Mark Vella
Orcid: 0000-0002-6483-9054
According to our database1,
Mark Vella
authored at least 30 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks.
Comput. Stand. Interfaces, 2025
2024
A Metric to Assess the Reliability of Crowd-sourced SUS Scores: A Case Study on the PoPLar Authentication Tool.
Proceedings of the 2024 European Symposium on Usable Security, 2024
2023
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics.
J. Cybersecur. Priv., July, 2023
Proceedings of the Third Workshop on Agents and Robots for reliable Engineered Autonomy, 2023
Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
2022
J. Object Technol., 2022
Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps.
IEEE Access, 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
2021
J. Comput. Virol. Hacking Tech., 2021
PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone.
IEEE Access, 2021
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the VORTEX 2021: Proceedings of the 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecution, 2021
2020
Proceedings of the Security and Trust Management - 16th International Workshop, 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
2018
Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018
2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the IEEE EUROCON 2017 -17th International Conference on Smart Technologies, 2017
2015
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification.
Proceedings of the SECRYPT 2015, 2015
2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
2010
Proceedings of the Artificial Immune Systems, 9th International Conference, 2010
2007
Using Weak Bisimulation for Enterprise Integration Architecture Formal Verification--I.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007