Export 2 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is S and Author is Ahmed Shah [Clear All Filters]
Combining Exploratory Analysis and Automated Analysis for Anomaly Detection in Real-Time Data Streams. Technology Innovation Management Review, 7(4): 25-31. http://doi.org/10.22215/timreview/1068
2017. Download this article as a PDF (621.85 KB)License Compliance in Open Source Cybersecurity Projects. Technology Innovation Management Review, 6(2): 28-35. http://doi.org/10.22215/timreview/966
2016. Shah_et_al_TIMReview_February2016.pdf (498.76 KB)