Search Results - "Vella, Mark"
-
1
Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps
Published in IEEE access (2022)“…The increasing dominance of Android smartphones for everyday communication and data processing makes long-term stealthy malware an even more dangerous threat…”
Get full text
Journal Article -
2
Peritoneal fluid biomarkers in the detection of colorectal anastomotic leaks: a systematic review
Published in International journal of colorectal disease (01-07-2017)“…Purpose Anastomotic leak (AL) in colorectal surgery leads to significant morbidity, mortality and poorer oncological outcomes. Diagnosis of AL is frequently…”
Get full text
Journal Article -
3
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics
Published in Journal of cybersecurity and privacy (01-09-2023)“…The ubiquity of Android smartphones makes them targets of sophisticated malware, which maintain long-term stealth, particularly by offloading attack steps to…”
Get full text
Journal Article -
4
PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone
Published in IEEE access (2021)“…The security of financial apps on smartphones is threatened by a class of advanced and persistent malware that can bypass all existing security measures…”
Get full text
Journal Article -
5
Re: Risk factors for umbilical trocar site incisional hernia in laparoscopic cholecystectomy: a prospective 3-year follow-up study
Published in The American journal of surgery (01-02-2015)“…The study appears to come from a low-volume surgical unit (total of 276 laparoscopic cholecystectomies were performed over a 2-year period giving a mean number…”
Get full text
Journal Article -
6
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks
Published in Computer standards and interfaces (01-01-2025)“…Blockchain is a relatively recent technology that provides immutability, traceability and transparency of information, thus building trust in the digital…”
Get full text
Journal Article -
7
RV-TEE: secure cryptographic protocol execution based on runtime verification
Published in Journal of Computer Virology and Hacking Techniques (01-09-2021)“…Analytical security of cryptographic protocols does not immediately translate to operational security due to incorrect implementation and attacks targeting the…”
Get full text
Journal Article -
8
Patient-reported impact of emergency laparotomy on employment and health status 1 year after surgery
Published in Langenbeck's archives of surgery (26-09-2023)“…Background Whilst there has been significant improvement in mortality outcomes after emergency laparotomy, there is little information on longer term outcomes…”
Get full text
Journal Article -
9
Massive lower gastrointestinal bleeding secondary to haemorrhoids
Published in BMJ (Online) (11-05-2016)Get full text
Journal Article -
10
Runtime Verification for Trustworthy Computing
Published in Electronic proceedings in theoretical computer science (30-09-2023)Get full text
Journal Article -
11
-
12
Scotland's “Incentivised Laparoscopy Practice” programme: Engaging trainees with take-home laparoscopy simulation
Published in The surgeon (Edinburgh) (01-06-2023)“…The transfer validity of portable laparoscopy simulation is well established. However, attempts to integrate take-home simulation into surgical training have…”
Get full text
Journal Article -
13
Improving surgical training: Establishing a surgical anatomy programme in Scotland
Published in International journal of surgery (London, England) (01-12-2021)“…It is well recognized that a sound foundation in surgical anatomy is a cornerstone of safe surgical practice, yet many trainees struggle with the upskilling in…”
Get full text
Journal Article -
14
Early experience of a virtual journal club
Published in The clinical teacher (01-12-2015)“…Summary Background Traditional journal club models based on didactic presentation sessions followed by group discussion have many limitations. To overcome some…”
Get full text
Journal Article -
15
Analysis of lesion localisation at colonoscopy: outcomes from a multi-centre U.K. study
Published in Surgical endoscopy (01-07-2017)“…Background Colonoscopy is currently the gold standard for detection of colorectal lesions, but may be limited in anatomically localising lesions. This audit…”
Get full text
Journal Article -
16
Preparing junior doctors for their surgical rotation using simulation training
Published in International journal of surgery (London, England) (01-11-2014)Get full text
Journal Article -
17
Casting exploit analysis as a Weird Machine reconstruction problem
Published 27-09-2021“…In: WorldCIS 2017, Infonomics Society, pp 47-54 (2017) Exploits constitute malware in the form of application inputs. They take advantage of security…”
Get full text
Journal Article -
18
-
19
-
20
SpotCheck: On-Device Anomaly Detection for Android
Published 25-02-2021“…SIN 2020: 13th International Conference on Security of Information and Networks, Merkez, Turkey, November 2020 In recent years the PC has been replaced by…”
Get full text
Journal Article