Export 4 results:
Author [ Title(Desc)] Type Year
Filters: Author is Mahmoud Gad  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Shah, A., Abualhaol, I., Gad, M., & Weiss, M. 2017. Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams. Technology Innovation Management Review, 7(4): 25-31. http://doi.org/10.22215/timreview/1068
PDF icon Download this article as a PDF (621.85 KB)
Gad, M. 2014. Crimeware Marketplaces and Their Facilitating Technologies. Technology Innovation Management Review, 4(11): 28-33. http://doi.org/10.22215/timreview/847
PDF icon Download this article (397.42 KB)
E
Bailetti, T., & Gad, M. 2016. Examining the Modes Malware Suppliers Use to Provide Goods and Services. Technology Innovation Management Review, 6(2): 21-27. http://doi.org/10.22215/timreview/965
PDF icon BailettiGad_TIMReview_February2016.pdf (501.18 KB)
I
Bailetti, T., Gad, M., & Shah, A. 2016. Intrusion Learning: An Overview of an Emergent Discipline. Technology Innovation Management Review, 6(2): 15-20. http://doi.org/10.22215/timreview/964
PDF icon Bailetti_et_al_TIMReview_February2016.pdf (316.83 KB)