Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
The following tables provide links to all the projects that the Institute has sponsored in its eight-year history, including those on emergency‐response technologies, bio/chem terrorism, law enforcement, and large‐scale cyber exercises.
|
Project Name
|
End Date
|
|---|---|
| TOPOFF 2 Cybersecurity Exercise | 08/31/03 |
| TOPOFF 3 Cybersecurity Exercise | 03/31/05 |
| Livewire Cyber Exercise | 05/01/04 |
| Network Simulation Software for Cyber Exercises | 10/31/04 |
| Network Simulation Software for Cyber Exercises | 10/31/05 |
| The Role of Social Networks in Organizational Learning during a Cyber-Crisis: Evidence from the LIVEWIRE Simulation | 10/31/05 |
|
Project Name
|
End Date
|
|---|---|
| Secure the Railway IT Infrastructure | 03/31/10 |
| MetroSense: Scalable Secure Sensor Systems (4S) | 03/31/10 |
| Public-Key Infrastructure Project (PKI) | 06/30/09 |
| Information Technology in Healthcare | 12/31/08 |
| Understanding and Quantifying the Economic Impact of Security Failures and Defense Strategies | 12/07/07 |
| Behavioral Fingerprinting of Wireless Devices | 08/31/07 |
| Algorithms for High-Assurance in Cyber-Security | 10/30/07 |
| Infrastructure Web | 09/30/03 |
| Gigabit Monitoring | 09/30/01 |
| Statistically Based Network Intrusion Detection | 11/30/01 |
| Data Mining for Detection of Network Intrusions | 09/30/03 |
| Jeanne-MRP | 12/31/02 |
| Semantic Hacking | 09/30/03 |
| Public Key Infrastructure and Trust - Information Security | 07/31/05 |
| Anomaly Detection Based on User Mobility Patterns | 08/31/06 |
| Cross-layer Peer-to-Peer Multimedia Attacks | 08/31/06 |
|
Project Name
|
End Date
|
|---|---|
| Business Rationale for Cyber Security | 07/31/09 |
| Human Behavior, Insider Threat and Awareness | 07/31/09 |
| Security Incentives through Risk Pricing | 03/31/09 |
| Technology for Trust |
01/22/08 |
| Project 1: Understanding the Role of Trust in Internet Exchange | |
| Project 2: Enhancing Trust Through Information Sharing in the Extended Enterprise (EnTISE) | |
| Project 3: Extensions to Automated Trust Negotiation | |
| Project 4: Tiny Trusted Third Parties (T3P) | |
| Project 5: Usable High-Assurance Operating Systems | |
| Project 6: Communicating Trust Assertions (Greenpass) | |
| Secure Digital Medium | 06/30/04 |
| Microelectromechanical Systems (MEMS) for Infosecurity | 08/31/06 |
| Trustworthy Negotiation | 06/15/06 |
|
Project Name
|
End Date
|
|---|---|
| Emergent Threat Assessment | 02/28/01 |
| Emerging Technology Conference - Neuroscience | 07/01/02 |