Mark Vella
Mark Vella
Universita ta Malta
Dirección de correo verificada de - Página principal
Citado por
Citado por
Danger theory and intrusion detection: Possibilities and limitations of the analogy
M Vella, M Roper, S Terzis
Artificial Immune Systems: 9th International Conference, ICARIS 2010 …, 2010
EtherClue: Digital investigation of attacks on Ethereum smart contracts
SJ Aquilina, F Casino, M Vella, J Ellul, C Patsakis
Blockchain: Research and Applications 2 (4), 100028, 2021
Reducing the forensic footprint with Android accessibility attacks
Y Leguesse, M Vella, C Colombo, J Hernandez-Castro
Security and Trust Management: 16th International Workshop, STM 2020 …, 2020
Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study
M Vella, V Rudramurthy
2018 Federated Conference on Computer Science and Information Systems …, 2018
Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
IEEE Access 10, 35172-35218, 2022
RV-TEE-Based Trustworthy Secure Shell Deployment: An Empirical Evaluation.
A Curmi, C Colombo, M Vella
J. Object Technol. 21 (2), 2:1-15, 2022
Androneo: Hardening android malware sandboxes by predicting evasion heuristics
Y Leguesse, M Vella, J Ellul
Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018
Using thumbnail affinity for fragmentation point detection of JPEG files
B Birmingham, RA Farrugia, M Vella
IEEE EUROCON 2017-17th International Conference on Smart Technologies, 3-8, 2017
RV-TEE: secure cryptographic protocol execution based on runtime verification
M Vella, C Colombo, R Abela, P Špaček
Journal of Computer Virology and Hacking Techniques 17 (3), 229-248, 2021
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage
M Vella, C Colombo
ICT Systems Security and Privacy Protection: 37th IFIP TC 11 International …, 2022
Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics (JIT-MF) for Android
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
arXiv preprint arXiv:2105.05510, 2021
Wexpose: Towards on-line dynamic analysis of web attack payloads using just-in-time binary modification
J Bellizzi, M Vella
2015 12th International Joint Conference on e-Business and …, 2015
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation
J Bellizzi, M Vella, C Colombo, J Hernandez-Castro
Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event …, 2021
PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone
Y Leguesse, C Colombo, M Vella, J Hernandez-Castro
IEEE Access 9, 168600-168612, 2021
Secure Implementation of a Quantum-Future GAKE Protocol
R Abela, C Colombo, P Malo, P Sýs, T Fabšič, O Gallo, V Hromada, ...
Security and Trust Management: 17th International Workshop, STM 2021 …, 2021
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification.
C Colombo, M Vella
ICISSP, 765-774, 2020
Requirements for a mobile knowledge management system in engineering design
CL Spiteri, JC Borg, E Cachia, M Vella
DS 42: Proceedings of ICED 2007, the 16th International Conference on …, 2007
Enhancing Virtual Machine Introspection-Based Memory Analysis with Event Triggers
M Muscat, M Vella
2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018
SpotCheck: On-Device Anomaly Detection for Android
M Vella, C Colombo
13th International Conference on Security of Information and Networks, 1-6, 2020
SUDUTA: Script UAF Detection Using Taint Analysis
J Galea, M Vella
Security and Trust Management: 11th International Workshop, STM 2015, Vienna …, 2015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20