- IDEALS Home
- →
- National Center for Supercomputing Applications (NCSA)
- →
- Browse National Center for Supercomputing Applications (NCSA) by Title
Browse National Center for Supercomputing Applications (NCSA) by Title
Now showing items 145-164 of 195
-
(2018-07-24)Workshop presented at PEARC18. This 3-hour workshop covers practical information security for science projects by describing the foundational elements of a cybersecurity program necessary to provide a secure and safe ...
application/pdf
PDF (5MB)
-
(2019-11-19)The Report of the 2019 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure
application/pdf
PDF (4MB)
-
(17-11-28)The Report of the California State Polytechnic University Pomona SFS Engagement
application/pdf
PDF (395kB)
-
(2020-11-04)The Report of the 2020 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure
application/pdf
PDF (2MB)
-
(2018-09-13)Sample sponsorship prospectus for an open source software conference. Attached is a sponsorship prospectus from the 2017 BroCon hosted at NCSA. It is meant for demonstration purposes only. The contact info referenced in ...
application/pdf
PDF (132kB)
-
(2020-12-01)The final report of the Trusted CI engagement with The Scalable Cyberinfrastructure for Multi-Messenger Astrophysics (SCiMMA).
application/pdf
PDF (245kB)
-
(2020-03-24)Trusted CI is holding a Virtual Town Hall on Tuesday March 24th at 3pm Eastern to discuss the impact of COVID-19 on the NSF open science community. We recently posted a blog discussing recommendations for reducing cybersecurity ...
application/pdf
PDF (1MB)
-
(2019-07-31)Presentation summarizing our PEARC19 paper. Paper abstract: This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation (NSF) to serve the community ...
application/pdf
PDF (4MB)
-
application/pdf
PDF (539kB)
-
(2020-06-22)Susan Sons, Deputy Director of the Research Security Operations Center (ResearchSOC) will provide a mini threat briefing (a brief brief) and a broader discussion on how the research cybersecurity community approaches threat ...
application/pdf
PDF (2MB)
-
(2020-09-28)Today, a large number of researchers do not have access to secure, compliance-capable research computing infrastructure at their home institutions. Traditional institutional secure CI only supports “in-house” users. The ...
application/pdf
PDF (5MB)
-
(2019-02-25)Cyberattacks on enterprise networks have moved into an era where both attackers and security analysts utilize complex strategies to confuse and mislead one another. Critical attacks often take multitudes of reconnaissance, ...
application/pdf
PDF (16MB)
-
(2018-12-10)A “cloud resource” provides a hosted, self-service means for users to run virtual machines or containers such that they can have a custom software stack and isolation from other users. Virtual machines or container images ...
application/pdf
PDF (3MB)
-
(2021-02-22)In an era where big data, machine learning algorithms, and simulations are used to understand cyberattacks and cybersecurity, is there room for qualitative or 'thick' data? This talk shares a social scientist’s perspective ...
application/pdf
PDF (3MB)
-
(2020-10-06)The US has historically taken a fairly minimalist approach to cybersecurity regulation, but recent years have evidenced a trend toward increasing regulation. The latest in this trend is the US Department of Defense’s ...
application/pdf
PDF (5MB)
-
(2018-03-26)In this talk, we are presenting our work on building a data quality and security (DQS) framework, which integrates cybersecurity with other diverse metrics, such as accuracy, reliability, timeliness, and safety into a ...
application/pdf
PDF (9MB)
-
(2019-12-09)The DDIDD Project (DDoS Defense in Depth for DNS) is applying existing and developing new defenses against Distributed-Denial-of-Service attacks for operational DNS infrastructure. We are building a defense-in-depth approach ...
application/pdf
PDF (2MB)
-
(2019-05-20)Internet routing is woefully insecure - in spite of many attacks and extensive awareness and efforts. But, finally, there is progress - and even some deployable defenses, based on free open-source software - including some ...
application/pdf
PDF (8MB)
-
(2020-10-26)Advances in computer systems over the past decade have laid a solid foundation for data collection at a staggering scale. Data generated from end-user devices has tremendous value to the research community. For example, ...
application/pdf
PDF (4MB)
-
(2020-02-24)Testbeds can be great for trying out new ideas and not taking down a production network, or they can be useless and impossible to figure out. FABRIC took the best of past testbeds and is creating a new, useful national ...
application/pdf
PDF (18MB)
Now showing items 145-164 of 195