Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Author
Title
Subject
Issue Date
Material Type
Language
Access Rights
Help
OAR@UM Help
FAQs
OAR@UM Policies
Submission Forms
Sign on to:
My OAR@UM
OAR@UM
Browsing by Subject Malware (Computer software)
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 1 to 20 of 25
next >
Issue Date
Title
Author(s)
2017
AndroNeo : hardening Android malware sandboxes by predicting evasion heuristics
Leguesse, Yonas
;
Vella, Mark Joseph
;
Ellul, Joshua
2011
Auditing intrusion threats targeting Windows-based workstations
Mifsud, Francesco (2011)
2014
Automated web site blacklisting
Cohen, Keith (2014)
2021
Casting exploit analysis as a Weird Machine reconstruction problem
Abela, Robert
;
Vella, Mark Joseph
2014-11
Challenges faced when forcing malware execution down hidden paths
Gatt, James
;
Vella, Mark Joseph
;
Micallef, Mark
2018
Comparison of a shoulder surfing resilient graphical password scheme to text-based authentication
Grech, Nathaniel
2013
Detecting malicious computer use
Sultana, Steven (2013)
2017
Detection of fast flux botnets
Azzopardi, FrankPaul
2017
Enhancing android malware sandboxes with anti-evasion code patching
Leguesse, Yonas
2021
EtherClue : digital investigation of attacks on Ethereum smart contracts
Aquilina, Simon Joseph
;
Casino, Fran
;
Vella, Mark Joseph
;
Ellul, Joshua
;
Patsakis, Constantinos
2019
Hooking Android apps for just-in-time memory dumping
Bellizzi, Jennifer
;
Vella, Mark Joseph
;
Colombo, Christian
2023
The impact of Android UI attacks on malware forensic footprints
Bugeja, Manwel (2023)
2019
Living off Android’s accessible land
Leguesse, Yonas
;
Vella, Mark Joseph
;
Colombo, Christian
2020
Memory forensics of Qakbot
Borg, Steve (2020)
2021
PoPL : proof-of-presence and locality, or how to secure financial transactions on your smartphone
Leguesse, Yonas
;
Colombo, Christian
;
Vella, Mark Joseph
;
Hernandez-Castro, Julio
2017-07-23
Ransomware taking digital data hostage
Kosciejew, Marc
2020
Reducing the forensic footprint with Android accessibility attacks
Leguesse, Yonas
;
Vella, Mark Joseph
;
Colombo, Christian
;
Hernandez-Castro, Julio
2019
Responding to Ethereum web-application attacks
Sciberras, Franklyn Josef
2019
Responding to PowerShell attacks
Sciberras, Neil
2023
Responding to stealthy attacks on android using timely-captured memory dumps
Bellizzi, Jennifer (2023)