You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 13 Next »

Goal: accelerate Transition To Practice (TTP) of NSF funded later stage cybersecurity research into operational environments by prototyping and experimental deployments 

NSF Award Abstract

NSF EAGER Cybersecurity Transition to Practice Acceleration Overview

Internet2 TechEx 2016: Introduction to NSF Cybersecurity Transition to Practice - Tuesday, September 27, 2016


Webinar November 18, 2016: Cybersecurity Research Transition to Practice - NSF EAGER participation  

Control Your Cloud Deployments: Secure SQL, Storage, Encrypted File Sharing, Computation Environments - Radu Sion, State University of New York - Stony Brook, Private Machines

Named Data Networking: An Internet Architecture for the Future - Christos Papadopoulos, Colorado State University

Recording from 11/18/2016 Webinar


Global Summit 2017: CINC UP: Cybersecurity Research Acceleration Workshop & Showcase - Wednesday, April 26, 2017

Welcome & NSF EAGER TTP Overview, Florence Hudson, Internet2 
What CIOs Are Looking for from Cybersecurity Research Efforts, Bruce Maas, University of Wisconsin-Madison

Identity & Access Management and Network Security
CILogon 2.0 - An Integrated Identity and Access Management Platform for Science, Jim Basney, University of Illinois at Urbana-Champaign

Provide feedback on Jim's cybersecurity research: http://bit.ly/JimBasney

Passive and Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names, Roberto Perdisci, University of Georgia

Provide feedback on Roberto's cybersecurity research: http://bit.ly/RobertoPerdisci

Data-Driven Cyber Vulnerability Maintenance, Ted Allen, Ohio State University

Provide feedback on Ted's cybersecurity research: http://bit.ly/TedAllenTTP

Mitigating Insider Attacks in Provenance Systems, Christian Collberg, University of Arizona

Provide feedback on Christian's cybersecurity research: http://bit.ly/ChristianCollberg

Smart Grid
Cyber-Attack and Mitigation Demos for Wide-Area Control of Power Grids, Aranya Chakrabortty, North Carolina State University

Provide feedback on Aranya's cybersecurity research: http://bit.ly/AranyaChakrabortty

Cloud Security & Storage
A Campus Pilot For A Privacy-Enabled Cloud Storage, Search, and Collaboration Portal for Education, Radu Sion, Stony Brook University

Provide feedback on Radu's cybersecurity research: http://bit.ly/RaduSion

Data Analytics & Security
A Kit for Exploring Databases Under the Hood for Security, Forensics and Data, Alex Rasin, DePaul University

Provide feedback on Alex's cybersecurity research: http://bit.ly/AlexRasin

A Distributed Visual Analytics Sandbox for High Volume Data Streams, Raju Gottumukkala, University of Louisiana-Lafayette

Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala1

Internet of Things
Cybersafety of Electric Vehicles and EVSE Equipment, Raju Gottumukkala, University of Louisiana-Lafayette

Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala2

Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs, Fareena Saqib, Florida Institute of Technology

Provide feedback on Fareena's cybersecurity research: http://bit.ly/FareenaSaqib

Toward Ethical Intelligent Autonomous Systems, A Case-Supported Principle-Based Behavior Paradigm, Michael Anderson, University of Hartford

Provide feedback on Michael's cybersecurity research: http://bit.ly/MichaelAndersonTTP

  • No labels