{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
Frincke, D., Craigen, D., Nadima, N., Low, A., & Thomas, M. 2015. TIM Lecture Series ? Three Collaborations Enabling Cybersecurity. Technology Innovation Management Review, 5(6): 45-48. http://doi.org/10.22215/timreview/906\par \par Low, A., & Muegge, S. 2013. Keystone Business Models for Network Security Processors. Technology Innovation Management Review, 3(7): 25-33. http://doi.org/10.22215/timreview/703\par \par }