Team for Research in
Ubiquitous Secure Technology

Conducting Cybersecurity Research Legally and Ethically
Aaron Burstein

Citation
Aaron Burstein. "Conducting Cybersecurity Research Legally and Ethically". Talk or presentation, 15, April, 2008; Accepted for presentation to the first USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '08) on April 15, 2008, San Francisco. Publication forthcoming.

Abstract
(No abstract.)

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Aaron Burstein. <a
    href="http://www.truststc.org/pubs/322.html"
    ><i>Conducting Cybersecurity Research Legally and
    Ethically</i></a>, Talk or presentation,  15,
    April, 2008; Accepted for presentation to the first USENIX
    Workshop on Large-Scale Exploits and Emergent Threats (LEET
    '08) on April 15, 2008, San Francisco.
    Publication
    forthcoming.
  • Plain text
    Aaron Burstein. "Conducting Cybersecurity Research
    Legally and Ethically". Talk or presentation,  15,
    April, 2008; Accepted for presentation to the first USENIX
    Workshop on Large-Scale Exploits and Emergent Threats (LEET
    '08) on April 15, 2008, San Francisco.
    Publication
    forthcoming.
  • BibTeX
    @presentation{Burstein08_ConductingCybersecurityResearchLegallyEthically,
        author = {Aaron Burstein},
        title = {Conducting Cybersecurity Research Legally and
                  Ethically},
        day = {15},
        month = {April},
        year = {2008},
        note = {Accepted for presentation to the first USENIX
                  Workshop on Large-Scale Exploits and Emergent
                  Threats (LEET '08) on April 15, 2008, San
                  Francisco.
    Publication forthcoming.},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/322.html}
    }
    

Posted by Mary Stewart on 18 Mar 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.