Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

This page is no longer being updated and the information may be out of date.

Grant Summary - 2015

RecipientTitleAward Amount
AZ Board of Regents /Arizona State UniversityTestbed for Research and Development of Timing in Cyber-Physical Systems (CPS) $99,999
Center for Civic Design  Guidance for Election Systems: Research on Ways to Organize, Present, and Communicate $125,050
Cogscent, LLCMemory and Motor Processes of Password Entry Error $50,000
Colorado State UniversityAccess Control Management in Linux Environments$74,702
Computing Tech. Industry Association Inc.Cybersecurity Maps and Career Pathways$469,000
Cornell UniversitySuper Cloud: Deployment and Monitoring of Heterogeneous, Multi-Domain, and Federated Clouds$250,000
Corporation for National Research InitiativesEvolution of the Data Type Registry for Federal Use$279,527
Culture CatalystPrivacy and Security in the Cyber World: Understanding Development and Use$81,927
Culture Catalyst, LLCComplexity, Connection, and Constant Change: Recommendations for Cybersecurity Education Growing Out of User Experience and Perceptions$30,762 
Curators of the University of Missouri (Rolla)  Determining Security Threats Through Information Flow Analysis$199,457
Education ,Technology, Policy, Research, & Outreach, Inc.Strengthening Capacity in Cybersecurity: A National K-12 Cybersecurity Education Conference$138,480
Fundacion IMDEA SoftwareVerified Standards: SHA3$192,534
George Mason UniversityPost-Quantum Public Key Cryptosystems$499,998 
George Mason UniversitySecuring Cloud Infrastructure Through Improving Network Diversity and Moving Target Defense$50,017
George Mason UniversityUsing the Policy Machine to Enforce Access to Health Records$139,984
George Mason UniversityA Probabilistic Argumentation Based Forensics Framework$49,991
Georgia Tech Research CorporationStandardizing Botnet Enumeration$455,744
KU LeuvenCryptographically Secured Against Side-Channel Attacks and Fault Attacks by Means of Threshold Implementations$533,766
Michigan State UniversityOn the Sufficiency of Information Content in Latent Fingerprints$100,000
Texas State UniversityStandardization and Quality Assessment Methods for the Enhancement of the Eye Movement$100,000
The Greystone Group Inc.Determining the Evidence Base for Enhancements in Health IT Design $499,995 
The Greystone Group, IncInfectious Disease Critical Exception Handling by EHRs: Workflows to Support Situational Awareness of Clinical Users$150,000
The University of ChicagoAccelerating Access to Large Materials Datasets: Building, Deploying, and Operating a Materials Data Facility $1,799,981
The University of Texas at ArlingtonCombinatorial Testing for Big Data Software$375,624 
The University of Texas at DallasA Framework for Effective Software Testing Using Combinatorial Design and MC/DC Coverage$50,000
The University of Texas at DallasCombinatorial Branch Coverage: Metrics, Algorithms, and Case Studies$50,000
The University of Texas at DallasDesigning a Test For Forensic Facial Identification Experts$85,934
Trustees of Indiana UniversityImplications of Software Defined Systems for Big Data Reference Architectures$161,961
University Enterprises Corporation at CSUSBCyber Security Centers of Academic Excellence (CAE) Community Meeting, Education and Awareness$225,412
University Enterprises Corporation at CSUSBNationalInitiative for Cybersecurity Education (NICE) Challenge$349,085
University of CincinnatiBenchmark the Security and Performance Parameters for Post-Quantum Cryptography: Multivariate Public Key Cryptosystems$253,961 
University of EdinburghRigorous and Presentable Asymptotic for Special Functions and Orthogonal Polynomials$688,546
University of MarylandFinancial Entity Identification and Information Integration (FEIII) Challenge  $98,600
University of MarylandA Study on Using Silicon PUF as Entropy Source$99,982
University of MarylandProvable Security for Next-Generation Cryptography$1,097,937
University of MarylandComputer Simulations and Texture-Based Analysis Techniques to Enable Computer-Based Measurements with Application in Material Science and Biomedical Research$357,033
University of Maryland  Supporting Secure Mobile App Development$333,714
University of New Hampshire  IEC 61850-9-3 Utility Profile and IEEE 1588 Power Profile Testing Program, Test Specification Collaboration$89,368
University of WashingtonWhat value will Next Generation Sequencing (NGS) Brings to Complex DNA Mixture Interpretation?$496,616 

 

Contacts

Created April 25, 2016, Updated August 12, 2025
Was this page helpful?