Goal: accelerate Transition To Practice (TTP) of NSF funded later stage cybersecurity research into operational environments by prototyping and experimental deployments
NSF EAGER Cybersecurity Transition to Practice Acceleration Overview
Global Summit 2017: CINC UP: Cybersecurity Research Acceleration Workshop & Showcase - Wednesday, April 26, 2017
Welcome & NSF EAGER TTP Overview, Florence Hudson, Internet2
What CIOs Are Looking for from Cybersecurity Research Efforts, Bruce Maas, University of Wisconsin-Madison
Identity & Access Management and Network Security
CILogon 2.0 - An Integrated Identity and Access Management Platform for Science, Jim Basney, University of Illinois at Urbana-Champaign
Poster on CILogon 2.0
Provide feedback on Jim's cybersecurity research: http://bit.ly/JimBasney
Passive and Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names, Roberto Perdisci, University of Georgia
Poster on Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names
Provide feedback on Roberto's cybersecurity research: http://bit.ly/RobertoPerdisci
Data-Driven Cyber Vulnerability Maintenance, Ted Allen, Ohio State University
Provide feedback on Ted's cybersecurity research: http://bit.ly/TedAllenTTP
Mitigating Insider Attacks in Provenance Systems, Christian Collberg, University of Arizona
Provide feedback on Christian's cybersecurity research: http://bit.ly/ChristianCollberg
Smart Grid
Cyber-Attack and Mitigation Demos for Wide-Area Control of Power Grids, Aranya Chakrabortty, North Carolina State University
Poster on Cyber-Attack & Mitigation Demos for Wide-Area Control of Power Grids
Provide feedback on Aranya's cybersecurity research: http://bit.ly/AranyaChakrabortty
Cloud Security & Storage
A Campus Pilot For A Privacy-Enabled Cloud Storage, Search, and Collaboration Portal for Education, Radu Sion, Stony Brook University
Provide feedback on Radu's cybersecurity research: http://bit.ly/RaduSion
Data Analytics & Security
A Kit for Exploring Databases Under the Hood for Security, Forensics and Data, Alex Rasin, DePaul University
Poster on Kit for Exploring Databases Under the Hood for Security, Forensics & Data
Provide feedback on Alex's cybersecurity research: http://bit.ly/AlexRasin
A Distributed Visual Analytics Sandbox for High Volume Data Streams, Raju Gottumukkala, University of Louisiana-Lafayette
Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala1
Internet of Things
Cybersafety of Electric Vehicles and EVSE Equipment, Raju Gottumukkala, University of Louisiana-Lafayette
Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala2
Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs, Fareena Saqib, Florida Institute of Technology
Provide feedback on Fareena's cybersecurity research: http://bit.ly/FareenaSaqib
Toward Ethical Intelligent Autonomous Systems, A Case-Supported Principle-Based Behavior Paradigm, Michael Anderson, University of Hartford
Provide feedback on Michael's cybersecurity research: http://bit.ly/MichaelAndersonTTP