Found: 6
Select item for more details and to access through your institution.
TIM Lecture Series Three Collaborations Enabling Cybersecurity.
- Published in:
- 2015
- By:
- Publication type:
- Proceeding
Representing Botnet-Enabled Cyber-Attacks and Botnet Takedowns Using Club Theory.
- Published in:
- Technology Innovation Management Review, 2015, v. 5, n. 6, p. 35, doi. 10.22215/timreview905
- By:
- Publication type:
- Article
Secure by Design: Cybersecurity Extensions to Project Management Maturity Models for Critical Infrastructure Projects.
- Published in:
- Technology Innovation Management Review, 2015, v. 5, n. 6, p. 26, doi. 10.22215/timreview904
- By:
- Publication type:
- Article
Value Blueprint Approach to Cybersecurity in Networked Medical Devices.
- Published in:
- Technology Innovation Management Review, 2015, v. 5, n. 6, p. 17, doi. 10.22215/timreview903
- By:
- Publication type:
- Article
A Design Science Approach to Constructing Critical Infrastructure and Communicating Cybersecurity Risks.
- Published in:
- Technology Innovation Management Review, 2015, v. 5, n. 6, p. 6, doi. 10.22215/timreview902
- By:
- Publication type:
- Article
Editorial: Critical Infrastructures and Cybersecurity.
- Published in:
- Technology Innovation Management Review, 2015, v. 5, n. 6, p. 3, doi. 10.22215/timreview901
- By:
- Publication type:
- Article