• Visits and Open Days
  • Jobs and vacancies
  • Undergraduate
  • Postgraduate
  • Accommodation
  • Student Guide
  • Student email
  • Library and IT services
  • Staff Guide
  • Staff email
  • Timetabling

Cyber Security Research Group

Featured story.

hand behind a padlock

Suggested PhD Projects

This page lists indicative research areas/topics for prospective PhD applicants to identify supervisors and research topics for their PhD project. Potential research students are encouraged and welcome to produce their own suggestions in cyber security that broadly meet the general interests of the Group’s Core Members.

PhD Scholarships

From time to time, we offer funded PhD scholarships. Such scholarships are normally funded via the Institute of Cyber Security for Society (iCSS) , School of Computing , Division of Computing, Engineering and Mathematical Sciences (CEMS) , the University of Kent or external funders. Please note that the 2025 PhD scholarships are to be announced.

Our Group’s Core Members can supervise PhD students under two different programmes and their suggested PhD topics are listed below. To find out more topics, visit each member’s website and study their recent research publications, projects they are working on and any further guidelines for PhD applicants.

PhD Computer Science

Security and privacy in IoT and Industrial IoT : proof-of-concept attacks and countermeasures, IoT honeypot, specific application domains

Human aspects of security : understanding stakeholders involved, protecting vulnerable people (e.g. victims of child sexual abuse/exploitation and survivors of domestic violence), cybercrime, socio-technical solutions

Malware and ransomware : detection, containment and recovery

Opportunities and challenges related to emerging technologies : for instance, the use of LLM and AI in security research, countering the negative impact of these technologies

Sanjay Bhattacherjee

Post-quantum cryptology : Algorithms for finding short vectors in a lattice; theoretical bounds on the runtime, correctness and output quality; precision-handling in computations; design and security analysis of lattice-based cryptographic protocols; implementations

Algorithmic game theory : Design of new voting games, their efficiency analysis, and implementation

Blockchain : Design and analysis of blockchain protocols for different layers, their security analysis and implementations

Virginia Franqueira

Cross-sector sharing of cyber security incidents data : Numerous initiatives are in place to promote sharing of information and lessons learned about cyber incidents but they tend to focus on a specific sector, region or network of professionals in a non-structured manner therefore not prone to automated analysis. Sharing of this type of information is also regarded as problematic for many reasons. This project aims to propose a framework to support expressing and exchanging of cyber incident information and lessons learned on a standardised and anonymous way.

Detection of illegal videos : Detection of illegal videos is complex and different solution directions have pros and cons, e.g., in terms of the ability to cope with video manipulations and performance. Approaches include video similarity detection algorithms that produce a fingerprint for an entire video, frame selection followed by image similarity matching, and aggregation of local image descriptors. This project aims to evaluate existing algorithms for detection of manipulated videos (using legal datasets) against reference videos (akin to illegal videos), and to propose an optimal combination that improves detection rate, implemented in a toolkit.

Automated age estimation : Online platforms, such as social media, have age restrictions for access to functionalities and/or creation of accounts. However, the enforcement of minimum age (e.g., 13) tends to be weak, mainly based on self-reported date of birth or peers endorsement. This project aims to explore possible alternatives and sources of information that could be used to build confidence about age in a bottom-up and privacy-preserving manner, and implement a proof-of-concept mechanism to allow or deny access based on the inferred age.

Forensics of computer-generated media : The surge of AI-based platforms and techniques to generate or manipulate media and text has resulted in different types of emerging computer-generated Child Sexual Abuse Material (CSAM) – images, videos and text. This project aims to assess a large pool of (legal) media and text from such platforms/techniques and the existence of evidence of forensics value (e.g., related to provenance), as well of their reliability and robustness.

Özgür Kafalı

All projects will typically involve some element of knowledge engineering (knowledge graph, ontology) and simulation.

Cyber risk assessment and mitigation for socio-technical systems : – synthesise security and privacy requirements based on organisational risk profile – generate explanations for risk factors – incorporate human security decision-making – develop simulation tool to evaluate mitigation plans

Interactive methods to support cyber security leadership and culture in organisations : – explore serious games and simulation for threat modelling – design visual threat model representation, e.g. attack graphs, attack/defense trees – conduct human subject studies to evaluate effectiveness of developed methods

Normative ethics simulator for autonomous systems : – explore normative ethical theories and accountability – design customizable scenarios based on domain – develop multi-agent simulation tool for experimentation

Rogério de Lemos

Visit  his University of Kent web page for more information about his research interests and publications.

Visit  his dedicated web page on his personal website  for indicative research areas and topics suggested for PhD applicants. More research interests and recent publications can also be found on  his personal website .

Jason Nurse

Visit  his University of Kent web page  and  his personal web site  for more information about his research interests and publications.

Carlos Perez-Delgado

Quantum Cybersecurity : Various quantum technologies – for computation, communication and encryption among others – continue to be developed from hypothetical systems to real-world devices. Quantum cybersecurity studies applications of quantum technologies to cybersecurity, both offensive and defensive. The student will join an existing vibrant research group already exploring such applications–a notable recent example is the vulnerability of Bitcoin  and other  cryptocurrencies to quantum attacks .

The goal of the student will be to identify new potential cybersecurity vulnerabilities that can be exploited using quantum technologies, and/or to research new ways to bolster the security of systems using nascent quantum technology. Some examples of the former include quantum-technological attacks against various online systems, cloud computing, cryptocurrencies and blockchains, banking systems, and other networking systems. Some examples of the latter include quantum key-distribution and quantum cryptography, quantum secure computation, and other quantum online collaboration protocols. The research can be narrowed down within this area, depending on the applicants background and interests. The applicant should have a first degree in CS, physics, mathematics, or other related STEM field.

Quantum Software Engineering : In an effort to stave off a repeat of the “software crisis” of the 1960s, researchers have recently begun developing the field of quantum software engineering (QSE). If software engineering is, as defined by the IEEE, “the application of a systematic, disciplined, quantifiable approach to the development, operation, and maintenance of software, as well as to the study of these approaches; that is, the application of engineering to software,” then quantum software engineering is the application of engineering to the development, operation, and maintenance of quantum software.

The goal of the student will be to help develop tools, techniques, and methodologies for the development, operation and maintenance of quantum software. The student will join a world-leading research group in QSE, behind the development of the  Q-UML quantum software modelling language , and the  Q-COSMIC standard metric for quantum software sizing .

Vineet Rajani

Verification methods like type systems, program logics and runtime monitoring for enforcement of properties related to data confidentiality, causality and fairness.

Type-based verification for differential privacy : Enormous amount of data is collected every day, this data could be extremely useful in making several automated decisions. However, often this data cannot be released/used because of privacy concerns. Prior work has already shown that simple aggregation and anonymization is not sufficient to prevent privacy loss of individuals. Differential privacy is a promising approach to this problem which offers a statistical guarantee to an individual’s privacy. Intuitively, a mechanism is differentially private if the probability of obtaining a result with (or without) an individuals data is almost the same. This limits the amount of information that can learned about that individual. The aim of this project is to develop a type-theoretic framework for analysing differential privacy. We will use ideas from cost analysis and information flow control, two well studied but very different domains in formal verification.

Algorithmic fairness: theory and practice (jointly with Shujun Li): Algorithmic decision-making (for instance, using machine learning) is increasingly being used to make socially relevant decisions like university admissions, credit rating, user profiling, and even in more sensitive areas such as HR recruitment and digital policing. While most of these approaches are often designed and calibrated with accuracy and human intervention in mind, increasingly questions of fairness of such algorithmic decision making approaches are getting more and more relevant. This raises a fundamental question: when can we call a program or an automated computational model fair? Questions of this kind are difficult to answer without having a formal definition of what is meant by fairness. The goal of this project will be to understand fairness from a formal perspective and to build methods for enforcing it. There are several directions to pursue here, including connections to security, privacy and big data analytics, depending on the interest of the applicant.

Visit  his University of Kent web page  for more information about his research interests and publications.

PhD Electronic Engineering

Sanaul hoque, interdisciplinary phd projects.

We encourage PhD applicants to consider working on interdisciplinary research topics with an interface with subjects such as Psychology, Criminology/Sociology, Business, Law, and Arts. You can have a principal supervisor from the School of Computing and a secondary one from a different academic school (discipline).

Cyber Security PhD Degree in Other Disciplines

If you are interested in a cyber security PhD degree not in the subject of Computer Science or Electronic Engineering, please visit the website of the Institute of Cyber Security for Society (iCSS) , where you can find supervisors from other academic schools (disciplines) as the principal supervisor. In this case, you may want to consider one of the academics from the Cyber Security Research Group as a secondary supervisor.

If you are interested in pursuing a PhD degree in cyber security and need any help, please feel free to contact Professor Shujun Li , the Group Head and the iCSS Director, for advice.

The University of Edinburgh home

  • Schools & departments

Postgraduate study

Cyber Security, Privacy and Trust PhD

Awards: PhD

Study modes: Full-time

Funding opportunities

Placements/internships

Programme website: Cyber Security, Privacy and Trust

Introduction to Postgraduate Study at the University of Edinburgh

Join us online on 25 September to learn more about Scotland, the city of Edinburgh and postgraduate study at the University.

Find out more and register

Research profile

The increasing reliance of systems and services on information technology in the public, private and third sector has significantly raised the impact of cyber attacks in the last two decades.

This PhD programme in Cyber Security, Privacy and Trust is a response to the growing need for highly specialized research and training in these topics. Cyber security and resiliency is a complex problem that requires designing and understanding underlying technologies but also how business processes, cost, usability, trust and the law play a role for effective technology deployment.

The aim of this PhD programme is to provide students with research training in specialised topics of security, privacy and trust, helping produce the next generation of world-leading experts of the field.

Programme structure

The PhD in Cyber Security, Privacy and Trust trains you as a researcher and allows you to develop advanced techniques and in-depth knowledge in a specialist area. You will develop an all-round knowledge of your discipline, and a broad range of transferable skills.

You will carry out independent research, resulting in an original contribution to knowledge in your chosen area, working under the guidance of your supervisors.

The prescribed period of study is 36 months if studying full-time, or between 48 and 72 months if studying part-time.

Year 1 of PhD studies is probationary. Your supervisor will identify your training needs, if any, and invite you to attend lectures relevant to your research topic. These lectures may be selected from those offered to MSc students or may be specialist courses and seminars organised by the School's various research groupings.

Towards the end of Year 1, you will be expected to submit a thesis proposal which identifies a specific research topic, reviews the relevant literature, outlines a plan of research to address the topic, and describes progress made so far.

Progress during your PhD is assessed by annual reviews, which formally determine whether you can progress with your PhD. You will be required to complete and pass a PhD annual review at the end of each year of study and thesis is expected to be submitted at the end of Year 3. Following thesis submission, you will be required to attend an oral examination (or viva) which will be conducted by an external and internal examiner.

Find out more about compulsory and optional courses

We link to the latest information available. Please note that this may be for a previous academic year and should be considered indicative.

AwardTitleDurationStudy mode
PhDCyber Security, Privacy and Trust3 YearsFull-time

Work placements/internships

Many postgraduate research students in the School of Informatics undertake at least one optional internship during their PhD, gaining important transferable skills whilst working with companies, public or third sector organisations.

The School of Informatics maintains a range of connections to potential employers in the cyber security and other sectors. Work placements or internships are considered a valuable aspect of research training as they expose students to an applied research culture, and can provide valuable contacts for future job searches.

Training and support

As a research student in the School of Informatics, you will have access to a highly respected academic staff community, including staff who have won prizes for their research and who are Fellows of learned societies.

The University of Edinburgh has been recognised as a UK Academic Centre of Excellence in Cyber Security Research. This is based on the amount and quality of its research output, as well as its level of PhD training.

Within the School of Informatics, the Security, Privacy and Trust Group includes academic staff who lead research in a range of technical and socio-technical areas of cyber security. Staff also supervise PhD students on this programme.

  • Security, Privacy and Trust Group

You will carry out your research under the guidance of a primary supervisor and at least one other secondary or co-supervisor. You will be expected to attend seminars and meetings of relevant research groups and may also attend lectures that are relevant to your research topic. Periodic reviews of your progress will be conducted to assist with research planning.

A programme of transferable skills courses will be offered, which facilitates broader professional development in a wide range of topics, from writing and presentation skills to entrepreneurship and career strategies.

The award-winning Informatics Forum is an international research facility for computing and related areas. It houses more than 400 research staff and students, providing office, meeting and social spaces.

The Forum also contains several robotics labs, an instrumented multimedia room, eye-tracking and motion capture systems, and a full recording studio amongst other research facilities. Its spectacular atrium plays host to many events, from industry showcases and student hackathons to major research conferences.

Nearby teaching facilities include computer and teaching labs with more than 250 machines, 24-hour access to IT facilities for students, and comprehensive support provided by dedicated computing staff.

