Danger theory and intrusion detection: Possibilities and limitations of the analogy M Vella, M Roper, S Terzis Artificial Immune Systems: 9th International Conference, ICARIS 2010 …, 2010 | 18 | 2010 |
EtherClue: Digital investigation of attacks on Ethereum smart contracts SJ Aquilina, F Casino, M Vella, J Ellul, C Patsakis Blockchain: Research and Applications 2 (4), 100028, 2021 | 17 | 2021 |
Reducing the forensic footprint with Android accessibility attacks Y Leguesse, M Vella, C Colombo, J Hernandez-Castro Security and Trust Management: 16th International Workshop, STM 2020 …, 2020 | 15 | 2020 |
Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study M Vella, V Rudramurthy 2018 Federated Conference on Computer Science and Information Systems …, 2018 | 12 | 2018 |
Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps J Bellizzi, M Vella, C Colombo, J Hernandez-Castro IEEE Access 10, 35172-35218, 2022 | 11 | 2022 |
RV-TEE-Based Trustworthy Secure Shell Deployment: An Empirical Evaluation. A Curmi, C Colombo, M Vella J. Object Technol. 21 (2), 2:1-15, 2022 | 10 | 2022 |
RV-TEE: secure cryptographic protocol execution based on runtime verification M Vella, C Colombo, R Abela, P Špaček Journal of Computer Virology and Hacking Techniques 17 (3), 229-248, 2021 | 10 | 2021 |
Androneo: Hardening android malware sandboxes by predicting evasion heuristics Y Leguesse, M Vella, J Ellul Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018 | 10 | 2018 |
Using thumbnail affinity for fragmentation point detection of JPEG files B Birmingham, RA Farrugia, M Vella IEEE EUROCON 2017-17th International Conference on Smart Technologies, 3-8, 2017 | 10 | 2017 |
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage M Vella, C Colombo ICT Systems Security and Privacy Protection: 37th IFIP TC 11 International …, 2022 | 6 | 2022 |
Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics (JIT-MF) for Android J Bellizzi, M Vella, C Colombo, J Hernandez-Castro arXiv preprint arXiv:2105.05510, 2021 | 6 | 2021 |
Wexpose: Towards on-line dynamic analysis of web attack payloads using just-in-time binary modification J Bellizzi, M Vella 2015 12th International Joint Conference on e-Business and …, 2015 | 6 | 2015 |
Secure Implementation of a Quantum-Future GAKE Protocol R Abela, C Colombo, P Malo, P Sıs, T Fabšič, O Gallo, V Hromada, ... Security and Trust Management: 17th International Workshop, STM 2021 …, 2021 | 5 | 2021 |
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation J Bellizzi, M Vella, C Colombo, J Hernandez-Castro Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event …, 2021 | 5 | 2021 |
PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone Y Leguesse, C Colombo, M Vella, J Hernandez-Castro IEEE Access 9, 168600-168612, 2021 | 4 | 2021 |
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. C Colombo, M Vella ICISSP, 765-774, 2020 | 4 | 2020 |
Requirements for a mobile knowledge management system in engineering design CL Spiteri, JC Borg, E Cachia, M Vella DS 42: Proceedings of ICED 2007, the 16th International Conference on …, 2007 | 4* | 2007 |
Enhancing Virtual Machine Introspection-Based Memory Analysis with Event Triggers M Muscat, M Vella 2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018 | 3 | 2018 |
SpotCheck: On-Device Anomaly Detection for Android M Vella, C Colombo 13th International Conference on Security of Information and Networks, 1-6, 2020 | 2 | 2020 |
SUDUTA: Script UAF Detection Using Taint Analysis J Galea, M Vella Security and Trust Management: 11th International Workshop, STM 2015, Vienna …, 2015 | 2 | 2015 |