Skip directly to content

Minimize RSR Award Detail

Research Spending & Results

Award Detail

Awardee:IOWA STATE UNIVERSITY OF SCIENCE AND TECHNOLOGY
Doing Business As Name:Iowa State University
PD/PI:
  • Douglas W Jacobson
  • (515) 294-8307
  • dougj@iastate.edu
Award Date:08/25/2005
Estimated Total Award Amount: $ 300,000
Funds Obligated to Date: $ 300,000
  • FY 2009=$60,000
  • FY 2007=$60,000
  • FY 2008=$60,000
  • FY 2005=$120,000
Start Date:09/01/2005
End Date:08/31/2011
Transaction Type:Grant
Agency:NSF
Awarding Agency Code:4900
Funding Agency Code:4900
CFDA Number:47.041
Primary Program Source:490100 NSF RESEARCH & RELATED ACTIVIT
Award Title or Description:Collaborative Proposal: I/UCRC: Center for Information Protection (CIP)
Federal Award ID Number:0540362
DUNS ID:005309844
Parent DUNS ID:005309844
Program:IUCRC-Indust-Univ Coop Res Ctr

Awardee Location

Street:1138 Pearson
City:AMES
State:IA
ZIP:50011-2207
County:Ames
Country:US
Awardee Cong. District:04

Primary Place of Performance

Organization Name:Iowa State University
Street:1138 Pearson
City:AMES
State:IA
ZIP:50011-2207
County:Ames
Country:US
Cong. District:04

Abstract at Time of Award

Iowa State University and the New Jersey Institute of Technology have joined to develop the Industry/University Cooperative Research Center for Information Protection. The primary research focus of this project is Information Assurance, commonly defined by the four main goals of security, namely, "Confidentiality, Integrity, Availability, and Policy". The goals of the Center are to assist industry in its internal research and development by partnering industrial and faculty researchers; improve the training and education of employees in Information Assurance; provide a common repository for all CIP members that contains information assurance research results, relevant literature, and other resources that can be shared within the membership; review, improve, and model specific protection architectures tailored to security problems present in critical infrastructure industries; and provide a well trained pool of students.

Publications Produced as a Result of this Research

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Uphoff, B. and Wong, J. "An Agent-Based Framework for Intrusion Detection Alert Verification and Event Correlation" The International Journal of Security and Networks, v.3, 2008, p.193.

Vinod Shukla and Daji Qiao "A Robust Statistical Scheme to Monitor Transient Phenomenon in Sensor Networks" IEEE ICC'07, Glasgow, Scotland, UK, June 24, v.28, , p.2007.

Jianming Zhou, Wensheng Zhang, and Daji Qiao "Protecting Storage Location Privacy in Sensor Networks" International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine) , Vancouver, British Columbia, Canada, August 2007, v., 2007, p..

Natalia Stakhanova, Chris Strasburg, Samik Basu and Johnny Wong "On Evaluation of Response Cost for Intrusion Response Systems" RAID '08: Proceedings of the 11th international symposium on Recent Advances, v.5230, 2008, p.390.

C. Busch, R. LaFortune and Sikanta Tirhapura "Improves Slparse covers for Graphs Excluding a Fixed Minor" Proc. ACM Conference on Principles of Distributed Computing, v., 2007, p.?.

Natalia Stakhanova, Samik Basu, WenSheng Zhang, Xia Wang and Johnny Wong "Specification Synthesis for Monitoring and Analysis of MANET Protocols" International Symposium on Frontiers in Networking with Applications (FINA) 2007, Niagara Falls, Canada, IEEE, v., 2007, p.183.

Natalia Stakhanova, Samik Basu, and Johnny Wong "A Cost-Sensitive Model for Preemptive Intrusion Response Systems" IEEE 21st Conference on Advanced Information Networking and Applications (AINA-07), Niagara Falls, Canada, v., 2007, p.428.

Wang, X., Wong, J., Zhang, W. "A heterogeneity-aware framework for group key management in wireless mesh networks" proceeding of the Fourth International Conference on Security and Privacy in Communication Networks, v., 2008, p..

J. Sathre and Joe Zambreno "Rollback and Huddle: Architectural Support for Trustworthy Application Replay" Proceedings of the Workshop on Embedded Software Security (WESS), October 2007, v., 2007, p..

R. Gerdes, T. E. Daniels, M. Mina, and S. Russell "Device identification via analog signal fingerprinting: A matched filter approach" Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 06)), San Diego, California,Feb 2006, v., 2006, p.?.

G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, Y. Wang, X. Wang and N. Stakhanova "Software Fault Tree and Colored Petri Net Based Specification, Design, and Implementation of Agent-Based Intrusion Detection Systems" International Journal of Information and Computer Security, Vol. 1., No. 1/2, 2007, v.1, 2007, p.?.

Srikanta Tirthapura and Bojian Xu and Costas Busch "Sketching Asynchronous Streams over Sliding Windows" Appeared in Proc. ACM Conference on Principles of Distributed Computing (PODC), v., 2006, p.?.

Vinod Shukla and Daji Qiao, "Data Transcience from False Injection in Sensor Networks" IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), San Diego, CA, v., 2007, p..

Mahantesh Hosamani, Harish Narayanappa, and Hridesh Rajan "How to Trust Web Services Monitor Executing in an Untrusted Environment?" NWeSP '07: 3rd International Conference on Next Generation Web Services Practices, Seoul, Korea, Oct 2007, v., 2007, p..

A. Pande, J. Zambreno "An Efficient Hardware Architecture for Multimedia Encryption and Authentication using the Discrete Wavelet Transform" Proceedings of IEEE Symposium on VLSI (ISVLSI), 2009, v., 2009, p..

X. Wang "Intrusion Detection in Wireless Ad-hoc Networks" 30th Annual International Computer Software and Applications Conference (COMPSAC06) doctorial symposium, Chicago, Sep., 2006, v., 2006, p.?.

Mahantesh Hosamani, Harish Narayanappa, Hridesh Rajan "Monitoring the Monitor: An Approach Towards Trustworthiness in Service Oriented Architecture" In 2nd International Workshop on Service Oriented Software Engineering (IW-SOSWE 2007), v., 2007, p..

Stakhanova, N., Basu, S. and Wong "A Taxonomy of Intrusion Response Systems" The International Journal of Information and Computer Security, v.1 (1/2), 2007, p.169.

For specific questions or comments about this information including the NSF Project Outcomes Report, contact us.