconstruction problemAbela, Robert; Vella, Mark Joseph
2014-11Challenges faced when forcing malware execution down hidden pathsGatt, James; Vella, Mark Joseph; Micallef, Mark
2018Comparison of a shoulder surfing resilient graphical password scheme to text-based authenticationGrech, Nathaniel
2013Detecting malicious computer useSultana, Steven (2013)
2017Detection of fast flux botnetsAzzopardi, FrankPaul
2017Enhancing android malware sandboxes with anti-evasion code patchingLeguesse, Yonas
2021EtherClue : digital investigation of attacks on Ethereum smart contractsAquilina, Simon Joseph; Casino, Fran; Vella, Mark Joseph; Ellul, Joshua; Patsakis, Constantinos
2019Hooking Android apps for just-in-time memory dumpingBellizzi, Jennifer; Vella, Mark Joseph; Colombo, Christian
2023The impact of Android UI attacks on malware forensic footprintsBugeja, Manwel (2023)
2019Living off Android’s accessible landLeguesse, Yonas; Vella, Mark Joseph; Colombo, Christian
2020Memory forensics of QakbotBorg, Steve (2020)
2021PoPL : proof-of-presence and locality, or how to secure financial transactions on your smartphoneLeguesse, Yonas; Colombo, Christian; Vella, Mark Joseph; Hernandez-Castro, Julio
2017-07-23Ransomware taking digital data hostageKosciejew, Marc
2020Reducing the forensic footprint with Android accessibility attacksLeguesse, Yonas; Vella, Mark Joseph; Colombo, Christian; Hernandez-Castro, Julio
2019Responding to Ethereum web-application attacksSciberras, Franklyn Josef
2019Responding to PowerShell attacksSciberras, Neil
2023Responding to stealthy attacks on android using timely-captured memory dumpsBellizzi, Jennifer (2023)