{"id":2000,"date":"2012-12-04T20:09:47","date_gmt":"2012-12-05T03:09:47","guid":{"rendered":"http:\/\/blog.caida.org\/best_available_data\/?p=2000"},"modified":"2017-08-21T12:48:58","modified_gmt":"2017-08-21T19:48:58","slug":"caida-at-the-nsf-secure-and-trustworthy-cyberspace-satc-principal-investigators-meeting","status":"publish","type":"post","link":"https:\/\/blog.caida.org\/best_available_data\/2012\/12\/04\/caida-at-the-nsf-secure-and-trustworthy-cyberspace-satc-principal-investigators-meeting\/","title":{"rendered":"CAIDA at the NSF Secure and Trustworthy Cyberspace (SaTC) Principal Investigators&#8217; Meeting"},"content":{"rendered":"<p>Last week CAIDA researchers (<a href=\"http:\/\/www.caida.org\/~alberto\/\">Alberto<\/a> and <a href=\"http:\/\/www.caida.org\/~kc\">kc) visited National Harbor (Maryland) for the <a href=\"http:\/\/cps-vo.org\/group\/satc\/program\">1st NSF Secure and Trustworthy Cyberspace (SaTC) Principal Investigators Meeting<\/a>.  The National Science Foundation&#8217;s <a href=\"http:\/\/www.nsf.gov\/publications\/pub_summ.jsp?ods_key=nsf12596&#038;org=NSF\">SATC<\/a> program is an interdisciplinary expansion of the old Trustworthy Computing program sponsored by <a href=\"http:\/\/www.nsf.gov\/dir\/index.jsp?org=CISE\">CISE<\/a>, extended to include the <a href=\"http:\/\/www.nsf.gov\/sbe\/about.jsp\">SBE<\/a>, <a href=\"https:\/\/nsf.gov\/mps\/about.jsp\">MPS<\/a>, and <a href=\"http:\/\/www.nsf.gov\/ehr\/about.jsp\">EHR<\/a> directorates. The SATC program also includes a bold new <em>Transition to Practice<\/em> category of project funding &#8212; to address the challenge of moving from research to capability &#8212; which we are excited and honored to be a part of. <\/p>\n<p><!--more--><\/p>\n<p>\nThis PI meeting included social science, economic, policy, as well as technical perspectives on cybersecurity through plenary talks, breakout sessions, posters, and an adventurous one-on-one researcher &#8220;speed dating&#8221; experiment.   We presented a poster that summarized <a href=\"http:\/\/www.caida.org\/funding\/dals-satc\/\">our current NSF SATC-funded effort<\/a> to build a platform for online monitoring and analysis of large-scale Internet infrastructure outages. The poster (reproduced below) displays highlights of our previous results from analyzing large outages in <a href=\"http:\/\/www.caida.org\/publications\/presentations\/2011\/analysis_internet_outages_censorship\/analysis_internet_outages_censorship.pdf\">Egypt and Libya<\/a> during the so called &#8220;Arab Spring&#8221;, and the impact of the <a href=\"http:\/\/www.caida.org\/publications\/presentations\/2012\/extract_benefit_from_harm_sigcomm_2012\/extract_benefit_from_harm_sigcomm_2012.pdf\">earthquakes in Japan and New Zealand<\/a> in 2011.  More soon, as we are still analyzing the most recent large-scale Internet outage in the news (Syria).  <\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.caida.org\/publications\/posters\/eps\/dals-2012-nov-outages-poster.pdf\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-2001\" title=\"DALS Poster at NSF SaTC meeting\" src=\"http:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2012\/12\/DALS_Poster_Final.500x595.png\" alt=\"\" width=\"500\" height=\"595\" srcset=\"https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2012\/12\/DALS_Poster_Final.500x595.png 500w, https:\/\/blog.caida.org\/best_available_data\/wp-content\/uploads\/2012\/12\/DALS_Poster_Final.500x595-252x300.png 252w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week CAIDA researchers (Alberto and kc) visited National Harbor (Maryland) for the 1st NSF Secure and Trustworthy Cyberspace (SaTC) Principal Investigators Meeting. The National Science Foundation&#8217;s SATC program is an interdisciplinary expansion of the old Trustworthy Computing program sponsored by CISE, extended to include the SBE, MPS, and EHR directorates. The SATC program also [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,10,13,4],"tags":[],"coauthors":[22],"_links":{"self":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/2000"}],"collection":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/comments?post=2000"}],"version-history":[{"count":24,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/2000\/revisions"}],"predecessor-version":[{"id":4160,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/2000\/revisions\/4160"}],"wp:attachment":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/media?parent=2000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/categories?post=2000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/tags?post=2000"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/coauthors?post=2000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}