You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 26 Next »

Goal: accelerate Transition To Practice (TTP) of NSF funded later stage cybersecurity research into operational environments by prototyping and experimental deployments 

NSF Award Abstract

NSF EAGER Cybersecurity Transition to Practice Acceleration Overview

Internet2 TechEx 2016: Introduction to NSF Cybersecurity Transition to Practice - Tuesday, September 27, 2016

 


Global Summit 2017: CINC UP: Cybersecurity Research Acceleration Workshop & Showcase - Wednesday, April 26, 2017

Welcome & NSF EAGER TTP Overview, Florence Hudson, Internet2 
What CIOs Are Looking for from Cybersecurity Research Efforts, Bruce Maas, University of Wisconsin-Madison

Identity & Access Management and Network Security
CILogon 2.0 - An Integrated Identity and Access Management Platform for Science, Jim Basney, University of Illinois at Urbana-Champaign

Poster on CILogon 2.0

Provide feedback on Jim's cybersecurity research: http://bit.ly/JimBasney

Passive and Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names, Roberto Perdisci, University of Georgia

Poster on Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names

Provide feedback on Roberto's cybersecurity research: http://bit.ly/RobertoPerdisci

Data-Driven Cyber Vulnerability Maintenance, Ted Allen, Ohio State University

Provide feedback on Ted's cybersecurity research: http://bit.ly/TedAllenTTP

Mitigating Insider Attacks in Provenance Systems, Christian Collberg, University of Arizona

Provide feedback on Christian's cybersecurity research: http://bit.ly/ChristianCollberg

Smart Grid
Cyber-Attack and Mitigation Demos for Wide-Area Control of Power Grids, Aranya Chakrabortty, North Carolina State University

Poster on Cyber-Attack & Mitigation Demos for Wide-Area Control of Power Grids

Provide feedback on Aranya's cybersecurity research: http://bit.ly/AranyaChakrabortty

Cloud Security & Storage
A Campus Pilot For A Privacy-Enabled Cloud Storage, Search, and Collaboration Portal for Education, Radu Sion, Stony Brook University

Provide feedback on Radu's cybersecurity research: http://bit.ly/RaduSion

Data Analytics & Security
A Kit for Exploring Databases Under the Hood for Security, Forensics and Data, Alex Rasin, DePaul University

Poster on Kit for Exploring Databases Under the Hood for Security, Forensics & Data

Provide feedback on Alex's cybersecurity research: http://bit.ly/AlexRasin

A Distributed Visual Analytics Sandbox for High Volume Data Streams, Raju Gottumukkala, University of Louisiana-Lafayette

Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala1

Internet of Things
Cybersafety of Electric Vehicles and EVSE Equipment, Raju Gottumukkala, University of Louisiana-Lafayette

Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala2

Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs, Fareena Saqib, Florida Institute of Technology

Provide feedback on Fareena's cybersecurity research: http://bit.ly/FareenaSaqib

Toward Ethical Intelligent Autonomous Systems, A Case-Supported Principle-Based Behavior Paradigm, Michael Anderson, University of Hartford

Poster on Toward Ethical Intelligent Autonomous Systems, A Case-Support Principle-Based Behavior Paradigm

Provide feedback on Michael's cybersecurity research: http://bit.ly/MichaelAndersonTTP

 

  • No labels