- IDEALS Home
- →
- National Center for Supercomputing Applications (NCSA)
- →
- Browse National Center for Supercomputing Applications (NCSA) by Title
Browse National Center for Supercomputing Applications (NCSA) by Title
Now showing items 149-168 of 195
-
(2018-09-13)Sample sponsorship prospectus for an open source software conference. Attached is a sponsorship prospectus from the 2017 BroCon hosted at NCSA. It is meant for demonstration purposes only. The contact info referenced in ...
application/pdf
PDF (132kB)
-
(2020-12-01)The final report of the Trusted CI engagement with The Scalable Cyberinfrastructure for Multi-Messenger Astrophysics (SCiMMA).
application/pdf
PDF (245kB)
-
(2020-03-24)Trusted CI is holding a Virtual Town Hall on Tuesday March 24th at 3pm Eastern to discuss the impact of COVID-19 on the NSF open science community. We recently posted a blog discussing recommendations for reducing cybersecurity ...
application/pdf
PDF (1MB)
-
(2019-07-31)Presentation summarizing our PEARC19 paper. Paper abstract: This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation (NSF) to serve the community ...
application/pdf
PDF (4MB)
-
application/pdf
PDF (539kB)
-
(2020-06-22)Susan Sons, Deputy Director of the Research Security Operations Center (ResearchSOC) will provide a mini threat briefing (a brief brief) and a broader discussion on how the research cybersecurity community approaches threat ...
application/pdf
PDF (2MB)
-
(2020-09-28)Today, a large number of researchers do not have access to secure, compliance-capable research computing infrastructure at their home institutions. Traditional institutional secure CI only supports “in-house” users. The ...
application/pdf
PDF (5MB)
-
(2019-02-25)Cyberattacks on enterprise networks have moved into an era where both attackers and security analysts utilize complex strategies to confuse and mislead one another. Critical attacks often take multitudes of reconnaissance, ...
application/pdf
PDF (16MB)
-
(2018-12-10)A “cloud resource” provides a hosted, self-service means for users to run virtual machines or containers such that they can have a custom software stack and isolation from other users. Virtual machines or container images ...
application/pdf
PDF (3MB)
-
(2021-02-22)In an era where big data, machine learning algorithms, and simulations are used to understand cyberattacks and cybersecurity, is there room for qualitative or 'thick' data? This talk shares a social scientist’s perspective ...
application/pdf
PDF (3MB)
-
(2020-10-06)The US has historically taken a fairly minimalist approach to cybersecurity regulation, but recent years have evidenced a trend toward increasing regulation. The latest in this trend is the US Department of Defense’s ...
application/pdf
PDF (5MB)
-
(2018-03-26)In this talk, we are presenting our work on building a data quality and security (DQS) framework, which integrates cybersecurity with other diverse metrics, such as accuracy, reliability, timeliness, and safety into a ...
application/pdf
PDF (9MB)
-
(2019-12-09)The DDIDD Project (DDoS Defense in Depth for DNS) is applying existing and developing new defenses against Distributed-Denial-of-Service attacks for operational DNS infrastructure. We are building a defense-in-depth approach ...
application/pdf
PDF (2MB)
-
(2019-05-20)Internet routing is woefully insecure - in spite of many attacks and extensive awareness and efforts. But, finally, there is progress - and even some deployable defenses, based on free open-source software - including some ...
application/pdf
PDF (8MB)
-
(2020-10-26)Advances in computer systems over the past decade have laid a solid foundation for data collection at a staggering scale. Data generated from end-user devices has tremendous value to the research community. For example, ...
application/pdf
PDF (4MB)
-
(2020-02-24)Testbeds can be great for trying out new ideas and not taking down a production network, or they can be useless and impossible to figure out. FABRIC took the best of past testbeds and is creating a new, useful national ...
application/pdf
PDF (18MB)
-
(2020-05-18)The science and cyberinfrastructure community writes a huge quantity of software in the form of services, web applications, and infrastructure to support its mission. Each deployed software component can open your organization ...
application/pdf
PDF (3MB)
-
(2019-09-23)Jupyter Notebooks have become tremendously popular for creating, sharing and reproducing science. While they are relatively easy to setup and use, there has (until recently) been little concern regarding the security ...
application/pdf
PDF (8MB)
-
Trusted CI Webinar: NIST 800-171 Compliance Program at University of Connecticut with Jason Pufahl (2018-08-27)NOTE: Please contact Jason Pufahl directly to request a copy of the spreadsheet discussed in the presentation: jason.pufahl@uconn.edu The Department of Defense established DFARS 252. 204-701 which specifies that any ...
application/pdf
PDF (3MB)
-
(2020-03-23)Data-intensive science applications in research fields such as bioinformatics, chemistry, and material science are increasingly becoming multi-domain in nature. To augment local campus CyberInfrastructure (CI) resources, ...
application/pdf
PDF (6MB)
Now showing items 149-168 of 195