Team for Research in
Ubiquitous Secure Technology

Broadening Participation in Cyber Security
William H. Robinson, Kristen Gates, Sigurd Meldal

Citation
William H. Robinson, Kristen Gates, Sigurd Meldal. "Broadening Participation in Cyber Security". Talk or presentation, 3, November, 2011; Presented at the TRUST Autumn 2011 Conference.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    William H. Robinson, Kristen Gates, Sigurd Meldal. <a
    href="http://www.truststc.org/pubs/805.html"><i>Broadening
    Participation in Cyber Security</i></a>, Talk
    or presentation,  3, November, 2011; Presented at the <a
    href="http://www.truststc.org/conferences/11/FallConference"
    >TRUST Autumn 2011 Conference</a>.
  • Plain text
    William H. Robinson, Kristen Gates, Sigurd Meldal.
    "Broadening Participation in Cyber Security".
    Talk or presentation,  3, November, 2011; Presented at the
    <a
    href="http://www.truststc.org/conferences/11/FallConference"
    >TRUST Autumn 2011 Conference</a>.
  • BibTeX
    @presentation{RobinsonGatesMeldal11_BroadeningParticipationInCyberSecurity,
        author = {William H. Robinson and Kristen Gates and Sigurd
                  Meldal},
        title = {Broadening Participation in Cyber Security},
        day = {3},
        month = {November},
        year = {2011},
        note = {Presented at the <a
                  href="http://www.truststc.org/conferences/11/FallConference"
                  >TRUST Autumn 2011 Conference</a>},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/805.html}
    }
    

Posted by Christopher Brooks on 3 Nov 2011.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.