Export 4 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is vulnerabilities  [Clear All Filters]
2017
McPhee, C., & Weiss, M. 2017. Editorial: Cybersecurity (April 2017). Technology Innovation Management Review, 7(4): 3-4. http://doi.org/10.22215/timreview/1065
PDF icon Download this article as a PDF (194.73 KB)
2015
Miron, W. 2015. Q&A. Should the Internet Be Considered Critical Infrastructure?. Technology Innovation Management Review, 5(1): 37-40. http://doi.org/10.22215/timreview/865
PDF icon Download this article (301.82 KB)
Amin, M., & Tariq, Z. 2015. Securing the Car: How Intrusive Manufacturer-Supplier Approaches Can Reduce Cybersecurity Vulnerabilities. Technology Innovation Management Review, 5(1): 21-25. http://doi.org/10.22215/timreview/863
PDF icon Download this article (506.06 KB)
2013
Hughes, J., & Cybenko, G. 2013. Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity. Technology Innovation Management Review, 3(8): 15-24. http://doi.org/10.22215/timreview/712
PDF icon Download this article (878.14 KB)