Algorithms
Algorithms for computer science and complexity theory, logic in computer science, optimization, systems and database principles.
Algorithms for computer science and complexity theory, logic in computer science, optimization, systems and database principles.
Attribution
Methods for producing standardized and transparent attribution that overcomes concerns about credibility and helps hold actors accountable for malicious activity.
Methods for producing standardized and transparent attribution that overcomes concerns about credibility and helps hold actors accountable for malicious activity.
Cloud Security
Threats and security controls possible at each level of abstraction; cloud management services for trustworthy, secure, and resilient operations
Threats and security controls possible at each level of abstraction; cloud management services for trustworthy, secure, and resilient operations
Communication Systems
Communications networks for voice, data, video and command-and-control purposes, and the components that form an integrated whole
Communications networks for voice, data, video and command-and-control purposes, and the components that form an integrated whole
Computer Engineering, Architecture & Design
Design methodology, including circuitry, processor design, shared and distributed memory, parallelism, multiprocessors, multiple CPU systems and more.
Design methodology, including circuitry, processor design, shared and distributed memory, parallelism, multiprocessors, multiple CPU systems and more.
Cyber-Physical Systems
Engineered systems that are built from, and depend upon, the seamless integration of embedded computers and networks that monitor or control a physical process.
Engineered systems that are built from, and depend upon, the seamless integration of embedded computers and networks that monitor or control a physical process.
Data Mining & Analytics
Discovery of patterns in large data sets, involving methods that support machine learning, statistics, and optimized database systems.
Discovery of patterns in large data sets, involving methods that support machine learning, statistics, and optimized database systems.
Data Security & Privacy
Data storage, processing, and transfer; practical approaches to secure management of personal or sensitive information in transit and at rest
Data storage, processing, and transfer; practical approaches to secure management of personal or sensitive information in transit and at rest
Defense / National Security
Technologies that secure, defend, and respond to threats within our country’s public or proprietary information, distribution, and network systems.
Technologies that secure, defend, and respond to threats within our country’s public or proprietary information, distribution, and network systems.
Encryption
Conversion of electronic data or information into a code which cannot be easily understood by anyone except the intended, authorized parties.
Conversion of electronic data or information into a code which cannot be easily understood by anyone except the intended, authorized parties.
Healthcare Security
The integrity of electronic health data to improve or predict health outcomes and prevent unauthorized access to patient data
The integrity of electronic health data to improve or predict health outcomes and prevent unauthorized access to patient data
Incident Management
Effective deterrence and response to security-related incidents affecting individual users or an organization
Effective deterrence and response to security-related incidents affecting individual users or an organization
Internet Infrastructure & Operating Systems
Physical hardware, transmission media, and software used to interconnect computers and reliably transmit data on the internet.
Physical hardware, transmission media, and software used to interconnect computers and reliably transmit data on the internet.
IT Economics
Costs and benefits surrounding IT asset management, including business models, network economics, management and diffusion of IT products, and product pricing.
Costs and benefits surrounding IT asset management, including business models, network economics, management and diffusion of IT products, and product pricing.
Large-Scale or Distributed Systems
Optimization and evolution of loosely coupled, interconnected processors designed to power an application or service.
Optimization and evolution of loosely coupled, interconnected processors designed to power an application or service.
Machine Learning
Securing data and processes that allow computers to act or predict without being explicitly programmed, such as the integrity of artificial intelligence (AI) that automates search results or predictive outcomes.
Securing data and processes that allow computers to act or predict without being explicitly programmed, such as the integrity of artificial intelligence (AI) that automates search results or predictive outcomes.
Mobile & Wireless Communications
Secure transmission of data, voice and video via a computer or any other wireless enabled device without a fixed physical link.
Secure transmission of data, voice and video via a computer or any other wireless enabled device without a fixed physical link.
Modeling & Simulation
Physical, mathematical, or logical representations of a system in order to understand its behavior before implementing the system in the real world.
Physical, mathematical, or logical representations of a system in order to understand its behavior before implementing the system in the real world.
Network Security
Technologies and best practices to protect system infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure.
Technologies and best practices to protect system infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure.
Policy
Recommendations and the evaluation of agreements, laws, and cultural norms that guard data in transit and at rest.
Recommendations and the evaluation of agreements, laws, and cultural norms that guard data in transit and at rest.
Programming Languages & Correctness
Vocabulary and grammatical rules used to instruct a computer or computing device to perform specific tasks, testing and evaluating the capability of a program or system to meet its required results.
Vocabulary and grammatical rules used to instruct a computer or computing device to perform specific tasks, testing and evaluating the capability of a program or system to meet its required results.
Risk Management
Technical solutions to mitigate cyber risks for organizations, management of such technical solutions, countermeasures, policies and procedures to deter cyberattack.
Technical solutions to mitigate cyber risks for organizations, management of such technical solutions, countermeasures, policies and procedures to deter cyberattack.
Software & Applications
Security of, and creation, of application programs that perform a group of coordinated functions, tasks, or activities for the benefit of the user
Security of, and creation, of application programs that perform a group of coordinated functions, tasks, or activities for the benefit of the user
Systems Security
Processes and methodologies involved with keeping information confidential and available, including the access controls that prevent unauthorized access or leakage.
Processes and methodologies involved with keeping information confidential and available, including the access controls that prevent unauthorized access or leakage.
Threat Intelligence
Evidence-based knowledge about existing or emerging cyberthreats that can be used to inform decisions regarding an organizational response.
Evidence-based knowledge about existing or emerging cyberthreats that can be used to inform decisions regarding an organizational response.
Trust
Competence of a machine or sensor to act dependably, securely and reliably within a specified context using cryptography, digital signatures, and electronic certificates as well as the identity management of non-human (machine) participants that interact with a device.
Competence of a machine or sensor to act dependably, securely and reliably within a specified context using cryptography, digital signatures, and electronic certificates as well as the identity management of non-human (machine) participants that interact with a device.