Bellizzi, J. & Vella, M. 2015, "WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification", SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015., pp. 5.
Buttigieg, J., Colombo, C. & Vella, M. 2015, "BYOD for Android - Just add Java", Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, ProceedingsSpringer, , pp. 315.
Galea, J. & Vella, M. 2015, "Script Fuzzing with an Attacker's Mind-Set", Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, ProceedingsSpringer, , pp. 317.
Galea, J. & Vella, M. 2015, "SUDUTA: Script UAF Detection Using Taint Analysis" in Security and Trust Management Springer, , pp. 136-151.
Vella, M., Terzis, S. & Roper, M. 2012, "Distress Detection", RAID, pp. 384.
Vella, M., Roper, M. & Terzis, S. 2010, "Danger Theory and Intrusion Detection: Possibilities and Limitations of the Analogy" in Artificial Immune Systems, eds. E. Hart, C. McEwan, J. Timmis & A. Hone, Springer Berlin / Heidelberg, , pp. 276-289.
Cachia, E. & Vella, M. 2007, "Using Weak Bisimulation for Enterprise Integration Architecture Formal Verification--I", Engineering of Computer-Based Systems, IEEE International Conference on the, vol. 0, pp. 63-70.