Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
In this project we recognize that human experts will remain a critical part in the process of identifying, tracking and disabling computer attacks. We also recognize that an important part of the discovery, analysis and defense against new distribution attacks is the cooperation that occurs between experts across different organizations. We begin to develop an interactive, iterative toolkit for analyzing system logs to identify and document attacks.
This project was continued under the Kerf project.