Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams. Technology Innovation Management Review, 7(4): 25-31. http://doi.org/10.22215/timreview/1068
2017. Download this article as a PDF (621.85 KB)Intrusion Learning: An Overview of an Emergent Discipline. Technology Innovation Management Review, 6(2): 15-20. http://doi.org/10.22215/timreview/964
2016. Bailetti_et_al_TIMReview_February2016.pdf (316.83 KB)License Compliance in Open Source Cybersecurity Projects. Technology Innovation Management Review, 6(2): 28-35. http://doi.org/10.22215/timreview/966
2016. Shah_et_al_TIMReview_February2016.pdf (498.76 KB)Reflecting on 10 Years of the TIM Review. Technology Innovation Management Review, 7(7): 5-20. http://doi.org/10.22215/timreview/1087
2017. Download this article as a PDF (1.34 MB)