- IDEALS Home
- →
- National Center for Supercomputing Applications (NCSA)
- →
- Browse National Center for Supercomputing Applications (NCSA) by Title
Browse National Center for Supercomputing Applications (NCSA) by Title
Now showing items 133-152 of 195
-
(2014)Report of the first year of Blue Waters service, with articles summarizing the efforts and results from science teams using the super computer.
application/pdf
PDF (14MB)
-
(2017-10-23)This talk presents various aspects and challenges of monitoring and security of a big research network while keeping it open and usable. We focus on issues faced due to following attributes: * decentralization * high ...
application/pdf
PDF (13MB)
-
(2017-12-11)The NSF Cybersecurity Center of Excellence (CCoE) leads the NSF community in addressing the cybersecurity challenges in producing trustworthy science. Beginning as the Center for Trusted Scientific Cyberinfrastructure ...
application/pdf
PDF (13MB)
-
(2019-07-22)The recent proliferation of sensors has created an environment in which human behaviors are continuously monitored and recorded. However, many types of this passively-generated data are particularly sensitive. For example, ...
application/pdf
PDF (23MB)
-
CCoE Webinar: Integrity Protection for Scientific Workflow Data: Motivation and Initial Experiences (2019-08-26)With the continued rise of scientific computing and the enormous increases in the size of data being processed, scientists must consider whether the processes for transmitting and storing data sufficiently assure the ...
application/pdf
PDF (22MB)
-
(2017-10-27)Cal Poly Pomona and NSF Center for Trustworthy Scientific Cyberinfrastructure (CTSC) organized an on-site workshop at Cal Poly Pomona for CyberCorps Scholarship for Service (SFS) students nationwide that discussed the ...
application/pdf
PDF (941kB)
-
(2019-09-11)NCSA's Cybersecurity and Networking Division (CSND) is hosting another security talk, "Learning Security's First Principles with the Super Mario Bros," by Scott Russell, Senior Policy Analyst at the Indiana University ...
application/pdf
PDF (3MB)
-
(2018-02-26)Blockchain technology has evolved from being an immutable ledger of transactions for cryptocurrencies to a programmable interactive environment for building distributed reliable applications. Although the blockchain ...
application/pdf
PDF (1MB)
-
(2019-05-30)How can cybersecurity play an enabling role in scientific research? This talk describes the first five years of experience from NSF Cybersecurity Center of Excellence, its vision for the next five, and its take on how ...
application/pdf
PDF (8MB)
-
(2018-05-21)The European Union’s General Data Protection Regulation (GDPR) is slated to come into effect on May 25, 2018, and organizations around the world are struggling to determine whether they are covered, what is required, and ...
application/pdf
PDF (322kB)
-
(2008-02-06)This case study describes FBI Major Case 216, which ultimately became a collaborative investigation between the FBI and site security professionals into a series of cyberattacks that took place from August 2003 to March ...
application/pdf
PDF (1MB)
-
(2017-12)A collection of training presentations covering federated identity management for research organization, presented at the 2017 AGU New Orleans conference. Hands-on exercises are included in this submission. The topics ...
application/pdf
PDF (13MB)
-
(2018-07-24)Workshop presented at PEARC18. This 3-hour workshop covers practical information security for science projects by describing the foundational elements of a cybersecurity program necessary to provide a secure and safe ...
application/pdf
PDF (5MB)
-
(2019-11-19)The Report of the 2019 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure
application/pdf
PDF (4MB)
-
(17-11-28)The Report of the California State Polytechnic University Pomona SFS Engagement
application/pdf
PDF (395kB)
-
(2020-11-04)The Report of the 2020 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure
application/pdf
PDF (2MB)
-
(2018-09-13)Sample sponsorship prospectus for an open source software conference. Attached is a sponsorship prospectus from the 2017 BroCon hosted at NCSA. It is meant for demonstration purposes only. The contact info referenced in ...
application/pdf
PDF (132kB)
-
(2020-12-01)The final report of the Trusted CI engagement with The Scalable Cyberinfrastructure for Multi-Messenger Astrophysics (SCiMMA).
application/pdf
PDF (245kB)
-
(2020-03-24)Trusted CI is holding a Virtual Town Hall on Tuesday March 24th at 3pm Eastern to discuss the impact of COVID-19 on the NSF open science community. We recently posted a blog discussing recommendations for reducing cybersecurity ...
application/pdf
PDF (1MB)
-
(2019-07-31)Presentation summarizing our PEARC19 paper. Paper abstract: This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation (NSF) to serve the community ...
application/pdf
PDF (4MB)
Now showing items 133-152 of 195