S 2 Virginia Tech Program Overview
|
|
|
- Hilary George
- 10 years ago
- Views:
Transcription
1 S 2 Virginia Tech Program Overview T. Charles Clancy, PhD Co-Director, NSF Security and Software Engineering Research Center Associate Professor, Electrical and Computer Engineering
2 NSF I/UCRC Program Industry/University Cooperative Research Center Program seeks to build ecosystems where industry can effectively invest in university research and easily leverage the results Began in 1976, with over 100 I/UCRCs currently in operation Key Program Tenets NSF provides grant to support center operations Industry members pay annual membership fee Pooled membership fees are allocated to university research projects by advisory board made up of the member companies All members gain access to resulting IP
3 S 2 ERC Founded in 1985 as the Software Engineering Research Center Rechartered in 2010 as the Security and Software Engineering Research Center to reflect the growing need to address software security challenges Virginia Tech joined in 2011 to focus specifically on the cybersecurity research area
4 Virginia Tech Extended Campus Program Size ECE 73 faculty 750 UG; 400 Grad $28M/yr expenditures CS 37 faculty 400 UG; 200 Grad $7M/yr expenditures Virginia Tech Extended Campus SW Virginia Blacksburg Roanoke Arlington Richmond Hampton Roads 3 NAE, 20 fellow, 30 CAREER VT Research Arlington New 144,000 sqft building University invested in 8,000 sqft in new VTRC Arlington for Cyber R&D Literally across the street from NSF and two blocks from ONR & DARPA
5 Research VT Cyber Security Strategy Virginia Tech goal to grow research enterprise by 25% in next few years Significant federal spending in cyber security while curbing other spending necessitates major cyber R&D efforts Education Develop academic programs that meet the needs of government and industry in cyber security Half of Virginia Tech engineering grads take jobs in DC area, majority with defense contractors Need cyber curriculum to address DIB needs
6 Cyber Education Strategy Curriculum Development Student Club Cyber Education Ecosystem Career Mentorship Scholarships Research Opportunities Curriculum Minor in Cyber Security Graduate Certificate in Cyber Security Four new courses at graduate and undergraduate level Online Masters of Information Technology 7,500 in WDC Area 12,500 Nation-Wide 60% of Cyber Jobs in WDC Metropolitan Area Reflects Major Federal Investment in Cyber
7 Faculty Expertise in Cyber Applied Individual Professor Basic Component System OS Application Network Internet 25 Faculty Working in Areas Related to Cyber Security Broad Faculty Expertise Covers Spectrum Key Application Areas Wireless Transportation Power Health IT
8 VT Affiliates and Projects Awarded August 2011 PI: Dr. Charles Clancy Coordinator: Dr. Ingrid Burbey Inaugural Affiliates General Dynamics AIS Northrop Grumman IS Verisign Labs L-3 STRATIS (double member) New Affiliates General Electric SAIC Centripetal Networks Secure Hardware Architectures Anonymous Computation in the Cloud Smartgrid Security Secure Spectrum Access for Public Safety Program Tomography for Malware Detection Visualization and Cyber Situational Awareness
9 Industry Partnership Business Model Leverage S2ERC investment for large research and development partnership between industry and university Partner Identify Topic Precompetitive IR&D S2ERC Project Federal R&D Contract Phase 1 Federal R&D Contract Phase 2 Product Development Commercial Sales VT brings credibility to industry partner s research proposals to federal sponsors Industry partner brings tech transition path so sponsors know the results will tangible Leverage each other s contract vehicles and relationships for developing additional business opportunities Win-Win
10 Project Selection Process Member Dues $30K/year Center Research Fund Industry Advisory Board Funded Grad Student Project Industry membership fees are pooled to establish a research fund IAB votes on university projects to fund Source of project proposals: Responses to affiliate-issued RFI Internally generated by university faculty Project funding is $35K/year ($30K from research fund; $5K/year match from VT) One-to-one relationship between membership fee, member s vote, and funded projects
11 Intellectual Property All members who are interested in a particular project outcome can obtain royalty-free license to resulting IP Members can negotiate for an exclusive license if necessary on a per-project basis, for a royalty
12 Frequently Asked Questions (1) How can I protect my IP if my competitors are also members? Each project generally has one key industry champion who is promoting the project and involved hands-on in the execution; others do not seek to interfere Typically this is precompetitive, early-stage research and therefore IPR is rarely a problem in practice; competitive IP development generally occurs in followon R&D efforts external to the I/UCRC program What prevents my membership dues from being at a S 2 ERC site other than Virginia Tech? As an IAB member, your vote decides how the collective funds are spent. If you want to fund VT research, vote for VT projects. What are my responsibilities as an affiliate? Affiliates need to attend the center showcase events which occur every six months. This is where the IAB votes on projects and funding decisions are made. You are encouraged to interact closely with the faculty executing the projects you are interested in.
