{"id":8,"date":"2021-06-29T20:26:12","date_gmt":"2021-06-29T20:26:12","guid":{"rendered":"https:\/\/www.isi.edu\/nc\/?page_id=8"},"modified":"2025-10-09T21:44:47","modified_gmt":"2025-10-09T21:44:47","slug":"home","status":"publish","type":"page","link":"https:\/\/www.isi.edu\/nc\/","title":{"rendered":"Home"},"content":{"rendered":"\n\n\t<div id=\"latest-news\"><div class=\"lead-story container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"sr\">Latest News<\/h2>\n\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"\/news\/81541\/from-cancer-research-to-smart-cities-usc-builds-platform-to-test-privacy-preserving-data-sharing-technologies\">\n\t\t\t\t\t\t\t\t\t\t\t<article class=\"col-12\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/viterbischool.usc.edu\/wp-content\/uploads\/2026\/01\/USC-ISI-1200x600-2.jpg\" alt=\"a graphic related to protecting individual privacy while still enabling data-driven analysis, these technologies help organizations responsibly unlock the value of shared data.\">\n\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3>From Cancer Research to Smart Cities: USC Builds Platform to Test Privacy-Preserving Data Sharing Technologies<\/h3><p>New infrastructure will help evaluate data sharing techniques for healthcare, transportation, and other sectors as part of NSF\u2019s $10M privacy initiative\r\n<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div><div class=\"container\"><div class=\"row featured\"><div class=\"col-sm-12 col-md-6 col-lg-4\">\n\t\t\t\t\t\t<article>\n\t\t\t\t\t\t\t<header>\n\t\t\t\t\t\t\t\t<a href=\"\/news\/80134\/click-here-for-confusion-the-state-of-privacy-settings\">\n\t\t\t\t\t\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/viterbischool.usc.edu\/wp-content\/uploads\/2025\/10\/USC-ISI-1200x600-2.jpg\" alt=\"man looking at phone\"\/>\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<h3>Click Here for Confusion: The State of Privacy Settings<\/h3>\n\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<p>Finding a privacy setting on social media should be simple. But a new study from USC\u2019s Information Sciences Institute (ISI) shows it\u2019s anything but.\r\n<\/p>\n\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div><div class=\"col-sm-12 col-md-6 col-lg-4\">\n\t\t\t\t\t\t<article>\n\t\t\t\t\t\t\t<header>\n\t\t\t\t\t\t\t\t<a href=\"\/news\/79934\/robotaxis-keep-riders-safe-but-what-about-their-data\">\n\t\t\t\t\t\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/viterbischool.usc.edu\/wp-content\/uploads\/2025\/09\/USC-ISI-1200x600-2.jpg\" alt=\"highways and data\"\/>\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<h3>Robotaxis Keep Riders Safe, But What About Their Data?<\/h3>\n\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<p>A collaborative research team with USC ISI expertise finds that existing methods for selecting privacy enhancing technologies are inadequate for real-world robotaxis\r\n<\/p>\n\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div><div class=\"col-sm-12 col-md-6 col-lg-4 d-none d-lg-flex\">\n\t\t\t\t\t\t<article>\n\t\t\t\t\t\t\t<header>\n\t\t\t\t\t\t\t\t<a href=\"\/news\/79995\/usc-isis-terry-benzel-wins-ieee-computer-society-vice-presidency-to-combat-conference-ethics-crisis\">\n\t\t\t\t\t\t\t\t\t<figure>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/viterbischool.usc.edu\/wp-content\/uploads\/2025\/09\/USC-ISI-1200x600-2025-09-23T201901.975.png\" alt=\"Image\"\/>\n\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<h3>USC ISI's Terry Benzel Wins IEEE Computer Society Vice Presidency to Combat Conference Ethics Crisis<\/h3>\n\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<p>After four decades of fighting for integrity in computer science, ISI\u2019s Managing Director is ready to tackle \u201ccollusion rings\u201d in conferences and reshape how the world\u2019s computing professionals collaborate.\r\n<\/p>\n\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div><\/div><\/div>\n\t\t\t<div class=\"container cta\">\n\t\t\t\t<a href=\"\/nc\/news\/\" class=\"btn\">View All News<\/a>\n\t\t\t<\/div>\n\t\t<\/div><!-- latest news -->\n<section>\n    <h2>CSET 2025<\/h2>\n<\/section>\n        <figure>\n            <img decoding=\"async\" src=\"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2025\/10\/cset-workshop-banner.jpeg\" alt=\"CSET 25 Workshop Banner\"\/>\n        <\/figure>\n        <h2><a href=\"https:\/\/cset25.isi.edu\/\" target=\"_blank\">18TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP<\/a><\/h2>\n        <b>CSET&#8217;25<\/b> is being sponsored by the <a href=\"https:\/\/www.acsac.org\" target=\"_blank\" rel=\"noopener noreferrer\">Annual Computer Security Applications Conference (ACSAC)<\/a>.