Results: 5
Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams.
- Published in:
- Technology Innovation Management Review, 2017, v. 7, n. 4, p. 25, doi. 10.22215/timreview1068
- By:
- Publication type:
- Article
The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation.
- Published in:
- Technology Innovation Management Review, 2017, v. 7, n. 4, p. 5, doi. 10.22215/timreview1066
- By:
- Publication type:
- Article
Editorial: Cybersecurity.
- Published in:
- Technology Innovation Management Review, 2017, v. 7, n. 4, p. 3, doi. 10.22215/timreview1065
- By:
- Publication type:
- Article
A Cybersecurity Risk Assessment Framework that Integrates Value-Sensitive Design.
- Published in:
- Technology Innovation Management Review, 2017, v. 7, n. 4, p. 32, doi. 10.22215/timreview1069
- By:
- Publication type:
- Article
Big Data and Individual Privacy in the Age of the Internet of Things.
- Published in:
- Technology Innovation Management Review, 2017, v. 7, n. 4, p. 12, doi. 10.22215/timreview1067
- By:
- Publication type:
- Article