Skip to main content

Home


Find us on

facebook youtube flickr twitter itunes u logo

 

 

Upcoming Events

RIOTS logo 

Professor Sean Smith, Director of the ISTS and Bill Nisen, Associate Director, will be speaking at the

School House residential cluster on the Internet of Risky Things  - February 21, 2017, 5:30 PM

GenCyber Logo 

GenCyber 2017- ISTS - High School Summer Program at Dartmouth College

End of June 2017 - 9am to 3pm (Exact times and dates to be confirmed once funding has been secured)

 ISTS logo

Securing the e-Campus 2017 - Pre-conference Workshops mid-July; Conference mid-July 2017.

(Exact time and dates to be confirmed)


Recent Talks
  

Craig Smith

 

 

 

You Don't Own Your Car
Craig Smith
OpenGarages
Tuesday May 10, 2016 
Carson L02 @4:15

David Safford

 

Hardware Based Security for GE's Industrial Control Systems
David Safford
GE Global Research
Tuesday May 17, 2016
Carson L02 @4:15

 

DanTentler

"It's Fine," They Said. "Just Ship It," They Said.
Dan Tentler
The Phobos Group
Tuesday April 12, 2016 
Carson L02 @4:15

Harold Thimbleby

 

 

 

The Best Way to Improve Healthcare is to Improve Computers
Harold Thimbleby
Swansea University
April 23, 2015

Craig Shue

 

 

 

Managing User-Level Compromises in Enterprise Network
Craig Shue
Worcester Polytechnic Institute
March 31, 2015

 

Newsletter 

Oct news 2015

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeProjects >

Past Projects

The following tables provide links to all the projects that the Institute has sponsored in its eight-year history, including those on emergency‐response technologies, bio/chem terrorism, law enforcement, and large‐scale cyber exercises.

Chemical and Biological

Project Name
End Date
After-the-fact radiation dosimetry from inanimate objects (EPR) 12/31/06
Enabling Technology for Deployment of Biological Nerve Agent Detoxification Catalysts 07/01/04
Nano-optics for Matched Spectroscopy of Hazardous Materials (NOMS) 02/28/07
Removal of Toxins and Pathogens using Human Monoclonal and Bispecific Antibodies 08/31/05

Computer Network Research

Project Name
End Date
Discovery of Trends in Activity-Aware Computing Environments 12/31/08
Measure, Analyze, Protect: Security Through Measurement for Wireless LANs 06/30/08
Digital Living: Understanding PLACE - Privacy in Location-Aware Computing Environments 12/31/07
Wireless Mobile Networking for Cyberassurance 07/31/03
System Security Evaluation Testbed 06/30/02
Wireless Network Analysis and Protection 06/30/03
System Security Evaluation (Kernel) 08/31/06
System Security Evaluation (Modeling) 08/31/06
Wireless Security for First Responders and Sensor Networks 07/31/04
DIST Visualization Experiments (DIST-Vis) 12/31/01

Cyber Security Exercises

Project Name
End Date
TOPOFF 2 Cybersecurity Exercise 08/31/03
TOPOFF 3 Cybersecurity Exercise 03/31/05
Livewire Cyber Exercise 05/01/04
Network Simulation Software for Cyber Exercises 10/31/04
Network Simulation Software for Cyber Exercises 10/31/05
The Role of Social Networks in Organizational Learning during a Cyber-Crisis: Evidence from the LIVEWIRE Simulation 10/31/05

Cyber Security Research

Project Name
End Date
Secure the Railway IT Infrastructure 03/31/10
MetroSense: Scalable Secure Sensor Systems (4S) 03/31/10
Public-Key Infrastructure Project (PKI) 06/30/09
Information Technology in Healthcare 12/31/08
Understanding and Quantifying the Economic Impact of Security Failures and Defense Strategies 12/07/07
Behavioral Fingerprinting of Wireless Devices 08/31/07
Algorithms for High-Assurance in Cyber-Security 10/30/07
Infrastructure Web 09/30/03
Gigabit Monitoring 09/30/01
Statistically Based Network Intrusion Detection 11/30/01
Data Mining for Detection of Network Intrusions 09/30/03
Jeanne-MRP 12/31/02
Semantic Hacking 09/30/03
Public Key Infrastructure and Trust - Information Security 07/31/05
Anomaly Detection Based on User Mobility Patterns 08/31/06
Cross-layer Peer-to-Peer Multimedia Attacks 08/31/06

