Recipient |
Title |
Award Amount |
American National Standards Institute |
Secretariat for ISO/IEC JTC 1/SC 37, Biometrics, and ISO/IEC JTC 1/WG 4, Technical Implementation of biometric systems |
75,695 |
AZ Board of Regents on behalf of Arizona State University |
CPS Timing Testbed: Testing the Timing |
200,000 |
Carnegie Mellon University |
Smart and Connected Systems |
208,873 |
Center for Civic Design |
The next generation of accessible voting: An investigation of how to support voters from the polling place to anywhere voting |
84,990 |
Colorado State University |
Secure Communication and Access Control in Isolated Runtime Environments in Linux |
80,094 |
Colorado State University |
Health Information Protection using Attribute-Based Access Control |
150,858 |
Corporation for National Research Initiatives |
Research and Develop Data Type Records Specification with International Collaboration |
173,754 |
Culture Catalyst |
Developing an Understanding of Cybersecurity knowledge and Beliefs: Addressing the Cybersecurity Gap |
151,197 |
George Mason University |
A Three-level Graph Based Model for Forensic Analysis on Planned Missions |
60,000 |
George Mason University |
DDoS Detection and Mitigation via Programmable SDN Traffic Measurement |
100,000 |
George Mason University |
Towards Measuring Security for IoT |
473,632 |
George Mason University |
Securing Cloud Infrastructure through Quantitative Threat Models and Optimization |
50,316 |
Internet Keep Safe Coalition (iKeepSafe) |
National K12 Cyber Security Education Conference |
748,587 |
Michigan State University |
On the Sufficiency of Information Content in Latent Fingerprints |
100,000 |
The National Academies of Science, Engineering, and Medicine |
Forum on Cyber Resilience |
60,000 |
Penn State University |
Actionable Mission Impact Analysis in Cloud Computing Context |
49,998 |
Regents of the University of Michigan |
Coexistence Evaluation of Zigbee and Wifi for Smart Manufacturing |
50,000 |
Rochester Institute of Technology |
Design for Fault Attack Resiliency of Lightweight Cryptographic Architectures for Deeply-Embedded Systems |
280,289 |
Rochester Institute of Technology/Florida Atlantic Univ |
Efficient Algorithms and Architectures for Post-Quantum Cryptography |
487,064 |
Texas State University |
Achieving Fingerprint Level Performance with Eye Movement-based Biometrics |
200,000 |
The George Washington University |
High Performance Computing for Big Data |
99,992 |
The Greystone Group Inc. |
Applying HFE to EHRs to mitigate critical inpatient rounds related workflow associated safety concerns |
73,576 |
The Greystone Group Inc. |
Developing consensus Health IT Guidance across Industries, Sectors and Stakeholders |
49,908 |
The National Academies of Science, Engineering, and Medicine |
Support for the Core Research Activities and Studies of the Computer Science and Telecommunications Board |
90,000 |
The National Academies of Science, Engineering, and Medicine |
Forum on Cyber Resilience |
60,000 |
The University of Alabama in Huntsville |
Support for the National Cyber Summit in promotion of cybersecurity awareness, training, and education |
60,000 |
The University of Texas at Dallas |
Biometric Identity Signals from Biological Motion |
50,668 |
Theiss Research |
Classical Processing for Quantum information |
254,341 |
Theiss Research |
Algorithms for Image and Shape Analysis in 3d |
557,377 |
University Enterprises Corporation at CSUSB |
Cyber Security Centers of Academic Excellence (CAE) Community Meeting, Education and Awareness |
1,546,402 |
University of Arizona |
Resilient Cloud Services (RCS): Design, Analysis and Deployment |
50,000 |
University of Arkansas |
Access Control for Distributed Systems with ACPT (Access Control Policy Tool) Adaption |
49,999 |
University of Chile |
ClCRT Random Beacon and its application to Randomness-Verifiable Systems |
192,595 |
University of Florida |
Data Science for Multimodal Plant Identification Task |
50,000 |
University of Florida |
Utilizing NIST Entropy as a Service and Chaotic Circuits for Management of Electronics Supply Chain |
497,375 |
University of Maryland |
New Theory and Resilience Metrics for Systems-of-Systems |
457,288 |
University of Maryland |
In-situ visualization for Immersive Environments |
500,000 |
University of Maryland |
Assessing the Predictive Potential of the Cyber Risk Portal: Phase 2 |
398,909 |
University of Maryland |
Model-Based Design for High Performance Image Processing |
282,778 |
University of Michigan |
Enhancing resilience of industrial control systems through hybrid processes |
201,921 |
University of New Hampshire |
Technical Proposal for IEC 61850-9-3 Utility Profile and IEEE 1588 Power Profile Testing Program, Test Specification Collaboration |
96,121 |
University of New Hampshire |
Securing IEEE 1588 Timing for the Smart Grid |
91,005 |
University of Waterloo |
Design and Attack-Resistance Analysis of Lightweight Cryptographic Algorithms and Protocols |
465,732 |
University of Wollongong |
On the Structure of Lattices for Post-Quantum Cryptography |
293,693 |
Updated 10/3/16