There are further specific facilities to support aspects of cyber security research, including an Internet of Things Lab and a Network Security Lab. The Blockchain Technology Lab is a research lab supporting investigations into distributed ledger technology.

Among our wider entrepreneurial initiatives is Informatics Ventures, set up to support globally ambitious software companies in Scotland and nurture a technology cluster to rival Boston, Pittsburgh, Kyoto and Silicon Valley.

Career opportunities

There is high demand for security and privacy experts in industry, academia, and the public sector. Commercially, there is also a large variety of opportunities in both small and large companies.

Previous PhD graduates associated with the Security and Privacy Group have gone on to employment in industry with companies including:

  • ION Geophysical
  • Disney Research
  • Deutsche Bank.

Students have also gone on to be employed within academia, at institutions, to name a few, including:

  • University of Oxford
  • University of Bristol
  • University of Oldenburg
  • University of Auckland
  • University of Birmingham
  • University of Surrey
  • University of Munich
  • Cambridge University
  • Queen’s University Belfast
  • Tsinghua University
  • Lancaster University

Entry requirements

These entry requirements are for the 2024/25 academic year and requirements for future academic years may differ. Entry requirements for the 2025/26 academic year will be published on 1 Oct 2024.

A UK 2:1 honours degree, or its international equivalent, in computer science, mathematics, linguistics, or a related discipline. A Masters degree or equivalent, in information security, cyber security or a closely related discipline is recommended.

International qualifications

Check whether your international qualifications meet our general entry requirements:

  • Entry requirements by country
  • English language requirements

Regardless of your nationality or country of residence, you must demonstrate a level of English language competency at a level that will enable you to succeed in your studies.

English language tests

We accept the following English language qualifications at the grades specified:

  • IELTS Academic: total 7.0 with at least 6.0 in each component. We do not accept IELTS One Skill Retake to meet our English language requirements.
  • TOEFL-iBT (including Home Edition): total 100 with at least 20 in each component. We do not accept TOEFL MyBest Score to meet our English language requirements.
  • C1 Advanced ( CAE ) / C2 Proficiency ( CPE ): total 185 with at least 169 in each component.
  • Trinity ISE : ISE III with passes in all four components.
  • PTE Academic: total 70 with at least 59 in each component.

Your English language qualification must be no more than three and a half years old from the start date of the programme you are applying to study, unless you are using IELTS , TOEFL, Trinity ISE or PTE , in which case it must be no more than two years old.

Degrees taught and assessed in English

We also accept an undergraduate or postgraduate degree that has been taught and assessed in English in a majority English speaking country, as defined by UK Visas and Immigration:

  • UKVI list of majority English speaking countries

We also accept a degree that has been taught and assessed in English from a university on our list of approved universities in non-majority English speaking countries (non-MESC).

  • Approved universities in non-MESC

If you are not a national of a majority English speaking country, then your degree must be no more than five years old* at the beginning of your programme of study. (*Revised 05 March 2024 to extend degree validity to five years.)

Find out more about our language requirements:

  • Academic Technology Approval Scheme

If you are not an EU , EEA or Swiss national, you may need an Academic Technology Approval Scheme clearance certificate in order to study this programme.

Fees and costs

Scholarships and funding, featured funding.

  • Security, Privacy and Trust Group PhD topics (some with scholarships)
  • School of Informatics scholarships for research students
  • Research scholarships for international students

Please note that some University and School scholarships require separate applications via the Scholarships portal.

UK government postgraduate loans

If you live in the UK, you may be able to apply for a postgraduate loan from one of the UK’s governments.

The type and amount of financial support you are eligible for will depend on:

  • your programme
  • the duration of your studies
  • your tuition fee status

Programmes studied on a part-time intermittent basis are not eligible.

  • UK government and other external funding

Search for scholarships and funding opportunities:

  • Search for funding

Further information

  • IGS Admissions Administrator
  • Phone: +44 (0)131 651 5635
  • Contact: [email protected]
  • School of Informatics Graduate School
  • Office 3.42
  • Informatics Forum
  • Central Campus
  • Programme: Cyber Security, Privacy and Trust
  • School: Informatics
  • College: Science & Engineering

Select your programme and preferred start date to begin your application.

PhD Cyber Security, Privacy and Trust - 3 Years (Full-time)

Application deadlines.

Applications for 2024/25 entry are now open and can be submitted all year round.

Please submit your completed application at least three months prior to desired entry date.

If you want to be considered for School funded PhD scholarships you must apply by one of two rounds:

1 24 November 2023
2 26 February 2024 (date extended)

(Revised 25 October 2023 to update application deadlines)

(Revised 15 February 2024 to extend the round 2 application deadline)

  • How to apply

You must submit two references with your application.

You must submit an application via the EUCLID application portal and provide the required information and documentation. This will include submission of:

  • a Curriculum Vitae (CV)
  • research proposal (2-5 pages long)
  • degree certificates and official transcripts of all completed and in-progress degrees (plus certified translations if academic documents are not issued in English)
  • two academic references

Only complete applications will progress forward to the academic selection stage.

Read through detailed guidance on how to apply for a PGR programme in the School of Informatics:

  • School of Informatics PGR Application Guidance

Find out more about the general application process for postgraduate programmes:

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

PhD Research Project Proposal Title National Security, Cybersecurity and Invasions of Privacy

Profile image of Prince Adewale Adegoroye

Related Papers

Charith Perera , Lizhe Wang

Over the last few years, we've seen a plethora of Internet of Things (IoT) solutions, products, and services make their way into the industry's marketplace. All such solutions will capture large amounts of data pertaining to the environment as well as their users. The IoT's objective is to learn more and better serve system users. Some IoT solutions might store data locally on devices ("things"), whereas others might store it in the cloud. The real value of collecting data comes through data processing and aggregation on a large scale, where new knowledge can be extracted. However, such procedures can lead to user privacy issues. This article discusses some of the main challenges of privacy in the IoT as well as opportunities for research and innovation. The authors also introduce some of the ongoing research efforts that address IoT privacy issues.

phd research proposal in cyber security pdf

LUIS DANIEL SALGADO ROMERO

Julio Gazeta

In this paper, we review the background and state-of-the-art of big data. We first introduce the general background of big data and review related technologies, such as could computing, Internet of Things, data centers, and Hadoop. We then focus on the four phases of the value chain of big data, i.e., data generation, data acquisition, data storage, and data analysis. For each phase, we introduce the general background, discuss the technical challenges, and review the latest advances. We finally examine the several representative applications of big data, including enterprise management, Internet of Things, online social networks, medial applications, collective intelligence, and smart grid. These discussions aim to provide a comprehensive overview and big-picture to readers of this exciting area. This survey is concluded with a discussion of open problems and future directions.

Charith Perera

The Internet of Things (IoT) is a dynamic global information network consisting of Internet-connected objects, such as radio frequency identifications, sensors, and actuators, as well as other instruments and smart appliances that are becoming an integral component of the Internet. Over the last few years, we have seen a plethora of IoT solutions making their way into the industry marketplace. Context-aware communications and computing have played a critical role throughout the last few years of ubiquitous computing and are expected to play a significant role in the IoT paradigm as well. In this paper, we examine a variety of popular and innovative IoT solutions in terms of context-aware technology perspectives. More importantly, we evaluate these IoT solutions using a framework that we built around well-known context-aware computing theories. This survey is intended to serve as a guideline and a conceptual framework for context-aware product development and research in the IoT paradigm. It also provides a systematic exploration of existing IoT products in the marketplace and highlights a number of potentially significant research directions and trends.

Digital Enlightenment Yearbook 2014

Peter Haynes , Mai-Huong Nguyen

This is the introduction to the third Digital Enlightenment Yearbook, published by the Digital Enlightenment Forum (http://www.digitalenlightenment.org/), which aims to shed light on today’s rapid technological changes and their impact on society and its governance, taking inspiration from Enlightenment thought as well as from the many transformations and evolutions that have taken place since. This year the focus of the Yearbook is “social networks and social machines, surveillance and empowerment.” In what is now the well-established tradition of the Yearbooks, different stakeholders in society and various disciplinary communities (technology, law, philosophy, sociology, economics, policymaking) bring their very different opinions and perspectives to bear on this topic, forming a basis for inspiring and constructive cross-disciplinary discussions.

Manuel Grijalva

Proceedings of 13th IEEE International Conference on Signal-Image Technology and Internet-Based Systems (SITIS 2017)

The term "disaster management" comprises both natural and man-made disasters. Highly pervaded with various types of sensors, our environment generates large amounts of data. Thus, big data applications in the field of disaster management should adopt a modular view, going from a component to nation scale. Current research trends mainly aim at integrating component, building, neighborhood and city levels, neglecting the region level for managing disasters. Current research on big data mainly address smart buildings and smart grids, notably in the following areas: energy waste management, prediction and planning of power generation needs, improved comfort, usability and endurance based on the integration of energy consumption data, environmental conditions and levels of occupancy. This paper aims presenting a systematic literature review on the applications of big data in disaster management. The paper will first presents the visual definition of disaster management and describes big data; it will then illustrate the findings and gives future recommendations after a systematic literature review.

The Predictive Sports Book

Andrew Pearson

Today, technology such as AI, Machine Learning, Augmented Reality, IoT, Real-time stream processing, social media, psychometrics, and wearables are radically altering the Customer Experience (CX) landscape. Sports books need to jump aboard this fast moving technology or run the risk of being left behind by their competitors. The Predictive Sports Book is a sports betting company that utilizes the latest technological developments to connect with their customers, while delivering an exceptional personalized experience to each and every one of them. The Predictive Sports Book reveals how these and other technologies can help shape the customer journey. The book details how the five types of analytics—descriptive, diagnostic, predictive, prescriptive, and edge analytics—affect not only the customer journey, but also just about every operating function in the sports book. An IoT-connected sports book can make its operations smart. Connected devices can help with inventory optimization, labor management, marketing, and customer experience, as well as keep its data centers green and its energy use smart. Social media is no longer a vanity platform, but rather it is a place to both connect with current customers as well as court new ones. The Predictive Sports Book knows that social media can produce a healthy ROI, if done properly. Social media can also be utilized as a place to gauge a customers psychological profile; it's amazing how much information there is in a Facebook like or a Twitter Tweet. The Predictive Sports Book breaks down social media into its six different categories -- collaborative projects, blogs and micros blogs, content communities, social networks, virtual game worlds and virtual social worlds -- and shows sports books how to utilize each one to both market to individuals as well as to attain real-time competitive intel. The final chapter brings everything together, explaining how AI, ML, Hadoop, data lakes, and real-time streaming can turn a sports book's data into a treasure trove of information that can create powerful one-to-one customer relationships that patrons will recognize. This book will help sports betting executives break through the technological clutter so that they can deliver an unrivaled customer experience to each and every one of their patrons to ensure that they keep coming through those front doors, as well as onto their websites.

International Journal of Advanced Trends in Computer Science and Engineering

WARSE The World Academy of Research in Science and Engineering

The current trend of research in cloud computing is challenging and keenly marginal to understand for the researchers and the learners due to its over-cover and complementary nature towards the new technologies. Cloud Computing is part and parcel of its applications with a majority of the extending concepts of Fog Computing, Internet of Things (IoT) and Big Data Analytics. In the current scenario, it is difficult for a researcher to identify the domain applicability and interrelationship among all the specified areas. In view of this, the current study is planned to focus on the research requirements and the basics for majorly two categories of stakeholders-the learners and the researchers exploring the needs of users to cater by cloud and also the current research trends in cloud computing.

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

maidul islam

Prattusha Chakraborty

Sarah Spiekermann

Francesca Bria

2012 Tenth International Conference on ICT and Knowledge Engineering

Mahmoud Elkhodr

Chamin Nalinda

Viktor Reznov

Journal of the Association for Information Science and Technology

David Houghton

Chakma Ratan

The Predictive Airline

Fahim Ullah

Athena Vakali

Emmanuel S Dandaura

Institute of Network Cultures

Miren Gutiérrez

Placido R Pinheiro

Juan-Carlos Valencia

European Journal of Information Systems

Catherine A Middleton

Francesco Liucci

The Arab Social Media Report (Vol. 7)

Mansour Alshaikhsaleh

Erick Lopez Serrano

Dr. Apoorva Mishra

DECODE - DEcentralised Citizens Owned Data Ecosystem Project no. 732546

Francesco Brancaccio , Federico Puletti

International Journal Of Advance & Innovative Research

Dr. Apoorva Mishra , Dr. Vikram Parekh

Aleksandra Przegalinska

Salicious Crumb

PAU GALLARDO

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Research Proposal on Cyber Security

Defining Cyber Security?

            Cybersecurity is made up of several security technologies and predefined policies to guarantee the safety measures for network, hardware, and software . These measures prevent data attacks and threats from unauthenticated users. And, it assures to provide data integrity, privacy, accessibility, and trust . 

