Internet2 Global Summit 2017 CINO PAG Meeting - Sunday, April 23, 2017

To view the slides, please click here - Internet2 CINO PAG Meeting

Internet2 Global Summit 2017 CINC UP: Collaborative Innovation Community Meeting: IoT, E2ET&S, Smart Campus - Tuesday, April 25, 2017

To view the slides, please click here - Internet2 CINC UP IoT, E2ET&S, SC Meeting

IoT Systems Risk Management Task Force - IoT Risks Tools Brochure Shodan & Censys.io- April 2017

IoT Systems Risk Management Task Force - Vendor Management Document - April 2017

Internet2 Global Summit 2017 CINC UP: Big Data Innovation Hubs - Wednesday, April 26, 2017

To view the slides, please click here - Internet2 CINC UP Big Data Innovation Hubs

Internet2 Global Summit 2017: CINC UP: Cybersecurity Research Acceleration Workshop & Showcase - Wednesday, April 26, 2017

Welcome & NSF EAGER TTP Overview, Florence Hudson, Internet2 
What CIOs Are Looking for from Cybersecurity Research Efforts, Bruce Maas, University of Wisconsin-Madison

Identity & Access Management and Network Security
CILogon 2.0 - An Integrated Identity and Access Management Platform for Science, Jim Basney, University of Illinois at Urbana-Champaign

Poster on CILogo 2.0

Provide feedback on Jim's cybersecurity research: http://bit.ly/JimBasney

Passive and Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names, Roberto Perdisci, University of Georgia

Poster on Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names

Provide feedback on Roberto's cybersecurity research: http://bit.ly/RobertoPerdisci

Data-Driven Cyber Vulnerability Maintenance, Ted Allen, Ohio State University

Provide feedback on Ted's cybersecurity research: http://bit.ly/TedAllenTTP

Mitigating Insider Attacks in Provenance Systems, Christian Collberg, University of Arizona

Provide feedback on Christian's cybersecurity research: http://bit.ly/ChristianCollberg

Smart Grid
Cyber-Attack and Mitigation Demos for Wide-Area Control of Power Grids, Aranya Chakrabortty, North Carolina State University

Poster on Cyber-Attack & Mitigation Demos for Wide-Area Control of Power Grids

Provide feedback on Aranya's cybersecurity research: http://bit.ly/AranyaChakrabortty

Cloud Security & Storage
A Campus Pilot For A Privacy-Enabled Cloud Storage, Search, and Collaboration Portal for Education, Radu Sion, Stony Brook University

Provide feedback on Radu's cybersecurity research: http://bit.ly/RaduSion

Data Analytics & Security
A Kit for Exploring Databases Under the Hood for Security, Forensics and Data, Alex Rasin, DePaul University

Poster on Kit for Exploring Databases Under the Hood for Security, Forensics & Data

Provide feedback on Alex's cybersecurity research: http://bit.ly/AlexRasin

A Distributed Visual Analytics Sandbox for High Volume Data Streams, Raju Gottumukkala, University of Louisiana-Lafayette

Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala1

Internet of Things
Cybersafety of Electric Vehicles and EVSE Equipment, Raju Gottumukkala, University of Louisiana-Lafayette

Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala2

Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs, Fareena Saqib, Florida Institute of Technology

Provide feedback on Fareena's cybersecurity research: http://bit.ly/FareenaSaqib

Toward Ethical Intelligent Autonomous Systems, A Case-Supported Principle-Based Behavior Paradigm, Michael Anderson, University of Hartford

Poster on Toward Ethical Intelligent Autonomous Systems, A Case-Support Principle-Based Behavior Paradigm 

Provide feedback on Michael's cybersecurity research: http://bit.ly/MichaelAndersonTTP

 

  • No labels