Flow table modification using behavioral-based fingerprinting technique to facilitate zero trust Identity management and access controlPresentation at the 2024 NSF Cybersecurity Summit https://www.trustedci.org/
AI Security for Science: Why Should We Care?Presentation at the 2024 NSF Cybersecurity Summit https://www.trustedci.org/
Building and Operating Cybersecurity Programs at NSF Mid-scale ProjectsPresentation at the 2024 NSF Cybersecurity Summit https://www.trustedci.org/
Network Visibility Viewpoints to Improve SecurityPresentation at the 2024 NSF Cybersecurity Summit https://www.trustedci.org/
Implementing the OSTP Cybersecurity requirements for research security programs, plus NSFs SECURE Initiative Presentation at the 2024 NSF Cybersecurity Summit https://www.trustedci.org/
Getting Started with the Trusted CI FrameworkPresentation at the 2024 NSF Cybersecurity Summit https://www.trustedci.org/
Applied Artificial Intelligence for Operational CybersecurityPresentation at the 2024 NSF Cybersecurity Summit https://www.trustedci.org/
Accelerating Cybersecurity for High-Speed Networks: Developing Defenses with P4-DPDKPresentation at the 2024 NSF Cybersecurity Summit https://www.trustedci.org/
FABRIC Testbed Network Security ChallengesPresentation at the 2024 NSF Cybersecurity Summit https://www.trustedci.org/