FUNDING > Secure and Trustworthy...
Directorate for Computer & Information Science & Engineering
Secure and Trustworthy Cyberspace (SaTC)
email@example.com, (703) 292-8491
Important Notice to Proposers
A revised version of the NSF Proposal & Award Policies & Procedures Guide (PAPPG), NSF 13-1, was issued on October 4, 2012 and is effective for proposals submitted, or due, on or after January 14, 2013. Please be advised that, depending on the specified due date, the guidelines contained in NSF 13-1 may apply to proposals submitted in response to this funding opportunity.
Please be aware that significant changes have been made to the PAPPG to implement revised merit review criteria based on the National Science Board (NSB) report, National Science Foundation's Merit Review Criteria: Review and Revisions. While the two merit review criteria remain unchanged (Intellectual Merit and Broader Impacts), guidance has been provided to clarify and improve the function of the criteria. Changes will affect the project summary and project description sections of proposals. Annual and final reports also will be affected.
Full Proposal Window: September 2, 2014 - September 19, 2014
September 2 - September 19, Annually Thereafter
Full Proposal Window: November 4, 2014 - November 19, 2014
November 4 - November 19, Annually Thereafter
Full Proposal Window: December 4, 2014 - December 19, 2014
CYBERSECURITY EDUCATION Projects
December 4 - December 19, Annually Thereafter
Full Proposal Window: January 2, 2015 - January 14, 2015
January 2 - January 14, Annually Thereafter
Cyberspace has transformed the daily lives of people for the better. The rush to adopt cyberspace, however, has exposed its fragility and vulnerabilities: corporations, agencies, national infrastructure and individuals have been victims of cyber-attacks. In December 2011, the National Science and Technology Council (NSTC) with the cooperation of NSF issued a broad, coordinated federal strategic plan for cybersecurity research and development to "change the game," minimize the misuses of cyber technology, bolster education and training in cybersecurity, establish a science of cybersecurity, and transition promising cybersecurity research into practice. This challenge requires a dedicated approach to research, development, and education that leverages the disciplines of mathematics and statistics, the social sciences, and engineering together with the computing, communications and information sciences.
The Secure and Trustworthy Cyberspace (SaTC) program welcomes proposals that address Cybersecurity from a Trustworthy Computing Systems (TWC) perspective and/or a Social, Behavioral and Economic Sciences (SBE) perspective (see "Perspectives"). In addition, we welcome proposals that integrate research addressing both of these perspectives as well as proposals focusing entirely on Cybersecurity Education (see below). Proposals may be submitted in one of the following three categories:
- Small projects: up to $500,000 in total budget, with durations of up to three years
- Medium projects: $500,001 to $1,200,000 in total budget, with durations of up to four years
- Frontier projects: $1,200,001 to $10,000,000 in total budget, with durations of up to five years
Projects with Trustworthy Computing Systems and/or Social, Behavioral and Economic Sciences perspectives may include a Transition to Practice (TTP) option, described in a supplemental document of no more than five pages. This document should describe how successful research results are to be further developed, matured, and experimentally deployed in organizations or industries, including in networks and end systems used by members of the NSF science and engineering communities. Proposals with a TTP option may exceed the above-stated maxima by up to $167,000 for Small projects, $400,000 for Medium projects and $750,000 for Frontier projects.
In addition, the SaTC program seeks proposals addressing Cybersecurity Education with total budgets limited to $300,000 and durations of up to two years. Cybersecurity education projects may not include any of the three perspectives named above.