Return to Article Details Business Model Canvas and Competition to Understand Exploitation of Cybersecurity Project Results Download Download PDF