This article presents you with current topics of Research Proposal on Cyber Security with their key areas!!!

In an organization, two prime security types are embedded to protect their sensitive information. They are physical and cybersecurity . These two technologies create security creates a shield over the organization’s data to prevent illegal users . In this, cybersecurity deals with intelligent online cyber-attacks.

Research Proposal on Cyber Security Guidance

In fact, information/network security is recognized as part of cybersecurity.  Overall, it is the best protective technology to detect and prevent cyber-attacks . Furthermore, it is also popularly known for security risk control. Now, we can see about the few major issues that are prolonged for the long-term to meet the best solving solutions.

What are some problems with cyber security?

  • Unauthenticated database / port scan
  • Installing malware through web penetration for data alteration
  • Compromise the system from remote location
  • Illegal access over the network records and perform forging operation
  • Flooding attack to create numerous requests over a server
  • Intentionally troublemaking a server rooms to get the resource freely
  • Ransomware attacks on sensitive data to stop the access
  • Denial of Service / Distributed DoS attack to create more traffic to block the access
  • Man-in-the-middle / eavesdrop attack on data conversation
  • Mount the malware / spyware on a network
  • Breach the encrypted data

Important 3 Terms of Cyber Security

Now, we can see the significant terminologies used in cybersecurity. While performing any operations in cyber-attacks, these three terms need to focus more. Though these terms may look similar, it has different nature and computing processes.  The three terms as follows,  

  • It is an ability of creating harm to the system while threat uses the vulnerability
  • For more clarity, it is formulated as threat x vulnerability which is the launch point to the cybersecurity
  • It is an activity to create harmful things to either individual or whole organization / company
  • It is classified as intentional, unintentional and natural threats
  • It includes several threat evaluation techniques for better interpretation
  • From the background context of the cyber system, it is addressed as the applications errors or hardware defectiveness
  • Now, it is popularly known as the susceptibility / defenselessness nature of the system
  • Further, it may affect the CIA (Confidentiality, Integrity and Authentication) triad

As a matter of fact, our research team is comprised of a colossal collection of distinct research areas for Research Proposal on Cyber Security. We are ready to give you more unknown interesting facts on those areas. For your reference, here we have listed key enabling technologies in cybersecurity.

Key Technologies of Cyber Security

  • Cloud Evidence Rescue System in Cyber Forensic
  • Medical IoT in D2D Wireless Networks
  • Vulnerability on Self-Organizing Social Networks
  • Integrated Cyber Systems (cross-platform safety and firewalls)
  • Autonomous Vehicles Cybersecurity
  • Internet of Medical Things (IoMT)
  • Potential Radicalization on Social Website Content
  • Insider and Outsider Threat Detection

What are insider threats in cyber security?

Essentially, insider threat is one of the risks in cybersecurity caused by the node in the same network .  For instance: data theft in the company is caused by the employee itself. The kind of threat can be originated from old/current employees or associated partners. Since these persons already have limited / whole rights to access company data but trying to perform illegal activities. Here, we have given you the process involved in detecting insider threats,

  • Verify the integrity of the file to analyze whether the file is compromised or not. For instance: boot / system files
  • Examine the content of the file to figure out the abnormal patterns hide inside the file. For instance: virus signatures
  • Spot the files and directories to check they were place in placed in different locations

Insider Threat Indicators in Cyber Security

Based on certain indicators also, we can detect the insider threat. These indicators address the abnormal activities in the network. For instance, the employee has a grudge but pretends to normal; it may indicate the foul game. Here we have given three common indicators to track the inside threats:

  • Traffic Size – Transmission of voluminous data in the network
  • Events at Strange Timing – Identify the abnormal actions in the network (like mid-night timings)
  • Nature of Events – Attempt to gain access to rare network resources / services

Next, we can see significant countermeasures to prevent insider threats . The below-specified countermeasures are just the sample for your information. Beyond this, our developers have come across numerous best solutions. Still, now, we are tirelessly working on up-to-date different security mechanisms to build research proposal on cyber security .

How to protect insider threats?

  • Analyze the data at all the aspects (rest in servers, motion in network, storage in cloud and terminals)
  • Screen the entire storage systems to auto-generate alerts on policy abuses. For instance: warehouses, data center, relational databases, and mainframes
  • Inspect the user behavior through learning for identifying and warning security risks
  • Complicate the private data by disguising / encoding so that even if the hackers trace the data, it will be not useful anymore
  • Silently observes the legitimate user intent in accessing the data for detecting abnormal activities
  • Rank the security events based on the their threat severity on using combined ML and AI technologies
  • Disclose the data size, background, locality in the cloud
  • Check and assess the known attacks / susceptibilities and while processing it prevent other threats and SQL injection

Furthermore, our research team has given you the latest cybersecurity research topics that we are currently ongoing. Based on the active scholars’ demand, we have recommended the following research Cybersecurity master project ideas .

Best Research Proposal Topics in Cyber Security

  • Cyber Anti-forensic Technologies 
  • Biometrics based Cyber Physical System
  • Security Information and Event Management (SIEM)
  • Development of Automated Defense System
  • Improvement Cyber Intelligence based Bio-inspired Models
  • Analysis of Correlations in Objects Mobility
  • Intruders Identification using Bio-inspired Algorithm
  • Evaluation of Different Cyber-defense Models
  • Design Bio-inspired Models for Network Security
  • Behavioral Analysis for Bio-authentication
  • Security Enrichment using ML and Blockchain Techniques
  • Challenges in Network Forensics and Traffic Analysis
  • Data Hiding and Logic-based Assets Theft (watermarking and steganography)
  • Threat Detection and Classification
  • Enhancement of Cybersecurity using Adaptation Approaches
  • Cyber Threat Prediction using  Multi Technologies (ANN, Genetic and Evolutionary)

As you know well, PhD is nothing but the original research contribution to the interesting research field. For instance: cybersecurity, WSN, Cloud computing , AI, and more. The most important factors that you have to hold till the end of the research are the contribution and originality of the contribution . Next, we can see the research proposal on Cyber Security in detail with its significance and major phases.

Outline of Research Proposal on Cyber Security

            In general, research is the data-assisted scientific investigation of the specific problem , which is conducted in chronological order to critically solve the problem by perfect solution. Aresearch proposal is defined as the intelligent approach find particular unknown facts with acceptable evidence in a well-organized manner . In this, it includes a time-scheduled plan, objectives, and structured format to describe the handpicked research questions and their appropriate answer. Here, we have given you few primary key features of the best proposal

Major Parts of Research Proposal

  • Mention the research need and importance with contribution
  • Address the research hole by referring recent relevant papers
  • Clearly denote the problem statement in two or three sentences
  • Describe the effective measures against proposed problem through methodologies

Now, we can how our research writing service helps you to create quality excellence proposal writing . We have a special team of writers who are technically strong in converting the actual research plan into the systematized proposal. Below, we have specified what makes our best from others in all the aspects of the proposal writing.

PhD Research Proposal on Cyber Security

How to write the best PhD proposal writing?

  • Describe the problem in crystal clear way which is theoretical proven but practically not evidently proven
  • Frame the objectives of research which need to experimentally accomplished
  • If the objectives are clearly depicted to readers the it is easy for them to catch the flow of research
  • Take a stand on problem and rise all applicable research questions to accomplish the objectives
  • Perform statistics-based verification on premises
  • Describe the research state to conduct further study
  • Provide background information through relevant research papers
  • Point out the other papers’ contribution, advantages and drawbacks
  • Contribute detailed survey over recent methods
  • Core part of the proposal
  • Must to give sufficient information on proposed techniques / algorithms
  • Ensure the flow of methodologies being used
  • Evidently tackle the problem through best-fitting solutions

To sum up, if you need the best Research Proposal on Cyber Security , then contact our team. Certainly, we are pleased to lend our hands to give you the fullest support in the whole research journey. Our ultimate goal is to meet your research expectation in all aspects.

Why Work With Us ?

Senior research member, research experience, journal member, book publisher, research ethics, business ethics, valid references, explanations, paper publication, 9 big reasons to select us.

Our Editor-in-Chief has Website Ownership who control and deliver all aspects of PhD Direction to scholars and students and also keep the look to fully manage all our clients.

Our world-class certified experts have 18+years of experience in Research & Development programs (Industrial Research) who absolutely immersed as many scholars as possible in developing strong PhD research projects.

We associated with 200+reputed SCI and SCOPUS indexed journals (SJR ranking) for getting research work to be published in standard journals (Your first-choice journal).

PhDdirection.com is world’s largest book publishing platform that predominantly work subject-wise categories for scholars/students to assist their books writing and takes out into the University Library.

Our researchers provide required research ethics such as Confidentiality & Privacy, Novelty (valuable research), Plagiarism-Free, and Timely Delivery. Our customers have freedom to examine their current specific research activities.

Our organization take into consideration of customer satisfaction, online, offline support and professional works deliver since these are the actual inspiring business factors.

Solid works delivering by young qualified global research team. "References" is the key to evaluating works easier because we carefully assess scholars findings.

Detailed Videos, Readme files, Screenshots are provided for all research projects. We provide Teamviewer support and other online channels for project explanation.

Worthy journal publication is our main thing like IEEE, ACM, Springer, IET, Elsevier, etc. We substantially reduces scholars burden in publication side. We carry scholars from initial submission to final acceptance.

Related Pages

Our benefits, throughout reference, confidential agreement, research no way resale, plagiarism-free, publication guarantee, customize support, fair revisions, business professionalism, domains & tools, we generally use, wireless communication (4g lte, and 5g), ad hoc networks (vanet, manet, etc.), wireless sensor networks, software defined networks, network security, internet of things (mqtt, coap), internet of vehicles, cloud computing, fog computing, edge computing, mobile computing, mobile cloud computing, ubiquitous computing, digital image processing, medical image processing, pattern analysis and machine intelligence, geoscience and remote sensing, big data analytics, data mining, power electronics, web of things, digital forensics, natural language processing, automation systems, artificial intelligence, mininet 2.1.0, matlab (r2018b/r2019a), matlab and simulink, apache hadoop, apache spark mlib, apache mahout, apache flink, apache storm, apache cassandra, pig and hive, rapid miner, support 24/7, call us @ any time, +91 9444829042, [email protected].

Questions ?

Click here to chat with us

  • My Shodhganga
  • Receive email updates
  • Edit Profile

Shodhganga : a reservoir of Indian theses @ INFLIBNET

  • Shodhganga@INFLIBNET
  • Maharaja Agrasen University
  • Maharaja Agrasen School of Law
Title: Prevention of Cyber Crimes in India A Comparative Study
Researcher: Sunidhi Kashyap
Guide(s): 
Keywords: Law
Social Sciences
Social Sciences General
University: Maharaja Agrasen University
Completed Date: 2021
Abstract: newline The Internet in India is increasing in the era of 21st century rapidly which gave rise to the new opportunities in various fields like entertainment, business, sports, education and many more. As the Internet users are growing fast, there are some advantages as well as disadvantages. Cyber-crimes are the latest entrants in the long list of various types of crimes which are continuously bothering the mankind. newlineThe need for Cyber law came into existence due to the crimes which are done by the people virtually which have no boundaries and may affect any country across the globe. Thus, there is a dire need of such law which is necessary for the prevention of computer related crime. newlineCyber-crimes are mainly concerned with all the criminal activities which are done using the various communication devices like computers, tablets, mobile phones, the internet, cyberspace, and the World Wide Web. But these crimes can be done on those individuals also who don t have any knowledge of computers or Internet. newlineThe Parliament of India has taken into consideration the recommendations of General Assembly in the form of Information Technology Act, 2000. The benefit of coming into existence this Act is that it further amended the Indian Penal Code, 1860, The Indian Evidence Act, 1872, the Bankers Books Evidence Act,1891 and the Reserve Bank of India Act,1934. The Information Technology Act makes the international trade easier and secondly it is an alternative to the paper-based methods of communication and storage of information. There was also a beginning at international level to combat the problem of International Cyber Crime Convention which came into force on November 23, 2001. As on August 30, 2016, 55 countries have become signatory to this convention. newlineIn Indian Constitution also right to privacy has been defined as the right of person to enjoy his own presence by himself and decides his boundaries of physical, mental, and emotional interaction with another person. From this we can easily observe that privacy
Pagination: 
URI: 
Appears in Departments:
File Description SizeFormat 
Attached File525.33 kBAdobe PDF
536.44 kBAdobe PDF
1.72 MBAdobe PDF
480.02 kBAdobe PDF
520.63 kBAdobe PDF
287.91 kBAdobe PDF
182.44 kBAdobe PDF
2.05 MBAdobe PDF
393.74 kBAdobe PDF
303.56 kBAdobe PDF
239.33 kBAdobe PDF

Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Shodhganga

An official website of the United States government

Here's how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS. A lock ( Lock Locked padlock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Active funding opportunity

Nsf 24-573: epscor research infrastructure improvement-focused epscor collaborations program (rii-fec), program solicitation, document information, document history.