13 Frequently Asked Questions (2) Why would I fund S 2 ERC rather than funding Virginia Tech directly? By funding projects through S 2 ERC you take advantage of significantly lower overhead rates because NSF covers the center operations. With all the cost share and subsidies, every $1 buys roughly $2.50 in research. Participating in the center gives you visibility into a large range of research that may be of interest to your company, and would be accessible through the center.
Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission
Photo courtesy of Justin Reuter Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission CDDA Mission Mission of our CDDA
Innovation, Partnership, Development
Innovation, Partnership, Development ECEHDA Annual Conference March 13, 2015 Chris Valentino Director of Strategy The Need Access to top talent to address our nations most challenging problems Diverse
Cyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
Request for Information National Network for Manufacturing Innovation (NNMI)
Request for Information National Network for Manufacturing Innovation (NNMI) At the College of Engineering at the University of California, Berkeley, we believe that advanced manufacturing has tremendous
Northrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
Securing Networks, Securing Futures
CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in
research center concept
research center concept research center concept 1 Overview As a key part of the Russian Skolkovo Initiative, the Skolkovo Foundation, MIT, and others are assisting in the creation of the Skolkovo Institute
A Case Study of Virginia Tech and the University of Nottingham Nicole Sanderlin Director of Global Engagement Virginia Tech
A Case Study of Virginia Tech and the University of Nottingham Nicole Sanderlin Director of Global Engagement Virginia Tech November 5, 2015 18 th Annual Colloquium on International Engineering Education
Access to Excellence. Academic Units. SECTION I: Proven Excellence: Top-Ranked and Recognized Illinois Tech Programs
Countless resources exist to connect businesses and corporations with talent. When you partner with Illinois Institute of Technology (Illinois Tech), you gain the confidence that comes from access to a
Graduate Program Review of EE and CS
Graduate Program Review of EE and CS The site visit for the Graduate Program Review of Electrical Engineering and Computer Science took place on April 3-4. It included meetings with many constituencies
2014-15 www.cs.purdue.edu. Courtesy Voicu Popescu
2014-15 www.cs.purdue.edu Courtesy Voicu Popescu 1 Lawson Computer Science Building 2 Lawson Commons The Lawson building was developed with multiple spaces 3 designed to foster collaboration and dialogue.
A LOOK BACK: UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW
A LOOK BACK: UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW John C. Knight, Jane C. Prey, & Wm. A. Wulf Department of Computer Science University of Virginia ABSTRACT
University of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
Call for Proposal for Local Hosting National Women in Cybersecurity Conference 2016
Call for Proposal for Local Hosting National Women in Cybersecurity Conference 2016 Project Background The Women in Cybersecurity (WiCyS) Initiative was launched with the help of a National Science Foundation
Pamplin College of Business Strategic Plan 2014-2019
Pamplin College of Business Strategic Plan 2014-2019 Adopted: 5-13-2014 Revised: 7-3-2014 1. Introduction Pamplin is a nationally recognized, integral part of Virginia Tech the premier research university
XIAOKUI SHU. PERSONAL INFORMATION 2202 Kraft Drive http://xshu.net Blacksburg, VA 24060
XIAOKUI SHU PERSONAL INFORMATION 2202 Kraft Drive http://xshu.net Blacksburg, VA 24060 [email protected] RESEARCH INTERESTS Anomaly detection in systems and networks e.g., program execution modeling, event
COS 140: Foundations of Computer Science
COS 140: Foundations of C S What is C S? Fall 2015 Copyright c 2002 2015 UMaine School of Computing and Information S 1 / 15 What is C S? What do you think? Adefinition CS and programming Areas of CS What
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
San Diego State University Strategic Plan: Economic Development Working Group Report. Introduction
San Diego State University Strategic Plan: Economic Development Working Group Report Introduction By celebrating and expanding existing partnerships among all SDSU s service communities, and continuing
The USNA Cyber Program
The USNA Cyber Program Turning Midshipmen into Cyber Warriors CAPT Paul Tortora, USN Director, Center for Cyber Security Studies Bottom Line Up Front All Midshipmen now take two Cyber Security Courses
The Impact of American University on the District of Columbia Economy. Research Summary
The Impact of American University on the District of Columbia Economy Research Summary Prepared for The Consortium of Universities of the Washington Area By Stephen S. Fuller, Ph.D. Dwight Schar Faculty
Nursing Leadership from the Bedside to the Boardroom. Presentation ID: L13
Nursing Leadership from the Bedside to the Boardroom Presentation ID: L13 Disclosure Today s presenters do not have any relevant financial interests presenting a conflict of interest to disclose. Participants
Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology
Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois
UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW
UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW John C. Knight, Jane C. Prey, & Wm. A. Wulf Department of Computer Science University of Virginia Charlottesville, VA 22903
STEM Skills for All: Designing Data Science Programs through Business and Higher Education Collaboration. SENCER 2015 Summer Institute
STEM Skills for All: Designing Data Science Programs through Business and Higher Education Collaboration SENCER 2015 Summer Institute Worcester Polytechnic Institute 2015 BHEF Overview The session will
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
Master of Cyber Security
Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides
Korey E. Kahler Faculty Vita (September 1, 2008 - August 31, 2013)
Korey E. Kahler Faculty Vita (September 1, 2008 - August 31, 2013) Department: Computer Science Rank: Lecturer Qualification Status: Other Tenure Status: Non-Tenure Track EDUCATION MS, 2009. Institution:
Frequently Asked Questions about the New Cornell College of Business Undergraduate Programs
Frequently Asked Questions about the New Cornell College of Business Undergraduate Programs Acronyms AEM: The Dyson School of Applied Economics and Management CALS: College of Agriculture and Life Sciences
2015-16 www.cs.purdue.edu. Courtesy Voicu Popescu
2015-16 www.cs.purdue.edu Courtesy Voicu Popescu 1 Lawson Computer Science Building 2 Lawson Commons The Lawson building was developed with multiple spaces 3 designed to foster collaboration and dialogue.
