Team for Research in
Ubiquitous Secure Technology

Federal Cyber Security Research & Development
Brad Martin

Citation
Brad Martin. "Federal Cyber Security Research & Development". Talk or presentation, 2, November, 2011; Talk or presentation, 2, November, 2011; Presented at the TRUST Autumn 2011 Conference.

Abstract
(No abstract.)

Electronic downloads


Internal. This publication has been marked by the author for use only by the author.
Citation formats  
  • HTML
    Brad Martin. <a
    href="http://www.truststc.org/pubs/794.html"><i>Federal
    Cyber Security Research &
    Development</i></a>, Talk or presentation,  2,
    November, 2011; Talk or presentation,  2, November, 2011;
    Presented at the <a
    href="http://www.truststc.org/conferences/11/FallConference"
    >TRUST Autumn 2011 Conference</a>.
  • Plain text
    Brad Martin. "Federal Cyber Security Research &
    Development". Talk or presentation,  2, November, 2011;
    Talk or presentation,  2, November, 2011; Presented at the
    <a
    href="http://www.truststc.org/conferences/11/FallConference"
    >TRUST Autumn 2011 Conference</a>.
  • BibTeX
    @presentation{Martin11_FederalCyberSecurityResearchDevelopment,
        author = {Brad Martin},
        title = {Federal Cyber Security Research \& Development},
        day = {2},
        month = {November},
        year = {2011},
        note = {Talk or presentation,  2, November, 2011;
                  Presented at the <a
                  href="http://www.truststc.org/conferences/11/FallConference"
                  >TRUST Autumn 2011 Conference</a>},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/794.html}
    }
    

Posted by Christopher Brooks on 3 Nov 2011.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.