  • Posted: May 16, 2024
  • Replaces: NSF 22-633

Program Solicitation NSF 24-573



Office of Integrative Activities

Letter of Intent Due Date(s) (required) (due by 5 p.m. submitting organization's local time):

     December 17, 2024

     Third Tuesday in December, Annually Thereafter

Full Proposal Deadline(s) (due by 5 p.m. submitting organization's local time):

     January 28, 2025

     Fourth Tuesday in January, Annually Thereafter

Important Information And Revision Notes

  • Only jurisdictions that meet the EPSCoR eligibility criteria may submit proposals to the RII-FEC competition.
  • The EPSCoR Research Infrastructure Improvement Program: Track-2 (RII Track-2 FEC) has been renamed to the EPSCoR Research Infrastructure Improvement-Focused EPSCoR Collaboration Program (RII-FEC).
  • The focus area for the RII-FEC program will be announced via a biennial Dear Colleague Letter (DCL) found at this link: EPSCoR Program links.
  • Proposals may be submitted either as (i) a collaborative proposal from multiple organizations or (ii) a proposal from one organization with support for non-lead collaborating organizations requested as subawards.
An organization may only submit one proposal to the RII-FEC competition as lead. However, an organization may serve as a non-lead in a collaborative submission or as subawardee on any number of additional proposals.
For proposals from one organization with support for non-lead collaborating organizations requested as subawards, each submission must have at least one collaborator (specifically as Principal Investigator (PI) or co-PI) from each of the different EPSCoR jurisdictions.
An investigator may serve as PI or Co-PI on only one RII-FEC award at any given time. However, the investigator may serve as other Senior/Key Personnel on any number of RII-FEC submissions or awards.

Any proposal submitted in response to this solicitation should be submitted in accordance with the NSF Proposal & Award Policies & Procedures Guide (PAPPG) that is in effect for the relevant due date to which the proposal is being submitted. The NSF PAPPG is regularly revised and it is the responsibility of the proposer to ensure that the proposal meets the requirements specified in this solicitation and the applicable version of the PAPPG. Submitting a proposal prior to a specified deadline does not negate this requirement.

Summary Of Program Requirements

General information.

Program Title:

EPSCoR Research Infrastructure Improvement-Focused EPSCoR Collaborations Program (RII-FEC)
The Established Program to Stimulate Competitive Research (EPSCoR) is designed to fulfill the mandate of the National Science Foundation (NSF) to promote scientific progress nationwide. EPSCoR eligibility status is yearly updated and reported in the EPSCoR website (see EPSCoR eligibility ). Through this program, NSF establishes partnerships with government, higher education, and industry that are designed to affect sustainable improvements in a jurisdiction's research infrastructure, Research and Development (R&D) capacity, and hence, its R&D competitiveness. The RII-FEC program (formerly known as "EPSCoR Track-2 program") builds inter-jurisdictional collaborative teams of EPSCoR investigators in Science, Technology, Engineering, and Mathematics (STEM) focus areas consistent with the current National Science Foundation Strategic Plan . Projects are investigator-driven and must include researchers from at least two EPSCoR eligible jurisdictions with complementary expertise and resources necessary to address challenges, which neither party could address as well or as rapidly independently. RII-FEC projects have a comprehensive and integrated vision to drive discovery and build sustainable STEM capacity that exemplifies individual, institutional, geographic, and disciplinary diversity. The projects' STEM research and education activities seek to broaden participation through the strategic inclusion and integration of all individuals, institutions, and sectors. Additionally, EPSCoR recognizes that the development of early-career faculty from backgrounds that are traditionally underrepresented in STEM fields is critical to sustaining and advancing research capacity. The integration and inclusion of Minority-Serving Institutions (MSIs), women's colleges, Primarily Undergraduate Institutions (PUIs), and two-year colleges is a critical component of this sustainable STEM capacity.

Cognizant Program Officer(s):

Please note that the following information is current at the time of publishing. See program website for any updates to the points of contact.

  • Jose Colom-Ustariz, Program Director, NSF, telephone: (703) 292-7088, email: [email protected]
  • Lisa C. Cliggett, Program Director, NSF, telephone: (703) 292-2759, email: [email protected]
  • Hongmei Luo, Program Director, NSF, telephone: (703) 292-8867, email: [email protected]
  • Benjamin J. McCall, Program Director, NSF, telephone: (703) 292-7916, email: [email protected]
  • 47.041 --- Engineering
  • 47.049 --- Mathematical and Physical Sciences
  • 47.050 --- Geosciences
  • 47.070 --- Computer and Information Science and Engineering
  • 47.074 --- Biological Sciences
  • 47.075 --- Social Behavioral and Economic Sciences
  • 47.076 --- STEM Education
  • 47.079 --- Office of International Science and Engineering
  • 47.083 --- Office of Integrative Activities (OIA)
  • 47.084 --- NSF Technology, Innovation and Partnerships

Award Information

Anticipated Type of Award: Cooperative Agreement

Estimated Number of Awards: 12

Anticipated Funding Amount: $12,000,000 to $18,000,000

Estimated program budget, number of awards and average award size/duration are subject to the quality of proposals and availability of funds.

Eligibility Information

Who May Submit Proposals:

Proposals may only be submitted by the following: Institutions or organizations in jurisdictions that meet the EPSCoR eligibility criteria. Institutions of higher education (PhD-granting and non-PhD-granting), acting on behalf of their faculty members, that are accredited in and have a campus in the United States, its territories, or possessions. Distinct academic campuses (e.g., that award their own degrees, have independent administrative structures, admissions policies, alumni associations, etc.) within multi-campus systems qualify as separate submission-eligible organizations. Campuses that plan to submit a proposal through the Sponsored Projects Office of other campuses or organizations should contact NSF to discuss eligibility as early as possible and at least six weeks before submitting such a proposal. Not-for-profit, non-degree-granting domestic U.S. organizations, acting on behalf of their employees, that include (but are not limited to) independent museums and science centers, observatories, research laboratories, professional societies, and similar organizations that are directly associated with the Nation's research or educational activities. These organizations must have an independent, permanent administrative organization (e.g., an office of sponsored research) located in the United States, its territories, or possessions, and have 501(c)(3) tax status. Tribal Governments with the governing body of any Indian or Alaska Native tribe, band, nation, pueblo, village, or community that the Secretary of the Interior acknowledges to exist as an Indian tribe under the Federally Recognized Indian Tribe List Act of 1994 (25 U.S.C. 479a, et seq.) or Indigenous communities that are not recognized by the Federally Recognized Indian Tribe List Act of 1994 (25 U.S.C. 479a, et seq.). It is encouraged that the lead institution/organization or at least one collaborative partner be an institution from one of the categories below: Emerging Research Institutions as defined in 42 §USC 18901 as institutions of higher education with an established undergraduate or graduate program that have less than $50,000,000 in Federal research expenditures; Minority-serving institutions, as defined by the U.S. Department of Education; Primarily Undergraduate Institutions (PUIs), including two-year colleges, that award associate degrees, bachelor's degrees, and/or master's degrees in NSF-supported fields, but have awarded 20 or fewer Ph.D./D.Sci. degrees in all NSF-supported fields during the combined previous two academic years; Institutions of higher education that are dedicated to serving students with disabilities, as listed in Table 1, page 5, of NSF's 2008 Broadening Participation report ( https://nsf-gov-resources.nsf.gov/2022-03/nsf_frameworkforaction_0808.pdf ); Degree-granting women's colleges, as listed in the U.S. Department of Education Digest of Education Statistics ( https://nces.ed.gov/programs/digest/d21/tables/dt21_312.30.asp ). Proposals may be submitted either as a collaborative from multiple organizations or one organization with support for collaborators requested as subawards.

Who May Serve as PI:

Principal Investigators of proposed RII-FEC projects must be affiliated with and employed by eligible organizations in EPSCoR jurisdictions. Each EPSCoR jurisdiction participating in a proposed project must be represented by a PI or at least one co-PI. The PI and co-PIs must all have research expertise relevant to the research being proposed. PIs and Co-PIs on current RII-FEC (previously known as NSF EPSCoR RII Track-2 FEC) awards with end dates (including any No Cost Extensions) after October 31 of the year of submission are not eligible to submit proposals as a PI or Co-PI. However, an individual may serve as senior personnel on any number of RII-FEC proposals or awards.

Limit on Number of Proposals per Organization: 1

Limit on Number of Proposals per PI or co-PI: 1

Proposal Preparation and Submission Instructions

A. proposal preparation instructions.

  • Letters of Intent: Submission of Letters of Intent is required. Please see the full text of this solicitation for further information.
  • Preliminary Proposal Submission: Not required
  • Full Proposals submitted via Research.gov: NSF Proposal and Award Policies and Procedures Guide (PAPPG) guidelines apply. The complete text of the PAPPG is available electronically on the NSF website at: https://www.nsf.gov/publications/pub_summ.jsp?ods_key=pappg .
  • Full Proposals submitted via Grants.gov: NSF Grants.gov Application Guide: A Guide for the Preparation and Submission of NSF Applications via Grants.gov guidelines apply (Note: The NSF Grants.gov Application Guide is available on the Grants.gov website and on the NSF website at: https://www.nsf.gov/publications/pub_summ.jsp?ods_key=grantsgovguide ).

B. Budgetary Information

C. due dates, proposal review information criteria.

Merit Review Criteria:

National Science Board approved criteria. Additional merit review criteria apply. Please see the full text of this solicitation for further information.

Award Administration Information

Award Conditions:

Standard NSF award conditions apply.

Reporting Requirements:

Additional reporting requirements apply. Please see the full text of this solicitation for further information.

I. Introduction

A. EPSCoR Mission and Goals

The mission of EPSCoR is to enhance the research competitiveness of targeted jurisdictions (states, territories, and commonwealths) by strengthening STEM capacity and capability through a diverse portfolio of investments from talent development to local infrastructure. Through its programmatic goals, EPSCoR seeks to:

  • Catalyze the development of research capabilities and the creation of new knowledge that expands jurisdictions' contributions to scientific discovery, innovation, learning, and knowledge-based prosperity;
  • Establish sustainable STEM education, training, and professional development pathways that advance jurisdiction-identified research areas and workforce development;
  • Broaden direct participation of diverse individuals, institutions, and organizations in the project's science and engineering research and education initiatives;
  • Effect sustainable engagement of project participants and partners, the jurisdiction, the national research community, and the general public through data-sharing, communication, outreach, and dissemination; and
  • Impact research, education, and economic development beyond the project at academic, government, and private sector levels.

B. Criteria for Eligibility to Participate in the RII-FEC

Eligibility to take part in this competition is based on the current table of EPSCoR eligible jurisdictions (see EPSCoR eligibility ). Only eligible organizations in EPSCoR eligible jurisdictions may take part in this competition.

C. RII-FEC Program

Well-designed collaborative strategies are essential to EPSCoR's goal of enhancing the competitive position of research and research-based education in science and engineering. This approach can help overcome impediments posed by limited infrastructure or human capital within a single jurisdiction and can enable broad engagement at the frontiers of discovery and innovation in science and engineering.

This RII-FEC solicitation responds directly to national studies and community input, including the National Science Foundation Strategic Plan , Envisioning the Future of NSF EPSCoR report, and the CHIPS and Science Act . RII-FEC seeks to build nationally and internationally competitive collaborative teams of EPSCoR investigators by providing a mechanism to coalesce investigator expertise into a critical mass for a sustained, effective research and education partnership in NSF priority areas.

EPSCoR support of a proposed research infrastructure improvement activity should not duplicate other available federal, jurisdictional, or organizational resources and should add significant value to increasing scientific competitiveness at the national or regional level.

II. Program Description

The primary driver for RII-FEC investments is the need to build STEM-driven, inter-jurisdictional research collaborations with the potential to be nationally and internationally competitive. The Project Description should include a strong rationale for the collaboration and demonstrate that the partnership is designed to facilitate discovery and innovation in the focus area (detailed in the published biennial Dear Colleague Letter), which neither party could address as well, or as rapidly, alone. RII-FEC projects are unique in their integration of researchers into collaborative teams across EPSCoR jurisdictions, and must develop a diverse, well-prepared, STEM-enabled workforce necessary to sustain research competitiveness.

For NSF EPSCoR to achieve this vision, requires not only advancing the frontiers of science, engineering, and education but also ensuring that U.S. research is an inclusive enterprise that harnesses the talent of all sectors of American society a research enterprise that incorporates the rich demographic and geographic diversity of the nation.

Therefore, the recruitment and/or development of early-career faculty as well as groups at all levels of this project who are traditionally underrepresented in STEM fields, including postdoctoral researchers, undergraduates, graduate students, and K-12 students, are critical in achieving this goal and must be an integral component of the proposed project.