UTSA Computer Science MS Degree Program
UTSA Computer Science MS Degree Program Weining Zhang Outline General information Admission conditions Transfer credits Program options Courses & Comprehensive exam Academic Status Financial Aids Ph. D.
Computer Science Strategic Plan: 2010-2013
Computer Science Strategic Plan: 2010-2013 Goals: GOAL 1: Attract, retain, and support a world-class and diverse faculty, staff, and student population. Maintain the size and quality of the undergraduate
Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach
Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University
BHEF s National Higher Education and Workforce Initiative
BHEF s National Higher Education and Workforce Initiative Debbie Hughes Sr. Director of Higher Education & Workforce September 30, 2015 2015 BHEF About the Business-Higher Education Forum BHEF is a member
An Assessment of the Proposal. To Create a Department of Engineering. At Indiana University Bloomington
1 An Assessment of the Proposal To Create a Department of Engineering At Indiana University Bloomington Anita Jones, University Professor Emerita, University of Virginia Eric Grimson, Chancellor, Massachusetts
Exploring a National Cyber Security Exercise for Community Colleges
Exploring a National Cyber Security Exercise for Community Colleges Casey W. O'Brien Co-PI, CyberWatch Center Community College of Baltimore County Baltimore, Maryland :: CyberWatch :: Current Cyber Exercise
Guidelines on Allowable Project Costs
Guidelines on Allowable Project Costs 2013/2014 LIST OF CONTENTS 1. INTRODUCTION 3 2. BUDGET CATEGORIES 5 2.1 HUMAN RESOURCES 5 2.2 RUNNING COSTS (DIRECT COSTS) 7 2.3 OVERHEADS (INDIRECT COSTS) 8 2.4 CAPEX
Deborah L. Dunn Faculty Vita (September 1, 2008 - August 31, 2013)
Deborah L. Dunn Faculty Vita (September 1, 2008 - August 31, 2013) Department: Computer Science Rank: Professor Qualification Status: AQ Tenure Status: Tenured EDUCATION PHD, 1995. Institution: Texas A&M
College of Medicine Promotion and Tenure Procedure FLORIDA ATLANTIC UNIVERSITY
College of Medicine Promotion and Tenure Procedure FLORIDA ATLANTIC UNIVERSITY Approved by majority vote of College Faculty March 25, 2014 Table of Contents Introduction... 1 Governance... 1 a. Membership...
