Issue Date | Title | Author(s) |
2022 | Anvil : a tool for visual debugging of rendering pipelines | Napoli, Kevin; Bugeja, Keith; Spina, Sandro; Magro, Mark; De Barro, Adrian |
2022 | A lightweight photon tracing method for visualising caustics | De Barro, Adrian; Bugeja, Keith; Spina, Sandro; Magro, Mark; Napoli, Kevin |
2014 | Scene segmentation and understanding for context-free point clouds | Spina, Sandro; Debattista, Kurt; Bugeja, Keith; Chalmers, Alan |
2017 | Telemetry-based optimisation for user training in racing simulators | Bugeja, Keith; Spina, Sandro; Buhagiar, Francois |
2010 | Danger theory and intrusion detection : possibilities and limitations of the analogy | Vella, Mark Joseph; Roper, Marc; Terzis, Sotirios |
2012 | Distress detection (poster abstract) | Vella, Mark Joseph; Terzis, Sotirios; Roper, Marc |
2015 | Script fuzzing with an attacker’s mind-set | Galea, John; Vella, Mark Joseph |
2015 | SUDUTA : script UAF detection using taint analysis | Galea, John; Vella, Mark Joseph |
2015 | WeXpose : towards on-line dynamic analysis of web attack payloads using just-in-time binary modification | Bellizzi, Jennifer; Vella, Mark Joseph |
2017 | Memory forensics of insecure android inter-app communications | Vella, Mark Joseph; Cilia, Rachel |
2012 | Distress detection | Vella, Mark Joseph |
2017 | AndroNeo : hardening Android malware sandboxes by predicting evasion heuristics | Leguesse, Yonas; Vella, Mark Joseph; Ellul, Joshua |
2018 | Volatile memory-centric investigation of SMS-hijacked phones : a Pushbullet case study | Vella, Mark Joseph; Rudramurthy, Vishwas |
2018 | Enhancing virtual machine introspection-based memory analysis with event triggers | Muscat, Matthew; Vella, Mark Joseph |
2021 | Casting exploit analysis as a Weird Machine reconstruction problem | Abela, Robert; Vella, Mark Joseph |
2022 | RV-TEE-based trustworthy secure shell deployment : an empirical evaluation | Curmi, Axel; Colombo, Christian; Vella, Mark Joseph |
2021 | EtherClue : digital investigation of attacks on Ethereum smart contracts | Aquilina, Simon Joseph; Casino, Fran; Vella, Mark Joseph; Ellul, Joshua; Patsakis, Constantinos |
2022 | Responding to targeted stealthy attacks on android using timely-captured memory dumps | Bellizzi, Jennifer; Vella, Mark Joseph; Colombo, Christian; Hernandez-Castro, Julio |
2022 | D-Cloud-Collector : admissible forensic evidence from mobile cloud storage | Vella, Mark Joseph; Colombo, Christian |
2016-11 | Improving the automatic runtime monitor generation process via pruning : a way forward | Chircop, Luke; Colombo, Christian; Micallef, Mark; Francalanza, Adrian; Pace, Gordon J. |
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 493