S&T's published documents other Cyber Security references and links can be found on this page.
DHS S&T Documents
|DHS S&T||Cyber Security Division FY 2012 Annual Report||2013||PDF (4 MB)|
|DHS S&T||Cyber Security Division FY 2011 Annual Report||2012||PDF (1 MB)|
|DHS S&T||The Menlo Report||2012||PDF (1 MB)|
|DHS S&T||The Menlo Companion Report||2012||PDF (1 MB)|
|DHS S&T||Moving Towards Credentialing Interoperability||2010||PDF (5.15MB)|
|DHS S&T||A Roadmap for Cybersecurity Research||2009||PDF (2.2MB)|
As a service to the community, we present this collection of public documents that are highly relevant to planning of cybersecurity research and development.
|DHS||Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise||2011||PDF (729KB)|
|DHS||Fact Sheet: Blueprint for a Secure Cyber Future||2011||PDF (16KB)|
|OSTP||Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program||2011||PDF (815KB)|
|DOE||Roadmap to Achieve Energy Delivery Systems Cybersecurity||2011||PDF (2.7MB)|
|NPPD||Enabling Distributed Security in Cyberspace||2011||PDF (922KB)|
|White House||The Comprehensive National Cybersecurity Initiative||2010||PDF (280KB)|
|NCDI||National Cyber Defense Financial Services Workshop Report||2009||PDF (1.0MB)|
|NITRD||National Cyber Leap Year Summit 2009, Co-Chairs’ Report||2009||PDF (324KB)|
|White House||White House Cyberspace Policy Review||2009||PDF (710KB)|
|CAIDA||The Workshop on Active Internet Measurements (AIMS) Report||2009||PDF (120KB)|
|I3P||National Cyber Security: Research and Development Challenges Related to Economics, Physical Infrastructure and Human Behavior||2009||PDF (136KB)|
|CSIS||Securing Cyberspace for the 44th Presidency: A Report of the CSIS Commission on Cybersecurity for the 44th Presidency||2008||PDF (999KB)|
|FSSCC||Research Agenda for the Banking and Finance Sector||2008||PDF (150KB)|
|USC-ISI||Census and Survey of the Visible Internet||2008||PDF (764KB)|
|GAO||Report on the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, House of Representatives||2008||PDF (150KB)|
|RAND||Cyber Security Economic Issues: Corporate Approaches and Challenges to Decisionmaking||2008||PDF (100KB)|
|DoD||Report of the Defense Science Board Task Force on|
Mission Impact of Foreign Influence on DoD Software
|NRC||Toward a Safer and More Secure Cyberspace||2007||PDF (1.7MB)|
|CCR||The Workshop on Internet Topography (WIT) Report||2007||PDF (74KB)|
|ACM||Computer Immunology||2007||PDF (156KB)|
Guide to Supervisory Control and Data Acquisition (SCADA)
and Industrial Control Systems Security
|NSTC||Federal Plan for Cybersecurity and Information Assurance|
Research and Development
|DOE||Roadmap to Secure Control Systems in the Energy Sector||2006||PDF (2.1MB)|
|I3P||I3P Economics Project Workshop Report||2006||PDF (1.9MB)|
|IRC||Hard Problem List||2005||PDF (0.3MB)|
|PITAC||Cybersecurity: A Crisis of Prioritization||2005||PDF (2.3MB)|
|CCR||Community-Oriented Network Measurement Infrastructure (CONMI) Workshop Report||2005||PDF (107KB)|
|USSS||Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector||2004||PDF (109KB)|
|NIAC||Hardening The Internet||2004||PDF (0.1MB)|
|Information Security Governance: A Call to Action||2004||PDF (0.5MB)|
|CRA||Four Grand Challenges in Trustworthy Computing||2003||PDF (0.2MB)|
|White House||The National Strategy to Secure Cyberspace||2003||PDF (1.0MB)|
|I3P||Cybersecurity Research and Development Agenda||2003||PDF (0.4MB)|
|McGill||Multiple Source Internet Tomography||2003||PDF (514KB)|
|NRC||Trust in Cyberspace||1999||PDF (0.9MB)|
|University of New Mexico||Immunity by Design: An Artificial Immune System||1999||PDF (80KB)|
|University of New Mexico||Principles of a Computer Immune System||1999||PDF (80KB)|
|PCCIP||Critical Foundations: Protecting America’s Infrastructures||1997||PDF (1.0MB)|
- Federal Cybersecurity Game-change R&D
This website is devoted to promoting information exchange for advancing the U.S. Federal cybersecurity game-change research agenda.
- DETER Project
The goal of the Defense Technology Experimental Research (DETER) laboratory effort is to create, maintain, and support a collaborative and vendor-neutral experimental environment for cybersecurity research. It is intended to provide a center for interchange and collaboration among security researchers and testbed builders.
- PREDICT Project
The Protected Repository for the Defense of Infrastructure Against Cyber Threats is a repository for current computer network operational data that will be provided to cyber defense researchers for the purpose of developing new models, technologies and products that support effective threat assessment and increase cybersecurity capabilities.
- DNSSEC Deployment Initiative
The DNS Security Extensions (DNSSEC) Deployment Coordination Initiative is part of a global effort to deploy new security measures that will help the DNS perform as people expect it to – in a trustworthy manner.
- Institute for Information Infrastructure Protection
The Institute for Information Infrastructure Protection (I3P) is a Consortium that includes academic institutions, federally-funded labs and non-profit organizations.
- Institute for Security Technology Studies
The Institute for Security Technology Studies (ISTS) at Dartmouth College is dedicated to pursuing research and education for cybersecurity and trust.
- Computing Research Association
The Computing Research Association (CRA) is an association of more than 200 North American academic departments of computer science, computer engineering, and related fields; laboratories and centers in industry, government, and academia engaging in basic computing research; and affiliated professional societies.
- SRI Computer Science Laboratory
The Computer Science Laboratory studies the logical foundations of scalable systems, that are beyond the scope of traditional testing or simulation, and builds and applies efficient high-level tools for rigorous mechanical analysis. Current systems of interest include not only traditional computer hardware and software, but also biological systems and nanoelectronics.