A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Strategies for Research Cybersecurity and Compliance from the Lab
[article]
2019
Figshare
Presentation at 2019 Internet2 Global Summit
doi:10.6084/m9.figshare.7871777.v1
fatcat:bziv3onz2rfsjoocs3otaeqcde