US flag signifying that this is a United States Federal Government website   Official website of the Department of Homeland Security

Homeland Security

Cyber Security Division Resources


S&T's published documents other Cyber Security references and links can be found on this page.

DHS S&T Documents

Org.Document TitleYearDownload
DHS S&TCyber Security Division FY 2012 Annual Report2013PDF (4 MB)
DHS S&TCyber Security Division FY 2011 Annual Report2012PDF (1 MB)
DHS S&TThe Menlo Report2012PDF (1 MB) 
DHS S&TThe Menlo Companion Report2012PDF (1 MB)
DHS S&TMoving Towards Credentialing Interoperability   2010PDF (5.15MB)
DHS S&TA Roadmap for Cybersecurity Research2009PDF (2.2MB)

Back to Top

Other Documents

As a service to the community, we present this collection of public documents that are highly relevant to planning of cybersecurity research and development.

Org.Document TitleYearDownload
DHSBlueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise2011PDF (729KB)
DHSFact Sheet: Blueprint for a Secure Cyber Future2011PDF (16KB)
OSTPTrustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program2011PDF (815KB)
DOERoadmap to Achieve Energy Delivery Systems Cybersecurity2011PDF (2.7MB)
NPPDEnabling Distributed Security in Cyberspace2011PDF (922KB)
White HouseThe Comprehensive National Cybersecurity Initiative2010PDF (280KB)
NCDINational Cyber Defense Financial Services Workshop Report2009PDF (1.0MB)
NITRDNational Cyber Leap Year Summit 2009, Co-Chairs’ Report2009PDF (324KB)
White HouseWhite House Cyberspace Policy Review2009PDF (710KB)
CAIDAThe Workshop on Active Internet Measurements (AIMS) Report2009PDF (120KB)
I3PNational Cyber Security: Research and Development Challenges Related to Economics, Physical Infrastructure and Human Behavior2009PDF (136KB)
CSISSecuring Cyberspace for the 44th Presidency: A Report of the CSIS Commission on Cybersecurity for the 44th Presidency2008PDF (999KB)
FSSCCResearch Agenda for the Banking and Finance Sector2008PDF (150KB)
USC-ISICensus and Survey of the Visible Internet2008PDF (764KB)
GAOReport on the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, House of Representatives2008PDF (150KB)
RANDCyber Security Economic Issues: Corporate Approaches and Challenges to Decisionmaking2008PDF (100KB)
DoDReport of the Defense Science Board Task Force on
Mission Impact of Foreign Influence on DoD Software
2007PDF (1.8MB)
NRCToward a Safer and More Secure Cyberspace2007PDF (1.7MB)
CCRThe Workshop on Internet Topography (WIT) Report2007PDF (74KB)
ACMComputer Immunology2007PDF (156KB)
NISTSP 800-82:
Guide to Supervisory Control and Data Acquisition (SCADA)
and Industrial Control Systems Security
2006PDF (2.2MB)
NSTCFederal Plan for Cybersecurity and Information Assurance
Research and Development
2006PDF (1.1MB)
DOERoadmap to Secure Control Systems in the Energy Sector2006PDF (2.1MB)
I3PI3P Economics Project Workshop Report2006PDF (1.9MB)
IRCHard Problem List2005PDF (0.3MB)
PITACCybersecurity: A Crisis of Prioritization2005PDF (2.3MB)
CCRCommunity-Oriented Network Measurement Infrastructure (CONMI) Workshop Report2005PDF (107KB)
USSSInsider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector2004PDF (109KB)
NIACHardening The Internet2004PDF (0.1MB)
 Information Security Governance: A Call to Action2004PDF (0.5MB)
CRAFour Grand Challenges in Trustworthy Computing2003PDF (0.2MB)
White HouseThe National Strategy to Secure Cyberspace2003PDF (1.0MB)
I3PCybersecurity Research and Development Agenda2003PDF (0.4MB)
McGillMultiple Source Internet Tomography2003PDF (514KB)
NRCTrust in Cyberspace1999PDF (0.9MB)
University of New MexicoImmunity by Design: An Artificial Immune System1999PDF (80KB)
University of New MexicoPrinciples of a Computer Immune System1999PDF (80KB)
PCCIPCritical Foundations: Protecting America’s Infrastructures1997PDF (1.0MB)

Back to Top


  • Federal Cybersecurity Game-change R&D

    This website is devoted to promoting information exchange for advancing the U.S. Federal cybersecurity game-change research agenda.

  • DETER Project

    The goal of the Defense Technology Experimental Research (DETER) laboratory effort is to create, maintain, and support a collaborative and vendor-neutral experimental environment for cybersecurity research. It is intended to provide a center for interchange and collaboration among security researchers and testbed builders.

  • PREDICT Project

    The Protected Repository for the Defense of Infrastructure Against Cyber Threats is a repository for current computer network operational data that will be provided to cyber defense researchers for the purpose of developing new models, technologies and products that support effective threat assessment and increase cybersecurity capabilities.

  • DNSSEC Deployment Initiative

    The DNS Security Extensions (DNSSEC) Deployment Coordination Initiative is part of a global effort to deploy new security measures that will help the DNS perform as people expect it to – in a trustworthy manner.

  • Institute for Information Infrastructure Protection

    The Institute for Information Infrastructure Protection (I3P) is a Consortium that includes academic institutions, federally-funded labs and non-profit organizations.

  • Institute for Security Technology Studies

    The Institute for Security Technology Studies (ISTS) at Dartmouth College is dedicated to pursuing research and education for cybersecurity and trust.

  • Computing Research Association

    The Computing Research Association (CRA) is an association of more than 200 North American academic departments of computer science, computer engineering, and related fields; laboratories and centers in industry, government, and academia engaging in basic computing research; and affiliated professional societies.

  • SRI Computer Science Laboratory

    The Computer Science Laboratory studies the logical foundations of scalable systems, that are beyond the scope of traditional testing or simulation, and builds and applies efficient high-level tools for rigorous mechanical analysis. Current systems of interest include not only traditional computer hardware and software, but also biological systems and nanoelectronics.

Back to Top

Back to Top