National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development
National Higher Education & Workforce Initiative Regional Economic Growth Through High skill, High demand Workforce Development 2015 Virginia Summit on Higher Education and Economic Competitiveness Brian
Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013
Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 [email protected] Summary Curriculum Vitae Employment I am a professor at the University
REQUIREMENTS for the Ph.D. DEGREE IN CHEMISTRY
REQUIREMENTS for the Ph.D. DEGREE IN CHEMISTRY This document describes the required steps to obtain the Ph.D. degree in Chemistry. Formal coursework advances the studentʼs general knowledge and develops
Cybersecurity Education
Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
J. MICHAEL CUMMINS 735 Orchard Point Dunwoody, Georgia 30350. GEORGIA INSTITUTE OF TECHNOLOGY Dupree College of Management Atlanta, GA
J. MICHAEL CUMMINS 735 Orchard Point Dunwoody, Georgia 30350 Phone: (404) 385-2658 Fax: (404) 984-6030 [email protected] July 2001 Present GEORGIA INSTITUTE OF TECHNOLOGY Dupree College of Management
How To Write A Research Proposal For An Erc Grant
ERC Starting Grant 2014 Research proposal (Part B1 and Part B2) Version 1.0 11 December 2013 Disclaimer This document is aimed at informing potential applicants for Horizon 2020 funding. It serves only
The Arts at Virginia Tech
The Arts at Virginia Tech Strategic Directions and Opportunities Submitted to the Offices of the President and Senior Vice President and Provost by the Chair of the Arts Strategic Planning Team Paul Knox
Engineering, Technology and Project Management (ETPM) Area D-LITE. (D- Digital, L-Leadership, I- Innovation, T- Technology, E-Entrepreneurship) VALUE
Engineering, Technology and Project Management (ETPM) Area D-LITE (D- Digital, L-Leadership, I- Innovation, T- Technology, E-Entrepreneurship) NITIE Via ETPM Area The success of organizations is increasingly
MASTER S VS. PH.D. WHICH ONE TO CHOOSE? HOW FAR TO GO? A.J. Brush, Microsoft Research Rita H. Wouhaybi, Intel Labs
MASTER S VS. PH.D. WHICH ONE TO CHOOSE? HOW FAR TO GO? A.J. Brush, Microsoft Research Rita H. Wouhaybi, Intel Labs Revisi:ng Choices Nearing the end of your first year in either a Ph.D. or MS program,
1. Could you describe your department in terms of the undergraduate and graduate programs offered?
1. Could you describe your department in terms of the undergraduate and graduate programs offered? The Information Systems and Business Analytics Department offers degree programs at the undergraduate
National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development
National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development Corby Hovis [email protected] Directorate for Education and Human Resources National Science Foundation
SEO Career Program Our mission: Preparing young people of color to lead by example in their families, communities and careers
Sponsors for Educational Opportunity SEO Career Program Our mission: Preparing young people of color to lead by example in their families, communities and careers SEO Career Program A gateway for students
Innovations in Graduate Education 1
Innovations in Graduate Education 1 New Brunswick Strategic Plan Proposal: RU FIT: GRAD: A New Program for Innovations in Graduate Education Across the Disciplines Contact information: Eileen Kowler, Distinguished
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Computer Science & Engineering Department. Robert McCartney Director of Undergraduate Computing Education ITE 239 860-486-5232 [email protected].
Computer Science & Engineering Department Robert McCartney Director of Undergraduate Computing Education ITE 239 860-486-5232 [email protected] The Tower and the Glass Balls Given a tower of N floors,
Building Future Leaders
Building Future Leaders Select AIA Component Leadership Programs AIA components across the United States have recently launched a number of leadership curricula to strengthen their local governance and
AT&T Cybersecurity Policy Overview
AT&T Cybersecurity Policy Overview Chris Boyer AVP Public Policy July 24, 2012 2011 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks
UNIVERSITY GLOBAL PARTNERSHIP NETWORK. NC State University
UNIVERSITY GLOBAL PARTNERSHIP NETWORK NC State University North Carolina State University A Land-Grant university Established in 1887 North Carolina The Triangle DURHAM Duke University RESEARCH TRIANGLE
The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013
The University of Alabama at Birmingham Information Technology Strategic Plan 2011 2013 Table of Contents Message from the Vice President... 3 About UAB... 4 About UAB Information Technology Meeting needs
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Advanced Cybersecurity Experience for Students (ACES) Program
Advanced Cybersecurity Experience for Students (ACES) Program Michel Cukier Director, ACES Associate Director for Education, MC2 Michael Hicks Director, MC2 ACES in (Almost) One Sentence ACES is an intensive
U n i v e r s i t y o f S a n D i e g o. universit y of san diego / Engineering Programs Engineering
U n i v e r s i t y o f S a n D i e g o universit y of san diego / Engineering Programs Engineering 3 We measure our success by our students success. USD is the only school in the country where all engineering
DEVELOPMENT OF A NEW M.S. DEGREE IN ENGINEERING MANAGEMENT
DEVELOPMENT OF A NEW M.S. DEGREE IN ENGINEERING MANAGEMENT David Bowen, Farnaz Ganjeizadah, Saeid Motavalli, Helen Zong California State University, East Bay [email protected] Abstract The objective
MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman [email protected]
MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman [email protected] Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by
LaChelle Wilborn. College of Business - MSC 0205 Harrisonburg, VA 22802 Harrisonburg, VA 22807 (540) 574-2625
LaChelle Wilborn Official Address: Current Address: James Madison University 1125 Bluebird Court College of Business - MSC 0205 Harrisonburg, VA 22802 Harrisonburg, VA 22807 (540) 574-2625 Phone: (540)