Over the long term, RII-FEC investments are expected to result in sustained improvements in research competitiveness, enabling EPSCoR investigators to successfully pursue significant opportunities of national and international importance in science and engineering research and education. It is expected that previous NSF and other federal agency investments will be leveraged and translated into advancing the understanding of the focus area. All proposals must clearly indicate the intended social impact, demonstrating how the project will benefit the community in the involved jurisdiction(s). Non-EPSCoR and international collaborations may be included, but no EPSCoR funds should be directed to these organizations

Central to the success of the proposal is a clear demonstration that the collaboration is well-positioned to produce outcomes that cannot be obtained through the efforts of a team in a single jurisdiction working alone. The proposal must clearly identify the roles and contributions of each partner in the project, the anticipated increases in research capacity and competitiveness, the projected workforce development and educational plan and outcomes, and the benefits to the jurisdictions, the Nation, and society. It is expected that these collaborations be balanced, with participating jurisdictions each contributing to and benefiting from projects at levels that are appropriate to their capabilities.

To ensure maximum impact of available programmatic funds, requests for RII-FEC funding must:

  • Add significantly to the research capacity of the participating jurisdictions in the focus area;
  • Contribute to the advancement of research and innovation in the focus area;
  • Illustrate how the participating jurisdictions' research capacities will be positively impacted by the collaborative effort;
  • Outline clear plans for the recruitment and/or development of the full spectrum of diverse talent in STEM as early-career faculty;
  • Engage the full diversity of the participating jurisdictions' resources including two- and four-year colleges, Minority-Serving Institutions, and local and state industries in STEM workforce development;
  • Include social and economic expertise to understand and assess the societal implications of the focus area, as detailed in the published biennial Dear Colleague Letter (DCL); and
  • Present a sustainability plan for obtaining subsequent, sustained non-EPSCoR funding from federal, jurisdictional, or private sector sources.

RII-FEC proposals are expected to be STEM-driven collaborations and the PI and co-PIs should all be active researchers in the research topic(s) of the proposal. Proposals should clearly explain how the proposed research, education, and workforce development activities will create or increase the capacity for the jurisdictions involved to participate in continued research. Proposals must include a timetable or strategic plan for achieving those goals, and/or a logic model with a clearly articulated theory of change that identifies appropriate indicators of progress towards the desired outcomes.

The RII-FEC focus area will be announced biennially through a DCL, found at this link: EPSCoR Program links .

Broadening Impact

EPSCoR's mission of enhancing the research competitiveness of targeted jurisdictions by strengthening STEM capacity and capability aligns with RII-FEC goals to "broaden the participation of diverse groups and institutions in STEM." By leveraging current and previous NSF substantial investments, as well as investments from other federal agencies, proposed projects are expected to create a significant and collective impact on targeted jurisdictions. Proposals submitted for RII-FEC competition could leverage already documented outcomes from any project(s) related to previous investments across multiple jurisdictions and collectively bring those outcomes together to address new opportunities that impact communities within the targeted jurisdiction(s). As a result, these projects are expected to create or establish a solid pathway towards benefiting and positively impacting the jurisdictions in concert with a diverse STEM workforce.

Proposals must demonstrate understanding of societal impacts of the research problem by incorporating relevant community members, organizations and social scientists during project development, planning, and project design. By ensuring appropriate community engagement throughout the project lifecycle, RII-FEC projects will be better positioned to have positive societal impacts in their jurisdictions and beyond. These positive societal impacts may include community empowerment through collaborative problem solving for affected communities, training for community members in project related activities, and development of innovative educational plans, among others. It is expected that project teams will implement activities that build scientific knowledge, grow the scale of impact, and ground the research agenda with attention to societal implications. Additionally, proposals should include a vision for how the project will be sustained, and a description of plans for technology transfer and/or innovation, if applicable.

Workforce Development

To address the anticipated needs of the future workforce, projects should develop strong educational programs in the proposed research areas that can be implemented across institutions of higher learning in participating jurisdictions and directly contribute to building a skilled workforce in areas associated with the project focus. Additionally, STEM talent must be cultivated in populations traditionally underrepresented in STEM for jurisdictions to keep pace with changing workforce needs. Accordingly, proposals should include a strong commitment to building a diverse workforce. Involvement and mentoring of early-career faculty is required and a detailed mentoring plan that leverages national best practices for STEM mentoring is expected. More information on NSF's commitment to broadening participation can be found in NSF's Strategic Plan.

III. Award Information

Up to 12 awards for a total funding of $18,000,000 are anticipated, pending the availability of funds. The maximum RII-FEC award amount is based on the number of eligible jurisdictions participating in the project. If organizations from two eligible EPSCoR jurisdictions collaborate on a proposal, the award amount may not exceed $4 million for up to four years. If organizations from three or more eligible EPSCoR jurisdictions collaborate on a proposal, the award amount may not exceed $6 million for up to four years. The program budget, number of awards, and average award size/duration are subject to the quality of proposals and availability of funds.

IV. Eligibility Information

Additional Eligibility Info:

V. Proposal Preparation And Submission Instructions

Letters of Intent (required) :

A Letter of Intent (LOI) must be submitted by the Authorized Organizational Representative (AOR) of the submitting organization by the applicable LOI due date. Proposals received that are not preceded by an LOI from the AOR of the submitting organization will be returned without review.

The LOI contains "Synopsis" and "Other Comments" text data fields. LOIs should use these fields to describe, in as much detail as possible, the research to be addressed by the proposal. LOIs will be used solely in preparation for merit review. LOIs will not be seen by reviewers or used in any manner to judge the merit of the proposed research. Due to the space limitations, it is in the proposer's best interest to provide information on the proposed research topics only and to avoid providing extraneous information such as prior accomplishments, motivation for the research, information on the qualifications of the project participants, etc. However, the LOI should indicate EPSCoR jurisdictions and institutions and/or organizations participating in the project.

A list of science/research keywords should be entered under the "Research Keywords" entry to assist EPSCoR staff in preparing for proposal review.

Letter of Intent Preparation Instructions :

When submitting a Letter of Intent through Research.gov in response to this Program Solicitation please note the conditions outlined below:

  • Submission by an Authorized Organizational Representative (AOR) is required when submitting Letters of Intent.
  • A Minimum of 0 and Maximum of 4 Other Senior Project Personnel are permitted
  • A Minimum of 0 and Maximum of 99 Other Participating Organizations are permitted
  • Research Keywords are required when submitting Letters of Intent
  • Submission of multiple Letters of Intent is not permitted

Full Proposal Preparation Instructions : Proposers may opt to submit proposals in response to this Program Solicitation via Research.gov or Grants.gov.

  • Full Proposals submitted via Research.gov: Proposals submitted in response to this program solicitation should be prepared and submitted in accordance with the general guidelines contained in the NSF Proposal and Award Policies and Procedures Guide (PAPPG). The complete text of the PAPPG is available electronically on the NSF website at: https://www.nsf.gov/publications/pub_summ.jsp?ods_key=pappg . Paper copies of the PAPPG may be obtained from the NSF Publications Clearinghouse, telephone (703) 292-8134 or by e-mail from [email protected] . The Prepare New Proposal setup will prompt you for the program solicitation number.
  • Full proposals submitted via Grants.gov: Proposals submitted in response to this program solicitation via Grants.gov should be prepared and submitted in accordance with the NSF Grants.gov Application Guide: A Guide for the Preparation and Submission of NSF Applications via Grants.gov . The complete text of the NSF Grants.gov Application Guide is available on the Grants.gov website and on the NSF website at: ( https://www.nsf.gov/publications/pub_summ.jsp?ods_key=grantsgovguide ). To obtain copies of the Application Guide and Application Forms Package, click on the Apply tab on the Grants.gov site, then click on the Apply Step 1: Download a Grant Application Package and Application Instructions link and enter the funding opportunity number, (the program solicitation number without the NSF prefix) and press the Download Package button. Paper copies of the Grants.gov Application Guide also may be obtained from the NSF Publications Clearinghouse, telephone (703) 292-8134 or by e-mail from [email protected] .

In determining which method to utilize in the electronic preparation and submission of the proposal, please note the following:

Collaborative Proposals. All collaborative proposals submitted as separate submissions from multiple organizations must be submitted via Research.gov. PAPPG Chapter II.E.3 provides additional information on collaborative proposals.

See PAPPG Chapter II.D.2 for guidance on the required sections of a full research proposal submitted to NSF. Please note that the proposal preparation instructions provided in this program solicitation may deviate from the PAPPG instructions.

The following instructions are specific to proposals submitted to the RII-FEC competition and supplement the NSF PAPPG and NSF Grants.gov Application Guide:

RII-FEC proposals may only be submitted by organizations in the eligible EPSCoR jurisdictions listed in Section IV of this solicitation. An organization may only serve as lead on one proposal, either as the lead on a single proposal with subawards, or as the lead on a set of separately submitted collaborative proposals.

Proposal Set-Up: Select "Prepare New Full Proposal" in Research.gov. Search for and select this solicitation title in Step One of the Full Proposal wizards. In the proposal details section, select "Single proposal (with or without subawards)" or "Separately submitted a collaborative proposal". The project title must begin with "FEC:" and follow with an informative title in the topic area.

1. Senior/Key Personnel.

The lead PI must be a researcher from the submitting jurisdiction and all other participating jurisdictions should have at least one individual designated as PI or co-PI on the proposal.

2. Project Summary (1 page maximum).

In accordance with the guidance in the PAPPG, the Project Summary must include three separate sections labeled Overview, Intellectual Merit, and Broader Impacts. In the Overview section, briefly describe the collaborating organizations; the vision and goals of the collaboration; a statement of the objectives and methods to be employed; expected impacts of the proposed activities; and plans for sustaining collaborations and impacts beyond the award period. At the end of the Broader Impacts section, indicate the Letter of Intent (LOI) number, and the NSF Directorate(s), Division(s), and Program(s) that most closely align with the proposal's research focus.

3. Project Description (20 pages maximum).

This section should present the proposed activities in a clear, compelling way and describe how the activities for which NSF support is being requested will lead to sustainable impacts. In addition to the requirements contained in the NSF PAPPG, the Project Description must articulate clear plans for elements described below.

The Project Description may not exceed 20 pages, including text, as well as any graphic or illustrative materials. Maximum page limitations also apply to specific subsections of the Project Description. Note that if the maximum page limit for each subsection is used, the total number of pages will exceed the maximum allowed for the Project Description. Proposals that exceed the page limitations or that do not contain all items described below will be returned without review.

In addition to the separate section labeled Broader Impacts required by the PAPPG, the Project Description must contain the following subsections:

3.1 Status and Overview (2 pages maximum).

Describe the motivation and rationale for establishing the collaboration, and how the proposed project addresses the identified focus area for this competition.

3.2 Results from Relevant Prior Support (2 pages maximum).

Describe results from relevant prior NSF support and other prior federal or other investments of the PIs and co-PIs in the last five years. This section should include a description of the activities and impacts of previous awards, including major accomplishments in both intellectual merit and broader impacts

3.3 Research, Collaboration, and Workforce Development (18 pages maximum).

This section of the proposal should provide a concise description of the long-term research and education goals and intellectual focus in sufficient detail to enable their scientific merit and broader impacts to be assessed. The proposal must present the proposed research in the context of other efforts in the field (with appropriate references), state the major challenges and how they will be addressed, and comment on the novelty and/or originality of the proposed approach. In addition to providing explicit evidence for the intellectual merit and broader impacts of the research and education activities, this section should:

  • Identify the faculty-level participants and estimate the numbers of postdoctoral, graduate, and undergraduate research participants. Briefly outline the resources (available and planned) to accomplish the research goals.
  • Establish the means of developing a coordinated, collaborative approach involving investigators across different organizations, jurisdictions, and disciplines. Describe interactions with other groups and organizations among the jurisdictions, and at the national and international levels, as appropriate. The research and education program description must demonstrate how the collaboration will advance research, education, and workforce development. The narrative should demonstrate how the collaboration's activities would advance the frontiers of knowledge and future research competitiveness of the participating jurisdictions in the proposed research areas.
  • Provide relevant baseline data regarding any of the research, education, workforce development, or other project targets and goals. For example, in cases where quantitative goals or targets are proposed, baseline data regarding the current situation or past performance should be given.

3.3.1 Inter-jurisdictional Collaborations and Partnerships.

Interdisciplinary collaborative research brings with it the challenge of developing productive high-performing research teams involving multiple researchers from different organizations and disciplinary expertise. This section must clearly present the rationale for the composition of the teams, a description of the leadership structure, and the context for establishing the collaboration. The research expertise of the PIs and co-PIs must be explained in the context of the proposed research activities. Coordination and synergy among the collaborators should be summarized and the role of each of the faculty-level investigators should be clearly defined. Mechanisms that foster collaboration across the teams, such as all-hands meetings, and risk-mitigation strategies should be described. The compelling ways in which the project leadership plans to coordinate the activities into a cohesive project should be presented, with well-articulated goals and strategies to achieve them.

