Intrusion Learning: An Overview of an Emergent Discipline. Technology Innovation Management Review, 6(2): 15-20. http://doi.org/10.22215/timreview/964
2016. ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)
Examining the Modes Malware Suppliers Use to Provide Goods and Services. Technology Innovation Management Review, 6(2): 21-27. http://doi.org/10.22215/timreview/965
2016. ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)
Crimeware Marketplaces and Their Facilitating Technologies. Technology Innovation Management Review, 4(11): 28-33. http://doi.org/10.22215/timreview/847
2014. ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)
Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams. Technology Innovation Management Review, 7(4): 25-31. http://doi.org/10.22215/timreview/1068
2017. ![application/pdf PDF icon](/modules/file/icons/application-pdf.png)