Export 3 results:
Author Title Type [ Year
] Filters: Author is Ahmed Shah and Keyword is cybersecurity [Clear All Filters]
2017. Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams. Technology Innovation Management Review, 7(4): 25-31. http://doi.org/10.22215/timreview/1068
2016. Intrusion Learning: An Overview of an Emergent Discipline. Technology Innovation Management Review, 6(2): 15-20. http://doi.org/10.22215/timreview/964
2016. License Compliance in Open Source Cybersecurity Projects. Technology Innovation Management Review, 6(2): 28-35. http://doi.org/10.22215/timreview/966