text-only page produced automatically by LIFT Text Transcoder Skip all navigation and go to page contentSkip top navigation and go to directorate navigationSkip top navigation and go to page navigation
National Science Foundation Home National Science Foundation - Computer & Information Science & Engineering (CISE)
Computer & Information Science & Engineering (CISE)
design element
About CISE
Funding Opportunities
Advisory Committee
Career Opportunities
Advisory Committee for Cyberinfrastructure
See Additional CISE Resources
View CISE Staff
CISE Organizations
Advanced Cyberinfrastructure (ACI)
Computing and Communication Foundations (CCF)
Computer and Network Systems (CNS)
Information & Intelligent Systems (IIS)
Proposals and Awards
Proposal and Award Policies and Procedures Guide
Proposal Preparation and Submission
bullet Grant Proposal Guide
  bullet Grants.gov Application Guide
Award and Administration
bullet Award and Administration Guide
Award Conditions
Merit Review
NSF Outreach
Policy Office
Additional CISE Resources
Advisory Committee Meetings
Career Opportunities
Funding Rates
Budget Excerpt
Assistant Director's Presentations and Congressional Testimony
CS Bits & Bytes
CISE Distinguished Lecture Series
Cyberlearning Webinar Series
Data Science Webinar Series
Smart & Connected Health Webinar Series
WATCH Series
CISE Strategic Plan for Broadening Participation
Keith Marzullo on Serving in CISE
Cybersecurity Ideas Lab Report
Other Site Features
Special Reports
Research Overviews
Multimedia Gallery
Classroom Resources
NSF-Wide Investments

Email this pagePrint this page
Secure and Trustworthy Cyberspace - News

Page: Previous | Next (Showing: 1-30 of 36) | Search News

Yinzhi Cao New 'machine unlearning' technique wipes out unwanted data quickly and completely
Released March 14, 2016
News From the Field
image of doodling on a smartphone Smartphone security: Why doodling trumps text passwords
Released March 10, 2016
News From the Field
Damon McCoy Renter beware: Study finds Craigslist catches barely half of scam rental listings
Released March 1, 2016
News From the Field
Man jolds a commercial prototype of Wanda device Security with the wave of a wand
Released February 29, 2016
Press Release
image of electrical grids Device 'fingerprints' could help protect power grid, other industrial systems
Released February 29, 2016
News From the Field
security password blanket Carnegie Mellon, Stanford researchers devise method to safely share password data
Released February 22, 2016
News From the Field
Bitcoin Rutgers Bitcoin study reveals false beliefs on ease of use and privacy
Released January 25, 2016
News From the Field
screenshot of cybersecurity special report New special report highlights NSF-funded cybersecurity research and education
Released October 30, 2015
Press Release
computing graphic Researchers find vulnerabilities in use of certificates for Web security
Released October 28, 2015
News From the Field
sunlight shining through clouds New tool expands tracking of personal data on the Web
Released October 9, 2015
News From the Field
Visualization of the routing paths of the Internet NSF awards $74.5 million to support interdisciplinary cybersecurity research
Released October 7, 2015
Press Release
illustration showing a computer and people Theoretical computer science provides answers to data privacy problem
Released October 7, 2015
Press Release
SafePay 'SafePay': First antifraud system to use existing credit card readers
Released September 21, 2015
News From the Field
security lock console background Researchers tackle issues surrounding security tools for software developers
Released August 24, 2015
News From the Field
graphic showing model of a half-million biomarkers related to a type of brain cancer Limiting 'false discoveries'
Released August 6, 2015
Press Release
Aaron Roth New algorithm aimed at combating science's reproducibility problem
Released August 6, 2015
News From the Field
image of people working with different electronics Computer security tools for journalists lacking in a post-Snowden world
Released July 22, 2015
News From the Field
Nest thermostat How a new cloud computing system could turn anyone into a tech entrepreneur
Released June 12, 2015
News From the Field
computing grahic Brain's reaction to certain words could replace passwords
Released June 2, 2015
News From the Field
screenshot from a video game Researchers help video gamers play in the cloud without guzzling gigabytes
Released May 20, 2015
News From the Field
Raven II pegboard UW researchers hack a teleoperated surgical robot to reveal security flaws
Released May 7, 2015
News From the Field
screen shot of a daily message, or privacy nudge CMU study finds location sharing by apps prompts privacy action
Released March 23, 2015
News From the Field
researcher measures electromagnetic emissions Researchers work to counter a new class of coffee shop hackers
Released January 8, 2015
News From the Field
a smartphone with the Rutgers app Rutgers engineers create smartphone app to cut risk of power outages
Released November 14, 2014
News From the Field
the three devices the researchers examined Wireless devices used by casual pilots vulnerable to hacking, computer scientists find
Released November 10, 2014
News From the Field
illustartion showing a fingerprint and computer circuits Leading researchers to discuss privacy and security in a connected age
Released October 28, 2014
Media Advisory
a tablet displaying a voting screen Rice team sets sights on better voting machine
Released October 27, 2014
News From the Field
computing graphic New framework would facilitate use of new Android security modules
Released August 20, 2014
News From the Field
image of a cars dashboard with a GPS system Rutgers researchers show how fast you drive might reveal exactly where you are going
Released August 11, 2014
News From the Field
image of a fingerprint, computer parts and sequence of numbers Expanding the breadth and impact of cybersecurity and privacy research
Released July 31, 2014
Press Release
Page: Previous | Next (Showing: 1-30 of 36)

Email this pagePrint this page
Back to Top of page