This section must include a specific discussion of how the collaborative effort will positively impact each participating jurisdiction and its respective target population, including methodologies and metrics for measuring success. Proposals should also explain how each participating jurisdiction will contribute to and benefit from the proposed collaboration in a meaningful and distinct way.

3.3.2 Sustainability of the Team.

A detailed plan for long-term sustainability of the proposed activities and infrastructure (physical, cyber, and human) beyond the lifespan of the project is required. Plans should clearly delineate what the expected research impacts will be on the jurisdiction(s) involved and how they could holistically tie into affecting populations of the jurisdiction(s) involved. The plan must provide realistic, annual metrics to assess the short and long-term economic impacts of this project. This could include realistic timelines for new submissions of proposals to NSF and other federal and state programs by the project team in the focus area topic, or industry and state partnerships that lead to alternative pathways to sustainability. The plan should also include how proposed new faculty hires, if any, will be supported beyond the award period.

3.3.3 Workforce Development.

The scope of RII-FEC activities must include STEM workforce development activities that are integrated with the research and education components of the project and contribute to the preparation of a diverse, new cadre of skilled researchers, innovators, and educators who represent the diversity of the nation.

The workforce development plan must include explicit efforts for the recruitment and/or development of early-career faculty in the project's research activities. It should also describe in detail the mechanisms to attract and mentor these individuals, to enable their development and success as educators and researchers, and their specific contributions to achieving the project's goals in the focus area. For this solicitation, early-career faculty are defined as those who are employed as assistant professors in tenure track (or equivalent) positions, or research assistant professors at the time of submission of the proposal, or who are hired into such a position during the award period.

The research and educational training for postdoctoral, graduate, and undergraduate trainees should be designed to develop a workforce that is able to integrate as appropriate and impact the jurisdiction within the chosen topic of the project. This should provide them with skills to work easily across disciplinary and other perceived boundaries and to interface with stakeholders such as academia, industry, government, and the general public. This can include the involvement of K-12, two-year, and four-year colleges, with the intent to develop an inclusive workforce appropriate to populate new niches that are created through the project's activities. In particular, the proposed program should present an implementation strategy, informed by national best practices for building research competencies, and research mentoring. The implementation strategy should include an initial baseline assessment, clearly articulated goals, milestones, and timelines.

3.3.4 Evaluation and Assessment Plan (2 pages maximum).

An independent external evaluator must provide annual evaluation and assessment of the project. In addition, quantitative collection is required as part of the centralized project output data collection (see below) and should be used in concert with any additional quantitative or qualitative data collected by the required independent evaluator.

The Evaluation and Assessment plan should be an integral part of the project design to aid in the identification of outcomes and impacts of the project's goals and objectives as well as a tool for providing effective feedback to the management team through an independent evaluator. Evaluation plans should include strategies for formative and summative assessments, including goals, metrics, and milestones. The plan must include metrics for the strength of the collaboration and workforce development, including submission of collaborative proposals and associated awards, collaborative publications, progression of early-career faculty, innovations, research results, longitudinal tracking of undergraduates, graduate students, and post-docs, and it should document how the collaborative efforts evolve over time.

In addition to the project-specific evaluation, all RII-FEC awardees will also be required to participate in a centralized project outcomes data-collection activity coordinated by EPSCoR and carried out by its designated entity. This activity is intended to facilitate standardized, accurate metrics tracking across projects and to complement the projects' individual evaluation and assessment efforts.

3.4 Management and Implementation Plan (2 pages maximum).

Proposals must include a comprehensive plan for the project's management, including the roles and responsibilities of key personnel, how the PI and Co-PIs plan to communicate and coordinate with each other and the project team, how the centralized project output data-collection will be integrated into their evaluation mechanisms as described above, and how the project administrative requirements will be managed across all areas. The plan should describe the responsibilities of any administrative staff expected to support the project on a full or part-time basis.

4. Budget and Budget Justification .

See Section V.B. below for information and guidance.

5. Facilities, Equipment, and Other Resources.

In accordance with the guidance contained in the NSF PAPPG, provide a description of relevant available facilities, equipment, and other resources relevant to the project for each EPSCoR jurisdiction in the collaboration.

6. Senior/Key Personnel Documents

In accordance with the guidance contained in the NSF PAPPG, the following documents must be provided for each individual designated as senior/key personnel on the project:

  • Biographical Sketch(es)
  • Current and Pending (Other) Support
  • Collaborators & Other Affiliations Information
  • Synergistic Activities

It is permitted to include biographical sketches for any named collaborators ("Other Personnel") whose expertise is crucial to the success of the project, including the independent evaluator(s). If doing so, these biographical sketches must be uploaded in the Other Personnel Biographical Information section in Research.gov and they must conform to NSF guidelines for biographical sketches. Do not include biographical sketches for members of External Advisory Committees or Boards.

7. Other Supplementary Documents (in addition to those required by the NSF PAPPG)

List of Participants. Provide a list of participating senior/key personnel (faculty level and equivalent) by name, organization, and departmental affiliation. Specify the role of each participant (i.e. PI, Co-PI, Senior/Key Personnel, Other Personnel; etc.) in the list.

List of all organizations and companies involved in the project (including location). Specify the role of the organization (i.e., lead, non-lead, subawardee, etc.) in the list.

Up to a maximum of five Letters of Collaboration of two pages or less from other partners or jurisdictional officials may be included to support commitment that will be relied upon beyond the collaboration among the core partners.

Cost Sharing:

Inclusion of voluntary committed cost sharing is prohibited.

Other Budgetary Limitations:

  • Funding requests can be for durations of up to 4 years. The maximum allowed RII-FEC award amount depends on the number of participating EPSCoR jurisdictions. If organizations from two eligible EPSCoR jurisdictions collaborate on a proposal, the total award amount may not exceed $4 million for up to 4 years. If organizations from three or more eligible EPSCoR jurisdictions collaborate on a proposal, the total award amount may not exceed $6 million for up to 4 years.
  • Budgets should include sufficient funding for participation in annual jurisdictional and regional EPSCoR conferences, the annual EPSCoR PI/PD meeting, the EPSCoR National Conference, and for one RII-FEC kickoff meeting for all PIs and all co-PIs at the NSF Headquarters in Year 1 only.
  • RII-FEC projects are expected to host or facilitate project-wide meetings (virtual, hybrid, and/or in-person) such as EPSCoR all-hands workshops and/or science symposia which include support for student (undergraduate and graduate as appropriate) participants of the RII-FEC project.
  • If the proposal is being submitted as a "Submission of a collaborative proposal from one organization," budgets for participating organizations must be included as subawards to the budget of the submitting organization. Only the budget of the submitting organization (lead) may include subawards (i.e., no subawards may appear in the budgets of subawardee organizations). Each subaward must include a separate budget justification of no more than five pages.
  • If the proposal is being submitted as a "Submission of a collaborative proposal from multiple organizations," follow the instructions in PAPPG Chapter II.E.3 regarding budget submissions.
  • Organizations or institutions submitting proposal budgets with Subawards must be able to verify that the lead organization has established a system to monitor the subawards issued on Federally-sponsored projects and that appropriate agreements are in place with sub-recipients.
  • Subawards to organizations in non-EPSCoR jurisdictions are not allowed.
  • Financial compensation for any independent evaluator(s) involved in the project must be included in the budget of the submitting organization under Consultant Services. No other form of financial compensation for external evaluation services is allowed.
  • Proposal budgets must comply with the guidance in 2 CFR 200 and the current PAPPG. Proposing entities are cautioned to ensure that all costs proposed are allowable (allocable, reasonable, and necessary), especially those costs associated with Participant Support. Costs typically considered to be for entertainment, incentive, or promotional purposes should be sufficiently detailed in the budget justification to support the programmatic relevance and need. In general, costs for entertainment, amusement, and advertising/promotional purposes are unallowable and may not be requested. However, among EPSCoR's programmatic goals are emphasis on establishing STEM development pathways and broadening participation of diverse groups in STEM, which can include "Bridge" programs designed to prepare high school students for the transition to college. This may include entertainment, amusement, and/or promotional costs related to STEM enrichment activities covering a range of possible career paths or activities focusing on cohort-building and maintaining a healthy work-life balance. These categories of activities are consistent with the overall program goal of preparing students for the difficult high school to college transition. This may include residential programs for minor students whose supervisory requirements may require different choices than would be appropriate for adult students. When costs typically considered as entertainment, amusement, and promotion are necessary to accomplish the proposed objectives, they must be included in the budget and justified in the budget justification.

Proposals with budgets that depart from these instructions will be considered not responsive and may be returned without review.

D. Research.gov/Grants.gov Requirements

For Proposals Submitted Via Research.gov:

To prepare and submit a proposal via Research.gov, see detailed technical instructions available at: https://www.research.gov/research-portal/appmanager/base/desktop?_nfpb=true&_pageLabel=research_node_display&_nodePath=/researchGov/Service/Desktop/ProposalPreparationandSubmission.html . For Research.gov user support, call the Research.gov Help Desk at 1-800-381-1532 or e-mail [email protected] . The Research.gov Help Desk answers general technical questions related to the use of the Research.gov system. Specific questions related to this program solicitation should be referred to the NSF program staff contact(s) listed in Section VIII of this funding opportunity.

For Proposals Submitted Via Grants.gov:

Before using Grants.gov for the first time, each organization must register to create an institutional profile. Once registered, the applicant's organization can then apply for any federal grant on the Grants.gov website. Comprehensive information about using Grants.gov is available on the Grants.gov Applicant Resources webpage: https://www.grants.gov/applicants . In addition, the NSF Grants.gov Application Guide (see link in Section V.A) provides instructions regarding the technical preparation of proposals via Grants.gov. For Grants.gov user support, contact the Grants.gov Contact Center at 1-800-518-4726 or by email: [email protected] . The Grants.gov Contact Center answers general technical questions related to the use of Grants.gov. Specific questions related to this program solicitation should be referred to the NSF program staff contact(s) listed in Section VIII of this solicitation. Submitting the Proposal: Once all documents have been completed, the Authorized Organizational Representative (AOR) must submit the application to Grants.gov and verify the desired funding opportunity and agency to which the application is submitted. The AOR must then sign and submit the application to Grants.gov. The completed application will be transferred to Research.gov for further processing. The NSF Grants.gov Proposal Processing in Research.gov informational page provides submission guidance to applicants and links to helpful resources including the NSF Grants.gov Application Guide , Grants.gov Proposal Processing in Research.gov how-to guide , and Grants.gov Submitted Proposals Frequently Asked Questions . Grants.gov proposals must pass all NSF pre-check and post-check validations in order to be accepted by Research.gov at NSF. When submitting via Grants.gov, NSF strongly recommends applicants initiate proposal submission at least five business days in advance of a deadline to allow adequate time to address NSF compliance errors and resubmissions by 5:00 p.m. submitting organization's local time on the deadline. Please note that some errors cannot be corrected in Grants.gov. Once a proposal passes pre-checks but fails any post-check, an applicant can only correct and submit the in-progress proposal in Research.gov.

Proposers that submitted via Research.gov may use Research.gov to verify the status of their submission to NSF. For proposers that submitted via Grants.gov, until an application has been received and validated by NSF, the Authorized Organizational Representative may check the status of an application on Grants.gov. After proposers have received an e-mail notification from NSF, Research.gov should be used to check the status of an application.

VI. NSF Proposal Processing And Review Procedures

Proposals received by NSF are assigned to the appropriate NSF program for acknowledgement and, if they meet NSF requirements, for review. All proposals are carefully reviewed by a scientist, engineer, or educator serving as an NSF Program Officer, and usually by three to ten other persons outside NSF either as ad hoc reviewers, panelists, or both, who are experts in the particular fields represented by the proposal. These reviewers are selected by Program Officers charged with oversight of the review process. Proposers are invited to suggest names of persons they believe are especially well qualified to review the proposal and/or persons they would prefer not review the proposal. These suggestions may serve as one source in the reviewer selection process at the Program Officer's discretion. Submission of such names, however, is optional. Care is taken to ensure that reviewers have no conflicts of interest with the proposal. In addition, Program Officers may obtain comments from site visits before recommending final action on proposals. Senior NSF staff further review recommendations for awards. A flowchart that depicts the entire NSF proposal and award process (and associated timeline) is included in PAPPG Exhibit III-1.

A comprehensive description of the Foundation's merit review process is available on the NSF website at: https://www.nsf.gov/bfa/dias/policy/merit_review/ .

Proposers should also be aware of core strategies that are essential to the fulfillment of NSF's mission, as articulated in Leading the World in Discovery and Innovation, STEM Talent Development and the Delivery of Benefits from Research - NSF Strategic Plan for Fiscal Years (FY) 2022 - 2026 . These strategies are integrated in the program planning and implementation process, of which proposal review is one part. NSF's mission is particularly well-implemented through the integration of research and education and broadening participation in NSF programs, projects, and activities.

