Resources
Links
The Center provides a collection of public documents (see below) and a list of external links that are relevant to cyber security research and development. Please contact us with suggestions for documents or links to add.
DHS S&T Documents
Org. | Document Title | Year | Download |
---|---|---|---|
DHS S&T | A Roadmap for Cybersecurity Research | 2009 | PDF (2.2MB) |
DHS S&T | Moving Towards Credentialing Interoperability | 2010 | PDF (5.15MB) |
DHS S&T | Cyber Security Division FY 2011 Annual Report | 2012 | PDF (9.9MB) |
Other Documents
As a service to the community, we present this collection of public documents that are highly relevant to planning of cyber security research and development.
Org. | Document Title | Year | Download |
---|---|---|---|
DHS | Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise | 2011 | PDF (729KB) |
DHS | Fact Sheet: Blueprint for a Secure Cyber Future | 2011 | PDF (16KB) |
OSTP | Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program | 2011 | PDF (815KB) |
DOE | Roadmap to Achieve Energy Delivery Systems Cybersecurity | 2011 | PDF (2.7MB) |
NPPD | Enabling Distributed Security in Cyberspace | 2011 | PDF (922KB) |
White House | The Comprehensive National Cybersecurity Initiative | 2010 | PDF (280KB) |
NCDI | National Cyber Defense Financial Services Workshop Report | 2009 | PDF (1.0MB) |
NITRD | National Cyber Leap Year Summit 2009, Co-Chairs’ Report | 2009 | PDF (324KB) |
White House | White House Cyberspace Policy Review | 2009 | PDF (710KB) |
CAIDA | The Workshop on Active Internet Measurements (AIMS) Report | 2009 | PDF (120KB) |
I3P | National Cyber Security: Research and Development Challenges Related to Economics, Physical Infrastructure and Human Behavior | 2009 | PDF (136KB) |
CSIS | Securing Cyberspace for the 44th Presidency: A Report of the CSIS Commission on Cybersecurity for the 44th Presidency | 2008 | PDF (999KB) |
FSSCC | Research Agenda for the Banking and Finance Sector | 2008 | PDF (150KB) |
USC-ISI | Census and Survey of the Visible Internet | 2008 | PDF (764KB) |
GAO | Report on the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, House of Representatives | 2008 | PDF (150KB) |
RAND | Cyber Security Economic Issues: Corporate Approaches and Challenges to Decisionmaking | 2008 | PDF (100KB) |
DoD | Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software |
2007 | PDF (1.8MB) |
NRC | Toward a Safer and More Secure Cyberspace | 2007 | PDF (1.7MB) |
CCR | The Workshop on Internet Topography (WIT) Report | 2007 | PDF (74KB) |
ACM | Computer Immunology | 2007 | PDF (156KB) |
NIST | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security |
2006 | PDF (2.2MB) |
NSTC | Federal Plan for Cyber Security and Information Assurance Research and Development |
2006 | PDF (1.1MB) |
DOE | Roadmap to Secure Control Systems in the Energy Sector | 2006 | PDF (2.1MB) |
I3P | I3P Economics Project Workshop Report | 2006 | PDF (1.9MB) |
IRC | Hard Problem List | 2005 | PDF (0.3MB) |
PITAC | Cyber Security: A Crisis of Prioritization | 2005 | PDF (2.3MB) |
CCR | Community-Oriented Network Measurement Infrastructure (CONMI) Workshop Report | 2005 | PDF (107KB) |
USSS | Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector | 2004 | PDF (109KB) |
NIAC | Hardening The Internet | 2004 | PDF (0.1MB) |
Information Security Governance: A Call to Action | 2004 | PDF (0.5MB) | |
CRA | Four Grand Challenges in Trustworthy Computing | 2003 | PDF (0.2MB) |
White House | The National Strategy to Secure Cyberspace | 2003 | PDF (1.0MB) |
I3P | Cyber Security Research and Development Agenda | 2003 | PDF (0.4MB) |
McGill | Multiple Source Internet Tomography | 2003 | PDF (514KB) |
NRC | Trust in Cyberspace | 1999 | PDF (0.9MB) |
University of New Mexico | Immunity by Design: An Artificial Immune System | 1999 | PDF (80KB) |
University of New Mexico | Principles of a Computer Immune System | 1999 | PDF (80KB) |
PCCIP | Critical Foundations: Protecting America’s Infrastructures | 1997 | PDF (1.0MB) |