Search Results - "Vella, Mark"

Refine Results
  1. 1

    Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps by Bellizzi, Jennifer, Vella, Mark, Colombo, Christian, Hernandez-Castro, Julio

    Published in IEEE access (2022)
    “…The increasing dominance of Android smartphones for everyday communication and data processing makes long-term stealthy malware an even more dangerous threat…”
    Get full text
    Journal Article
  2. 2

    Peritoneal fluid biomarkers in the detection of colorectal anastomotic leaks: a systematic review by Wright, Emma C., Connolly, Patricia, Vella, Mark, Moug, Susan

    “…Purpose Anastomotic leak (AL) in colorectal surgery leads to significant morbidity, mortality and poorer oncological outcomes. Diagnosis of AL is frequently…”
    Get full text
    Journal Article
  3. 3

    VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics by Bellizzi, Jennifer, Losiouk, Eleonora, Conti, Mauro, Colombo, Christian, Vella, Mark

    Published in Journal of cybersecurity and privacy (01-09-2023)
    “…The ubiquity of Android smartphones makes them targets of sophisticated malware, which maintain long-term stealth, particularly by offloading attack steps to…”
    Get full text
    Journal Article
  4. 4

    PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone by Leguesse, Yonas, Colombo, Christian, Vella, Mark, Hernandez-Castro, Julio

    Published in IEEE access (2021)
    “…The security of financial apps on smartphones is threatened by a class of advanced and persistent malware that can bypass all existing security measures…”
    Get full text
    Journal Article
  5. 5

    Re: Risk factors for umbilical trocar site incisional hernia in laparoscopic cholecystectomy: a prospective 3-year follow-up study by Oliphant, Raymond, M.D, Drummond, Robert, M.R.C.S, Blackhall, Vivienne, M.R.C.S, Arneil, Clare, M.B.Ch.B, Jackson, Andrew, M.D, Vella, Mark, M.D, Renwick, Andrew, M.D

    Published in The American journal of surgery (01-02-2015)
    “…The study appears to come from a low-volume surgical unit (total of 276 laparoscopic cholecystectomies were performed over a 2-year period giving a mean number…”
    Get full text
    Journal Article
  6. 6

    Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks by Rosa-Bilbao, Jesús, Boubeta-Puig, Juan, Lagares-Galán, Jesús, Vella, Mark

    Published in Computer standards and interfaces (01-01-2025)
    “…Blockchain is a relatively recent technology that provides immutability, traceability and transparency of information, thus building trust in the digital…”
    Get full text
    Journal Article
  7. 7

    RV-TEE: secure cryptographic protocol execution based on runtime verification by Vella, Mark, Colombo, Christian, Abela, Robert, Špaček, Peter

    “…Analytical security of cryptographic protocols does not immediately translate to operational security due to incorrect implementation and attacks targeting the…”
    Get full text
    Journal Article
  8. 8

    Patient-reported impact of emergency laparotomy on employment and health status 1 year after surgery by McIlveen, Erin C., Edwards, Jennifer, Vella, Mark, McKinlay, Laura, Hancock, Claire, Quasim, Tara, Moug, Susan J.

    Published in Langenbeck's archives of surgery (26-09-2023)
    “…Background Whilst there has been significant improvement in mortality outcomes after emergency laparotomy, there is little information on longer term outcomes…”
    Get full text
    Journal Article
  9. 9
  10. 10
  11. 11
  12. 12

    Scotland's “Incentivised Laparoscopy Practice” programme: Engaging trainees with take-home laparoscopy simulation by Walker, Kenneth G., Shah, Adarsh P., Brennan, Paul M., Blackhall, Vivienne I., Nicol, Laura G., Yalamarthi, Satheesh, Vella, Mark, Cleland, Jennifer

    Published in The surgeon (Edinburgh) (01-06-2023)
    “…The transfer validity of portable laparoscopy simulation is well established. However, attempts to integrate take-home simulation into surgical training have…”
    Get full text
    Journal Article
  13. 13
  14. 14

    Early experience of a virtual journal club by Oliphant, Raymond, Blackhall, Vivienne, Moug, Susan, Finn, Patrick, Vella, Mark, Renwick, Andrew

    Published in The clinical teacher (01-12-2015)
    “…Summary Background Traditional journal club models based on didactic presentation sessions followed by group discussion have many limitations. To overcome some…”
    Get full text
    Journal Article
  15. 15
  16. 16
  17. 17

    Casting exploit analysis as a Weird Machine reconstruction problem by Abela, Robert, Vella, Mark

    Published 27-09-2021
    “…In: WorldCIS 2017, Infonomics Society, pp 47-54 (2017) Exploits constitute malware in the form of application inputs. They take advantage of security…”
    Get full text
    Journal Article
  18. 18
  19. 19
  20. 20

    SpotCheck: On-Device Anomaly Detection for Android by Vella, Mark, Colombo, Christian

    Published 25-02-2021
    “…SIN 2020: 13th International Conference on Security of Information and Networks, Merkez, Turkey, November 2020 In recent years the PC has been replaced by…”
    Get full text
    Journal Article