One of the strategic objectives in support of NSF's mission is to foster integration of research and education through the programs, projects, and activities it supports at academic and research institutions. These institutions must recruit, train, and prepare a diverse STEM workforce to advance the frontiers of science and participate in the U.S. technology-based economy. NSF's contribution to the national innovation ecosystem is to provide cutting-edge research under the guidance of the Nation's most creative scientists and engineers. NSF also supports development of a strong science, technology, engineering, and mathematics (STEM) workforce by investing in building the knowledge that informs improvements in STEM teaching and learning.

NSF's mission calls for the broadening of opportunities and expanding participation of groups, institutions, and geographic regions that are underrepresented in STEM disciplines, which is essential to the health and vitality of science and engineering. NSF is committed to this principle of diversity and deems it central to the programs, projects, and activities it considers and supports.

A. Merit Review Principles and Criteria

The National Science Foundation strives to invest in a robust and diverse portfolio of projects that creates new knowledge and enables breakthroughs in understanding across all areas of science and engineering research and education. To identify which projects to support, NSF relies on a merit review process that incorporates consideration of both the technical aspects of a proposed project and its potential to contribute more broadly to advancing NSF's mission "to promote the progress of science; to advance the national health, prosperity, and welfare; to secure the national defense; and for other purposes." NSF makes every effort to conduct a fair, competitive, transparent merit review process for the selection of projects.

1. Merit Review Principles

These principles are to be given due diligence by PIs and organizations when preparing proposals and managing projects, by reviewers when reading and evaluating proposals, and by NSF program staff when determining whether or not to recommend proposals for funding and while overseeing awards. Given that NSF is the primary federal agency charged with nurturing and supporting excellence in basic research and education, the following three principles apply:

  • All NSF projects should be of the highest quality and have the potential to advance, if not transform, the frontiers of knowledge.
  • NSF projects, in the aggregate, should contribute more broadly to achieving societal goals. These "Broader Impacts" may be accomplished through the research itself, through activities that are directly related to specific research projects, or through activities that are supported by, but are complementary to, the project. The project activities may be based on previously established and/or innovative methods and approaches, but in either case must be well justified.
  • Meaningful assessment and evaluation of NSF funded projects should be based on appropriate metrics, keeping in mind the likely correlation between the effect of broader impacts and the resources provided to implement projects. If the size of the activity is limited, evaluation of that activity in isolation is not likely to be meaningful. Thus, assessing the effectiveness of these activities may best be done at a higher, more aggregated, level than the individual project.

With respect to the third principle, even if assessment of Broader Impacts outcomes for particular projects is done at an aggregated level, PIs are expected to be accountable for carrying out the activities described in the funded project. Thus, individual projects should include clearly stated goals, specific descriptions of the activities that the PI intends to do, and a plan in place to document the outputs of those activities.

These three merit review principles provide the basis for the merit review criteria, as well as a context within which the users of the criteria can better understand their intent.

2. Merit Review Criteria

All NSF proposals are evaluated through use of the two National Science Board approved merit review criteria. In some instances, however, NSF will employ additional criteria as required to highlight the specific objectives of certain programs and activities.

The two merit review criteria are listed below. Both criteria are to be given full consideration during the review and decision-making processes; each criterion is necessary but neither, by itself, is sufficient. Therefore, proposers must fully address both criteria. (PAPPG Chapter II.D.2.d(i). contains additional information for use by proposers in development of the Project Description section of the proposal). Reviewers are strongly encouraged to review the criteria, including PAPPG Chapter II.D.2.d(i), prior to the review of a proposal.

When evaluating NSF proposals, reviewers will be asked to consider what the proposers want to do, why they want to do it, how they plan to do it, how they will know if they succeed, and what benefits could accrue if the project is successful. These issues apply both to the technical aspects of the proposal and the way in which the project may make broader contributions. To that end, reviewers will be asked to evaluate all proposals against two criteria:

  • Intellectual Merit: The Intellectual Merit criterion encompasses the potential to advance knowledge; and
  • Broader Impacts: The Broader Impacts criterion encompasses the potential to benefit society and contribute to the achievement of specific, desired societal outcomes.

The following elements should be considered in the review for both criteria:

  • Advance knowledge and understanding within its own field or across different fields (Intellectual Merit); and
  • Benefit society or advance desired societal outcomes (Broader Impacts)?
  • To what extent do the proposed activities suggest and explore creative, original, or potentially transformative concepts?
  • Is the plan for carrying out the proposed activities well-reasoned, well-organized, and based on a sound rationale? Does the plan incorporate a mechanism to assess success?
  • How well qualified is the individual, team, or organization to conduct the proposed activities?
  • Are there adequate resources available to the PI (either at the home organization or through collaborations) to carry out the proposed activities?

Broader impacts may be accomplished through the research itself, through the activities that are directly related to specific research projects, or through activities that are supported by, but are complementary to, the project. NSF values the advancement of scientific knowledge and activities that contribute to achievement of societally relevant outcomes. Such outcomes include, but are not limited to: full participation of women, persons with disabilities, and other underrepresented groups in science, technology, engineering, and mathematics (STEM); improved STEM education and educator development at any level; increased public scientific literacy and public engagement with science and technology; improved well-being of individuals in society; development of a diverse, globally competitive STEM workforce; increased partnerships between academia, industry, and others; improved national security; increased economic competitiveness of the United States; and enhanced infrastructure for research and education.

Proposers are reminded that reviewers will also be asked to review the Data Management and Sharing Plan and the Mentoring Plan, as appropriate.

Additional Solicitation Specific Review Criteria

Reviewers for the FEC competition will also consider the following specific review criteria:

Research Capacity – What is the potential impact of the project on enhancing STEM research competitiveness and developing STEM research capacity and infrastructure in the jurisdictions (including physical, cyber, and human resources)?

Workforce Development – How will the recruitment and development of early-career faculty and postdoctoral, graduate, and undergraduate trainees contribute to the preparation of a full spectrum of diverse, new cadre of skilled researchers, innovators, and educators able to work across boundaries and interface with stakeholders in areas associated with the project focus?

Inter-jurisdictional Collaboration – Is there a balanced, sustainable, collaborative effort of activities such that each jurisdiction is contributing to and benefiting from the project at an appropriate level?

Integration of Project Elements – How well developed is the integration of, and synergy between, the research, education, workforce development, sustainability, project coordination, and evaluation elements of the project?

B. Review and Selection Process

Proposals submitted in response to this program solicitation will be reviewed by Ad hoc Review and/or Panel Review.

Reviewers will be asked to evaluate proposals using two National Science Board approved merit review criteria and, if applicable, additional program specific criteria. A summary rating and accompanying narrative will generally be completed and submitted by each reviewer and/or panel. The Program Officer assigned to manage the proposal's review will consider the advice of reviewers and will formulate a recommendation.

After scientific, technical and programmatic review and consideration of appropriate factors, the NSF Program Officer recommends to the cognizant Division Director whether the proposal should be declined or recommended for award. NSF strives to be able to tell proposers whether their proposals have been declined or recommended for funding within six months. Large or particularly complex proposals or proposals from new recipients may require additional review and processing time. The time interval begins on the deadline or target date, or receipt date, whichever is later. The interval ends when the Division Director acts upon the Program Officer's recommendation.

After programmatic approval has been obtained, the proposals recommended for funding will be forwarded to the Division of Grants and Agreements or the Division of Acquisition and Cooperative Support for review of business, financial, and policy implications. After an administrative review has occurred, Grants and Agreements Officers perform the processing and issuance of a grant or other agreement. Proposers are cautioned that only a Grants and Agreements Officer may make commitments, obligations or awards on behalf of NSF or authorize the expenditure of funds. No commitment on the part of NSF should be inferred from technical or budgetary discussions with a NSF Program Officer. A Principal Investigator or organization that makes financial or personnel commitments in the absence of a grant or cooperative agreement signed by the NSF Grants and Agreements Officer does so at their own risk.

Once an award or declination decision has been made, Principal Investigators are provided feedback about their proposals. In all cases, reviews are treated as confidential documents. Verbatim copies of reviews, excluding the names of the reviewers or any reviewer-identifying information, are sent to the Principal Investigator/Project Director by the Program Officer. In addition, the proposer will receive an explanation of the decision to award or decline funding.

VII. Award Administration Information

A. notification of the award.

Notification of the award is made to the submitting organization by an NSF Grants and Agreements Officer. Organizations whose proposals are declined will be advised as promptly as possible by the cognizant NSF Program administering the program. Verbatim copies of reviews, not including the identity of the reviewer, will be provided automatically to the Principal Investigator. (See Section VI.B. for additional information on the review process.)

B. Award Conditions

An NSF award consists of: (1) the award notice, which includes any special provisions applicable to the award and any numbered amendments thereto; (2) the budget, which indicates the amounts, by categories of expense, on which NSF has based its support (or otherwise communicates any specific approvals or disapprovals of proposed expenditures); (3) the proposal referenced in the award notice; (4) the applicable award conditions, such as Grant General Conditions (GC-1)*; or Research Terms and Conditions* and (5) any announcement or other NSF issuance that may be incorporated by reference in the award notice. Cooperative agreements also are administered in accordance with NSF Cooperative Agreement Financial and Administrative Terms and Conditions (CA-FATC) and the applicable Programmatic Terms and Conditions. NSF awards are electronically signed by an NSF Grants and Agreements Officer and transmitted electronically to the organization via e-mail.

*These documents may be accessed electronically on NSF's Website at https://www.nsf.gov/awards/managing/award_conditions.jsp?org=NSF . Paper copies may be obtained from the NSF Publications Clearinghouse, telephone (703) 292-8134 or by e-mail from [email protected] .

More comprehensive information on NSF Award Conditions and other important information on the administration of NSF awards is contained in the NSF Proposal & Award Policies & Procedures Guide (PAPPG) Chapter VII, available electronically on the NSF Website at https://www.nsf.gov/publications/pub_summ.jsp?ods_key=pappg .

Administrative and National Policy Requirements

Build America, Buy America

As expressed in Executive Order 14005, Ensuring the Future is Made in All of America by All of America’s Workers (86 FR 7475), it is the policy of the executive branch to use terms and conditions of Federal financial assistance awards to maximize, consistent with law, the use of goods, products, and materials produced in, and services offered in, the United States.

Consistent with the requirements of the Build America, Buy America Act (Pub. L. 117-58, Division G, Title IX, Subtitle A, November 15, 2021), no funding made available through this funding opportunity may be obligated for an award unless all iron, steel, manufactured products, and construction materials used in the project are produced in the United States. For additional information, visit NSF's Build America, Buy America webpage.

TBD - Programmatic Terms and Conditions:

Programmatic Terms and Conditions, if applicable, are outcomes of the proposal specific merit review process.

TBD - Financial and Administrative Terms and Conditions:

EPSCoR funds must be expended within EPSCoR jurisdictions.

C. Reporting Requirements

For all multi-year grants (including both standard and continuing grants), the Principal Investigator must submit an annual project report to the cognizant Program Officer no later than 90 days prior to the end of the current budget period. (Some programs or awards require submission of more frequent project reports). No later than 120 days following expiration of a grant, the PI also is required to submit a final annual project report, and a project outcomes report for the general public.

Failure to provide the required annual or final annual project reports, or the project outcomes report, will delay NSF review and processing of any future funding increments as well as any pending proposals for all identified PIs and co-PIs on a given award. PIs should examine the formats of the required reports in advance to assure availability of required data.

PIs are required to use NSF's electronic project-reporting system, available through Research.gov, for preparation and submission of annual and final annual project reports. Such reports provide information on accomplishments, project participants (individual and organizational), publications, and other specific products and impacts of the project. Submission of the report via Research.gov constitutes certification by the PI that the contents of the report are accurate and complete. The project outcomes report also must be prepared and submitted using Research.gov. This report serves as a brief summary, prepared specifically for the public, of the nature and outcomes of the project. This report will be posted on the NSF website exactly as it is submitted by the PI.

More comprehensive information on NSF Reporting Requirements and other important information on the administration of NSF awards is contained in the NSF Proposal & Award Policies & Procedures Guide (PAPPG) Chapter VII, available electronically on the NSF Website at https://www.nsf.gov/publications/pub_summ.jsp?ods_key=pappg .

The annual and final annual project reports must include identification of numbers of women and members of other underrepresented groups in faculty and staff positions and as participants in the activities funded by the award.

VIII. Agency Contacts

Please note that the program contact information is current at the time of publishing. See program website for any updates to the points of contact.

General inquiries regarding this program should be made to:

For questions related to the use of NSF systems contact:

For questions relating to Grants.gov contact:

  • Grants.gov Contact Center: If the Authorized Organizational Representatives (AOR) has not received a confirmation message from Grants.gov within 48 hours of submission of application, please contact via telephone: 1-800-518-4726; e-mail: [email protected] .

