Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Grant Summary - 2016

Recipient

Title

Award Amount

American National Standards Institute

Secretariat for ISO/IEC JTC 1/SC 37, Biometrics, and ISO/IEC JTC 1/WG 4, Technical Implementation of biometric systems

75,695

AZ Board of Regents on behalf of Arizona State University

CPS Timing Testbed: Testing the Timing

200,000

Carnegie Mellon University

Smart and Connected Systems

208,873

Center for Civic Design

The next generation of accessible voting: An investigation of how to support voters from the polling place to anywhere voting

84,990

Colorado State University

Secure Communication and Access Control in Isolated Runtime Environments in Linux

80,094

Colorado State University

Health Information Protection using Attribute-Based Access Control

150,858

Corporation for National Research Initiatives

Research and Develop Data Type Records Specification with International Collaboration

173,754

Culture Catalyst

Developing an Understanding of Cybersecurity knowledge and Beliefs: Addressing the Cybersecurity Gap

151,197

George Mason University

A Three-level Graph Based Model for Forensic Analysis on Planned Missions

60,000

George Mason University

DDoS Detection and Mitigation via Programmable SDN Traffic Measurement

100,000

George Mason University

Towards Measuring Security for IoT

473,632

George Mason University

Securing Cloud Infrastructure through Quantitative Threat Models and Optimization

50,316

Internet Keep Safe Coalition (iKeepSafe)

National K12 Cyber Security Education Conference

748,587

Michigan State University

On the Sufficiency of Information Content in Latent Fingerprints

100,000

The National Academies of Science, Engineering, and Medicine

Forum on Cyber Resilience

60,000

Penn State University

Actionable Mission Impact Analysis in Cloud Computing Context

49,998

Regents of the University of Michigan

Coexistence Evaluation of Zigbee and Wifi for Smart Manufacturing

50,000

Rochester Institute of Technology

Design for Fault Attack Resiliency of Lightweight Cryptographic Architectures for Deeply-Embedded Systems

280,289

Rochester Institute of Technology/Florida Atlantic Univ

Efficient Algorithms and Architectures for Post-Quantum Cryptography

487,064

Texas State University

Achieving Fingerprint Level Performance with Eye Movement-based Biometrics

200,000

The George Washington University

High Performance Computing for Big Data

99,992

The Greystone Group Inc.

Applying HFE to EHRs to mitigate critical inpatient rounds related workflow associated safety concerns 

73,576

The Greystone Group Inc.

Developing consensus Health IT Guidance across Industries, Sectors and Stakeholders

49,908

The National Academies of Science, Engineering, and Medicine

Support for the Core Research Activities and Studies of the Computer Science and Telecommunications Board

90,000

The National Academies of Science, Engineering, and Medicine

Forum on Cyber Resilience

60,000

The University of Alabama in Huntsville

Support for the National Cyber Summit in promotion of cybersecurity awareness, training, and education 

60,000

The University of Texas at Dallas

Biometric Identity Signals from Biological Motion

50,668

Theiss Research 

Classical Processing for Quantum information

254,341

Theiss Research

Algorithms for Image and Shape Analysis in 3d

557,377

University Enterprises Corporation at CSUSB

Cyber Security Centers of Academic Excellence (CAE) Community Meeting, Education and Awareness

1,546,402

University of Arizona

Resilient Cloud Services (RCS): Design, Analysis and Deployment

50,000

University of Arkansas

Access Control for Distributed Systems with ACPT (Access Control Policy Tool) Adaption 

49,999

University of Chile

ClCRT Random Beacon and its application to Randomness-Verifiable Systems

192,595

University of Florida

Data Science for Multimodal Plant Identification Task

50,000

University of Florida

Utilizing NIST Entropy as a Service and Chaotic Circuits for Management of Electronics Supply Chain

497,375

University of Maryland

New Theory and Resilience Metrics for Systems-of-Systems

457,288

University of Maryland

In-situ visualization for Immersive Environments

500,000

University of Maryland

Assessing the Predictive Potential of the Cyber Risk Portal: Phase 2

398,909

University of Maryland

Model-Based Design for High Performance Image Processing

282,778

University of Michigan

Enhancing resilience of industrial control systems through hybrid processes

201,921

University of New Hampshire

Technical Proposal for IEC 61850-9-3 Utility Profile and IEEE 1588 Power Profile Testing Program, Test Specification Collaboration

96,121

University of New Hampshire

Securing IEEE 1588 Timing for the Smart Grid

91,005

University of Waterloo

Design and Attack-Resistance Analysis of Lightweight Cryptographic Algorithms and Protocols

465,732

University of Wollongong

On the Structure of Lattices for Post-Quantum Cryptography

293,693

 

Updated 10/3/16

 

Contacts

Created September 30, 2016, Updated November 15, 2019