| | | | |
|
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice
by David Balenson, Dr. Ulf Lindqvist, Zachary Tudor & Douglas Maughan.
Abstract
New and innovative technologies will only make a difference if they are deployed and used. It does not matter how visionary a technology is unless it meets the needs and requirements of customers/users and it is available as a product via channels that are acceptable to the customers/users. One of the biggest ongoing challenges within the cybersecurity research community is transitioning technology into commercial or open source products that are available in the marketplace. This article presents a research and development (R&D) execution model developed to significantly increase the success rate of technology transition, based on experience from cybersecurity programs in R&D funding agencies. To illustrate the effectiveness of the model, we describe several examples of successful technology transition from the cybersecurity R&D program at the United States Department of Homeland Security, Science and Technology Directorate (DHS S&T).
BibTEX Entry
@ARTICLE{6493323,
author={Maughan, Douglas and Balenson, David and Lindqvist, Ulf and Tudor, Zachary},
journal={Security Privacy, IEEE}, title={Crossing the ``Valley of Death'': Transitioning Cybersecurity Research into Practice},
year={2013},
volume={11},
number={2},
pages={14-23},
keywords={cybersecurity;open source;research and development;small business;technology transition},
doi={10.1109/MSP.2013.31},
ISSN={1540-7993},}
Files
In IEEE Security & Privacy Magazine, Vol. 11, No. 2, March/April 2013, pp. 14-23. Final published version available at IEEE Xplore. |
|
|