Cyber Security Tools

Project Name
End Date
Digital Video Forensics (DVF) 09/30/09
Digital Image Forensics 12/31/07
Monitoring and Diagnosing SCADA Systems 06/05/07
Integrating Self-Awareness and Self-Healing Systems (SASH) 09/30/06
Detection of Digital Tampering 03/31/03
Assessing and Mining of Data from Network Sensors 10/01/03
Security Database with Vulnerability Scanner 01/01/04
ISTS Top Ten Certification Effort 01/01/03
Advanced Packet Vault 03/31/02
Steganography 03/31/02
Immunological Approaches to Intrusion, Detection and Response 10/31/03
Techniques for Modeling and Visualizing Internet Attacks 10/31/03
Shadow Intrusion and Network Analysis 12/01/03
User Mode Linux (UML) / Honeynet 12/01/03
Internet Health Monitoring System and Data Archive 06/30/01
BGP Archive and Analysis 06/30/01
Detection of Tampering with Computer Executables 04/30/04
Digital Evidence Retrieval 04/30/04
Windows 2000 Forensics 12/31/01
High Speed Network Monitoring and Analysis Technology 06/01/02
Recovery of Information from Erased Magnetic Medium 01/31/02
Software System Protection 03/31/03
COTS Evaluation and Certification Effort 12/31/03
Network and Computer Forensics 12/31/03
Distributed Intrusion Detection and Correlation 09/30/03
Internet Control Message Protocol (ICMP) Unreachable Message Metering 09/30/03
Network Risk Analysis (Q-RAN) 09/30/03
Transparent IDS Bridge 01/01/04
Digital Tampering & Secrets 08/31/06
The Kerf Toolkit for Instrusion Analysis 08/31/06
Analysis of the Data-Collection Capabilities of a Large-Scale, Distributed HoneyPot 08/31/06
Process Query Systems for Homeland Security 08/31/06

Cyber Trust Research

Project Name
End Date
Business Rationale for Cyber Security 07/31/09
Human Behavior, Insider Threat and Awareness 07/31/09
Security Incentives through Risk Pricing 03/31/09
Technology for Trust
01/22/08
Project 1: Understanding the Role of Trust in Internet Exchange  
Project 2: Enhancing Trust Through Information Sharing in the Extended Enterprise (EnTISE)  
Project 3: Extensions to Automated Trust Negotiation  
Project 4: Tiny Trusted Third Parties (T3P)  
Project 5: Usable High-Assurance Operating Systems  
Project 6: Communicating Trust Assertions (Greenpass)  
Secure Digital Medium 06/30/04
Microelectromechanical Systems (MEMS) for Infosecurity 08/31/06
Trustworthy Negotiation 06/15/06

Education and Preparedness

Project Name
End Date
Secure Information Systems Mentoring and Training (SISMAT) 09/30/10
Business Education for the Security Professional (BESP) 05/16/08
Japanese Cybersecurity Training 03/31/05
Interactive Virtual Socratic Dialogue – Cyberterrorism: Regional and Local Response 12/31/02
Advanced Distributed Learning (ADL) 12/31/03
Virtual Terrorism Response Academy - Interactive Media Laboratory (IML) 12/31/05
InterAgency Board (IAB) Interoperability Sub-group Meeting 02/28/06

Emerging Threats

Project Name
End Date
Emergent Threat Assessment 02/28/01
Emerging Technology Conference - Neuroscience 07/01/02

First Responder Technologies

Project Name
End Date
Reconfigurable Wireless Sensor Webs 04/30/04
ICMS (Incident Command Management Software) Test Bed, Technical Rational and Approach 06/30/02
Crisis Information Management Software (CIMS): Assessing the Status of Interoperability Solutions for Crisis Information Management Systems 10/31/04
An Integrated Approach to Communications, Automated Information Management, and Sensing for emergency and disaster response 08/31/06
Synthetic Environment for Emergency Response Simulation 05/01/06

Law Enforcement Resources

Project Name
End Date
E-Commerce Security Resource 04/30/03
Daily Intelligence Briefing 12/31/03
Wish List/Watch List 10/31/03
Security Informant 12/01/03
Law Enforcement Cybercrime/Terrorism Website 12/31/03
Law Enforcement Educational Training 12/31/03
Financial Forum 10/31/04
Analysis of the Jurisdictional Thresholds for Prosecuting Cyber Crimes in the United States at the State Level 10/31/04
Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment 10/31/04
Law Enforcement Tools and Technologies for Investigating Cyber Attacks: Gap Analysis Report 10/31/04
Law Enforcement Tools and Technologies for Investigating Cyber Attacks: National Research and Development Agenda 10/31/04
Prototype National Contact Index for Cyber Attack Investigators 10/31/04
TAG Cybercrime Summit 10/31/04

Technical Analysis and Policy

Project Name
End Date
E-Security Framework for World Bank  
Effects Based Operations for Information Assurance 03/31/03
Network and Computer Forensics 09/30/01
Compendium of Recent Counter-Terrorism Recommendations 09/16/01
Cyber Attacks During the War on Terrorism: A Predictive Analysis 09/22/01
Internet and Infrastructure Protection 12/31/02
Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States 10/31/04
Examining the Cyber Capabilities of Islamic Terrorist Groups 10/31/04

Last Updated: 10/7/15