IX. Other Information

The NSF website provides the most comprehensive source of information on NSF Directorates (including contact information), programs and funding opportunities. Use of this website by potential proposers is strongly encouraged. In addition, "NSF Update" is an information-delivery system designed to keep potential proposers and other interested parties apprised of new NSF funding opportunities and publications, important changes in proposal and award policies and procedures, and upcoming NSF Grants Conferences . Subscribers are informed through e-mail or the user's Web browser each time new publications are issued that match their identified interests. "NSF Update" also is available on NSF's website .

Grants.gov provides an additional electronic capability to search for Federal government-wide grant opportunities. NSF funding opportunities may be accessed via this mechanism. Further information on Grants.gov may be obtained at https://www.grants.gov .

About The National Science Foundation

The National Science Foundation (NSF) is an independent Federal agency created by the National Science Foundation Act of 1950, as amended (42 USC 1861-75). The Act states the purpose of the NSF is "to promote the progress of science; [and] to advance the national health, prosperity, and welfare by supporting research and education in all fields of science and engineering."

NSF funds research and education in most fields of science and engineering. It does this through grants and cooperative agreements to more than 2,000 colleges, universities, K-12 school systems, businesses, informal science organizations and other research organizations throughout the US. The Foundation accounts for about one-fourth of Federal support to academic institutions for basic research.

NSF receives approximately 55,000 proposals each year for research, education and training projects, of which approximately 11,000 are funded. In addition, the Foundation receives several thousand applications for graduate and postdoctoral fellowships. The agency operates no laboratories itself but does support National Research Centers, user facilities, certain oceanographic vessels and Arctic and Antarctic research stations. The Foundation also supports cooperative research between universities and industry, US participation in international scientific and engineering efforts, and educational activities at every academic level.

Facilitation Awards for Scientists and Engineers with Disabilities (FASED) provide funding for special assistance or equipment to enable persons with disabilities to work on NSF-supported projects. See the NSF Proposal & Award Policies & Procedures Guide Chapter II.F.7 for instructions regarding preparation of these types of proposals.

The National Science Foundation has Telephonic Device for the Deaf (TDD) and Federal Information Relay Service (FIRS) capabilities that enable individuals with hearing impairments to communicate with the Foundation about NSF programs, employment or general information. TDD may be accessed at (703) 292-5090 and (800) 281-8749, FIRS at (800) 877-8339.

The National Science Foundation Information Center may be reached at (703) 292-5111.

The National Science Foundation promotes and advances scientific progress in the United States by competitively awarding grants and cooperative agreements for research and education in the sciences, mathematics, and engineering.

To get the latest information about program deadlines, to download copies of NSF publications, and to access abstracts of awards, visit the NSF Website at

2415 Eisenhower Avenue, Alexandria, VA 22314

(NSF Information Center)

(703) 292-5111

(703) 292-5090

 

Send an e-mail to:

or telephone:

(703) 292-8134

(703) 292-5111

Privacy Act And Public Burden Statements

The information requested on proposal forms and project reports is solicited under the authority of the National Science Foundation Act of 1950, as amended. The information on proposal forms will be used in connection with the selection of qualified proposals; and project reports submitted by proposers will be used for program evaluation and reporting within the Executive Branch and to Congress. The information requested may be disclosed to qualified reviewers and staff assistants as part of the proposal review process; to proposer institutions/grantees to provide or obtain data regarding the proposal review process, award decisions, or the administration of awards; to government contractors, experts, volunteers and researchers and educators as necessary to complete assigned work; to other government agencies or other entities needing information regarding proposers or nominees as part of a joint application review process, or in order to coordinate programs or policy; and to another Federal agency, court, or party in a court or Federal administrative proceeding if the government is a party. Information about Principal Investigators may be added to the Reviewer file and used to select potential candidates to serve as peer reviewers or advisory committee members. See System of Record Notices , NSF-50 , "Principal Investigator/Proposal File and Associated Records," and NSF-51 , "Reviewer/Proposal File and Associated Records." Submission of the information is voluntary. Failure to provide full and complete information, however, may reduce the possibility of receiving an award.

An agency may not conduct or sponsor, and a person is not required to respond to, an information collection unless it displays a valid Office of Management and Budget (OMB) control number. The OMB control number for this collection is 3145-0058. Public reporting burden for this collection of information is estimated to average 120 hours per response, including the time for reviewing instructions. Send comments regarding the burden estimate and any other aspect of this collection of information, including suggestions for reducing this burden, to:

Suzanne H. Plimpton Reports Clearance Officer Policy Office, Division of Institution and Award Support Office of Budget, Finance, and Award Management National Science Foundation Alexandria, VA 22314

National Science Foundation

IMAGES

  1. 21+ SAMPLE Cyber Security Proposal in PDF

    phd research proposal in cyber security pdf

  2. Cyber Security Research Proposal

    phd research proposal in cyber security pdf

  3. Novel PhD Research Proposal in Cyber Security [Research Guide]

    phd research proposal in cyber security pdf

  4. (PDF) Overview of Cyber Security

    phd research proposal in cyber security pdf

  5. 21+ SAMPLE Cyber Security Proposal in PDF

    phd research proposal in cyber security pdf

  6. SOP for MS in Cyber Security

    phd research proposal in cyber security pdf

VIDEO

  1. Cybersecurity portfolio for business

  2. Keynote

  3. Internet & Web Technology important Questions||RGPV CSE 5TH SEM|| #RGPV#IWT#RGPVIWTQUESTION#rgpvexam

  4. How to write research proposal for phd

  5. China's Cyberspace ID: Privacy Protector or Surveillance Tool?

  6. PhD Research Proposal

COMMENTS

  1. PDF AI and Cyber Security for Cyber Physical Systems

    ery from Cyber Attacks in Cyber-Physical SystemsThis position focuses on the recovery fr. m cyber attacks in Cyber-Physical Systems (CPS). This research will delve into the unique challenges and open problems assoc. ated with this critical aspect of cybersecurity. Unlike traditional IT systems, CPS integrate computational and physical.

  2. (PDF) Research Proposal for Cyber Security and Resilience

    Introduc on. The world is increasingly becoming digi zed, and with this, the threat of cyber a acks is also on the rise. Cybersecurity and resilience have become essen al components in ensuring ...

  3. PDF CyRes

    such holistic, multidisciplinary research in cyber security. This proposal aims to establish a cyber security research center at the University of Pittsburgh whose goal will be to foster highly integrated, holistic and interdisciplinary undertakings that push the boundaries of cyber security research and development.

  4. PDF RISK IN CYBER SYSTEMS A DISSERTATION

    RISK IN CYBER SYSTEMS A DISSERTATION ... - Stacks

  5. PDF CYBERSECURITY: HOW SAFE ARE WE AS A NATION?

    My research examines the vulnerabilities, and cites case studies, national policy and expert analysis. I will explore the ways forward, drawing from the national conversation and most recent developments on the issue. My hypothesis is that we need a national shift in thinking on cybersecurity; we need to strengthen the cyber culture. To

  6. PDF Cyber Security Research Topics For Phd (Download Only)

    Proposal Dr. Humayun Bakht,2020-07-17 Cyber Security Preventing Unauthorised Access MSc and or PhD Research Project Proposal The Cybersecurity Body of Knowledge Daniel Shoemaker,Anne Kohnke,Ken Sigler,2020-04-08 The ... PDF, MOBI, and More Cyber Security Research Topics For Phd Compatibility with Devices ... Cyber Security Research Topics For ...

  7. (PDF) Cyber Crime Research Proposal

    This research will therefore be broken down into three major categories namely: 1. 2. 3. Cyber-Crime Control (CCC) Cyber-Crime Prevention (CCP) Cyber-Crime Investigation (CCI) Cyber-Crime Control (CCC): This will deal with the formation of adequate policies to control cybercrime activities.

  8. Exploring Industry Cybersecurity Strategy in Protecting Critical

    Research of cybersecurity strategy in critical infrastructure has mostly focused upon cyber vulnerabilities and the creation of associated checklists or 'best practices', in an attempt to address the maturation of cyber threats against critical infrastructure (Quigley, Burns, & Stallard, 2015).

  9. Suggested PhD Projects

    From time to time, we offer funded PhD scholarships. Such scholarships are normally funded via the Institute of Cyber Security for Society (iCSS), School of Computing, Division of Computing, Engineering and Mathematical Sciences (CEMS), the University of Kent or external funders. Please note that the 2025 PhD scholarships are to be announced.

  10. PhD Thesis

    ThesisPDF Available. PhD Thesis - Vulnerability Analysis for Critical Infrastructures. September 2022. Thesis for: Doctor of Philosophy. Advisor: Professor Yacine Atif; Professor Manfred A ...

  11. (PDF) Research Paper on Cyber Security

    (PDF) Research Paper on Cyber Security

  12. Cyber Security, Privacy and Trust PhD

    As a research student in the School of Informatics, you will have access to a highly respected academic staff community, including staff who have won prizes for their research and who are Fellows of learned societies. The University of Edinburgh has been recognised as a UK Academic Centre of Excellence in Cyber Security Research.

  13. PhD Research Project Proposal Title National Security, Cybersecurity

    Proposed Methodology A mixed-method approach will be used to carry out the research to involve the following: literature review and reports analysis of current business and government ethics on privacy and security process, insight of the future of IoT and existing policy.

  14. PDF Proposal for the Development of Models of Cyber Security with

    Project Description. We are interested in developing concepts about models of cyber security to serve as an inspiration for researchers to advance the technology of models for counteracting cyber threats; for practitioners to use as a guide for responding to cyber terror; for university students to use in preparing for careers in cyber security ...

  15. User Awareness and Knowledge of Cybersecurity and the Impact of

    Walden University. College of Management and Technology This is to certify that the doctoral dissertation by Jermaine Jewel Jean-Pierre has been found to be complete and satisfactory in all respects,

  16. PDF Proposal for a Joint Cyber Security and Policy Program at Tufts University

    Executive Summary of Proposal. We request the creation of a Bridge Professorship to strengthen expertise at Tufts in Cyber Security and Policy and to provide leadership for the creation of a variety of degree programs in Cyber Security and Policy. Cyber Security and Policy is an emerging cross-disciplinary field that impacts many aspects of our ...

  17. Cyber Security Research Proposal

    This research proposal aims to study the use of sandboxing in improving cyber security. Sandboxing works by separating an institution's programs from untrusted external sources to protect against viruses and hacking. If machines are infected, it can disrupt important operations. The study seeks to determine the need for sandboxing and establish ...

  18. Research Proposal on Cyber Security

    These two technologies create security creates a shield over the organization's data to prevent illegal users. In this, cybersecurity deals with intelligent online cyber-attacks. In fact, information/network security is recognized as part of cybersecurity. Overall, it is the best protective technology to detect and prevent cyber-attacks.

  19. Shodhganga@INFLIBNET: Prevention of Cyber Crimes in India A Comparative

    The Shodhganga@INFLIBNET Centre provides a platform for research students to deposit their Ph.D. theses and make it available to the entire scholarly community in open access. ... 13. judicial response to cyber crimes (1).pdf: 480.02 kB: Adobe PDF: View/Open: 14. cyber crime its problem and prevention corrected.pdf: 520.63 kB: Adobe PDF: View ...

  20. PDF USG ACADEMIC PROGRAM PROPOSAL

    20-semester credit hours. Master's level programs have a. aximum of 36-semester hours. Semester credit-hours for the program of study that are above these requirements require a waiver to degree-credit ho. equest with this proposal. State whether semester credit-hours exceed maximum limits for the academic pr.

  21. Cyber Crime Research Proposal

    Cyber Crime Research Proposal - Free download as PDF File (.pdf), Text File (.txt) or read online for free. This document is a research proposal submitted to Cranfield University for a PhD on cyber crime control, prevention and investigation. The proposal outlines three areas of focus: cyber crime control, cyber crime prevention, and cyber crime investigation.

  22. PDF Cyber Security Research Topics For Phd

    Bakht,2020-07-17 Cyber Security Preventing Unauthorised Access MSc and or PhD Research Project Proposal The ... PDF, MOBI, and More Cyber Security Research Topics For Phd Compatibility with Devices ... Cyber Security Research Topics For Phd books and manuals for download are incredibly convenient. With just a computer or

  23. PDF Proposal for MSc in Cyber Security, Privacy, and Trust (Graduate-Level

    Cyber Security Resilience Team, Tesco bank and Morgan Stanley. Student numbers will be 10 in the first year, then increasing to 25 or more thereafter. There is a strong push from central government for research and teaching in cyber security, as part of the national UK Cyber Security Strategy.

  24. NSF 24-573: EPSCoR Research Infrastructure Improvement-Focused EPSCoR

    Institutions of higher education (PhD-granting and non-PhD-granting), acting on behalf of their faculty members, that are accredited in and have a campus in the United States, its territories, or possessions. ... (physical, cyber, and human) beyond the lifespan of the project is required. Plans should clearly delineate what the expected ...