\n  The workshop will be held on Monday, December 8, \n\t  preceding the <a href=\"https:\/\/www.acsac.org\/2025\" target=\"_blank\" rel=\"noopener noreferrer\">ACSAC 2025<\/a> conference, which will be located in Honolulu, Hawaii.\n\n            <a href=\"https:\/\/cset25.isi.edu\/\" target=\"_blank\">Visit the CSET &#8217;25 Website to Learn More<\/a>\n<section>\n    <h2>Cross-Cutting Research Areas<\/h2>\n<\/section>\n<article>\n    <section><h3>Cyber-Physical Systems<\/h3><p>Understanding, securing and advancing cyber-physical systems is embodied in our work on embedded systems, verification of untrusted cyber-physical modules and analysis of cyber-attacks on interconnected complex cyber-physical systems. As &#8220;smart&#8221; devices continue to connect to the internet at a rapid pace, optimizing and securing their integration is critical &#8212; in addition to protecting underlying infrastructure, such as the power grid, that is the heartbeat of cyber ecosystems.<\/p><\/section>\n    <section><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2021\/09\/cyber-physical-systems-isi.jpg\" alt=\"Hnad holding transparent phone in front of industrial building\"\/><\/section>\n<\/article>\n<article>\n    <section><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2021\/09\/edge-computing-isi.jpg\" alt=\"Red glowing network\"\/><\/section>\n    <section><h3>Edge Computing<\/h3><p>As demand for information transit speed increases exponentially, there are hard questions around Network Embedding, System Security, and the use of Advanced Encryption Mechanisms. New approaches to data storage and computation capabilities at the edge inform our work in identification of applications within encrypted flows, recognition of obscured payloads, and protection of sensitive data residing in or transiting through network slices. This work will contribute to secure, high performance edge computing for the next generation of networking.<\/p><\/section>\n<\/article>\n<article>\n    <section><h3>Cybersecurity<\/h3><p>The pervasive nature of cyber threats grows exponentially. Our research spans specific technologies to large scale experimentation and analysis. Some of our key research programs include privacy-safe data sharing, defending against denial of service, malware handling and management, and binary analysis.<\/p>\u00a0<\/section>\n    <section><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2021\/09\/cybersecurity-isi.jpg\" alt=\"Screen with characters\"\/><\/section>\n<\/article>\n<article>\n    <section><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2021\/09\/internet-measurement-isi.jpg\" alt=\"earth made of data\"\/><\/section>\n    <section><h3>Internet Measurement<\/h3><p>Our goal is to improve the Internet by discovering new ways to understand network topology, traffic, use and abuse. We explore challenges in networking and cybersecurity from several perspectives. We develop and operate unique network measurement and analysis Infrastructure that we employ to address important problems in network reliability and security. Our research builds models to assist with real world dilemmas, such as natural disasters and power grid outages, to enhance internet agility and robustness.<\/p>\u00a0<\/section>\n<\/article>\n<article>\n    <section><h3>Experimental Research Methodologies<\/h3><p>Conducting experimentation to explore and evaluate research in cybersecurity and networking requires new scientific methods, tools and infrastructure. As a leader in cyber experimentation we architect, develop, and operate advanced cyber infrastructure testbeds. Our work creates models, experimentation frameworks, tools, and approaches to enhance the science of cyber experimentation to make experiments reusable, repeatable and robust.<\/p><\/section>\n    <section><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2021\/09\/experimental-research-methodologies-isi.jpg\" alt=\"purple floating book\"\/><\/section>\n<\/article>\n\t\t\t<a href=\"https:\/\/www.isi.edu\/nc\/research-areas\/\" target=\"_self\">\n\t\t\t\t\t\t\tExplore More About Our Research Areas\n\t\t\t\t\t<\/a>\n\n","protected":false},"excerpt":{"rendered":"<p>CSET 2025 18TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP CSET&#8217;25 is being sponsored by the Annual Computer Security Applications Conference (ACSAC). The workshop will be held on Monday, December 8, preceding the ACSAC 2025 conference, which will be located in Honolulu, Hawaii. Visit the CSET &#8217;25 Website to Learn More Cross-Cutting Research Areas Cyber-Physical Systems&hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"tpl-full-width.php","meta":{"news_source":"","news_author":"","external_news_link":"","footnotes":""},"class_list":["post-8","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Home - Networking &amp; Cybersecurity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isi.edu\/nc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home - Networking &amp; Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"CSET 2025 18TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP CSET&#8217;25 is being sponsored by the Annual Computer Security Applications Conference (ACSAC). The workshop will be held on Monday, December 8, preceding the ACSAC 2025 conference, which will be located in Honolulu, Hawaii. Visit the CSET &#8217;25 Website to Learn More Cross-Cutting Research Areas Cyber-Physical Systems&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isi.edu\/nc\/\" \/>\n<meta property=\"og:site_name\" content=\"Networking &amp; Cybersecurity\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-09T21:44:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2025\/10\/cset-workshop-banner.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isi.edu\/nc\/\",\"url\":\"https:\/\/www.isi.edu\/nc\/\",\"name\":\"Home - Networking &amp; Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/www.isi.edu\/nc\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.isi.edu\/nc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.isi.edu\/nc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2025\/10\/cset-workshop-banner.jpeg\",\"datePublished\":\"2021-06-29T20:26:12+00:00\",\"dateModified\":\"2025-10-09T21:44:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isi.edu\/nc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isi.edu\/nc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.isi.edu\/nc\/#primaryimage\",\"url\":\"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2025\/10\/cset-workshop-banner.jpeg\",\"contentUrl\":\"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2025\/10\/cset-workshop-banner.jpeg\",\"width\":1366,\"height\":768,\"caption\":\"CSET Workshop banner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isi.edu\/nc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.isi.edu\/nc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isi.edu\/nc\/#website\",\"url\":\"https:\/\/www.isi.edu\/nc\/\",\"name\":\"Networking &amp; Cybersecurity\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isi.edu\/nc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Home - Networking &amp; Cybersecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isi.edu\/nc\/","og_locale":"en_US","og_type":"article","og_title":"Home - Networking &amp; Cybersecurity","og_description":"CSET 2025 18TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP CSET&#8217;25 is being sponsored by the Annual Computer Security Applications Conference (ACSAC). The workshop will be held on Monday, December 8, preceding the ACSAC 2025 conference, which will be located in Honolulu, Hawaii. Visit the CSET &#8217;25 Website to Learn More Cross-Cutting Research Areas Cyber-Physical Systems&hellip;","og_url":"https:\/\/www.isi.edu\/nc\/","og_site_name":"Networking &amp; Cybersecurity","article_modified_time":"2025-10-09T21:44:47+00:00","og_image":[{"url":"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2025\/10\/cset-workshop-banner.jpeg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.isi.edu\/nc\/","url":"https:\/\/www.isi.edu\/nc\/","name":"Home - Networking &amp; Cybersecurity","isPartOf":{"@id":"https:\/\/www.isi.edu\/nc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.isi.edu\/nc\/#primaryimage"},"image":{"@id":"https:\/\/www.isi.edu\/nc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2025\/10\/cset-workshop-banner.jpeg","datePublished":"2021-06-29T20:26:12+00:00","dateModified":"2025-10-09T21:44:47+00:00","breadcrumb":{"@id":"https:\/\/www.isi.edu\/nc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isi.edu\/nc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.isi.edu\/nc\/#primaryimage","url":"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2025\/10\/cset-workshop-banner.jpeg","contentUrl":"https:\/\/www.isi.edu\/nc\/wp-content\/uploads\/sites\/7\/2025\/10\/cset-workshop-banner.jpeg","width":1366,"height":768,"caption":"CSET Workshop banner"},{"@type":"BreadcrumbList","@id":"https:\/\/www.isi.edu\/nc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isi.edu\/nc\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/www.isi.edu\/nc\/#website","url":"https:\/\/www.isi.edu\/nc\/","name":"Networking &amp; Cybersecurity","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isi.edu\/nc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.isi.edu\/nc\/wp-json\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isi.edu\/nc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isi.edu\/nc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/nc\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/nc\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":0,"href":"https:\/\/www.isi.edu\/nc\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.isi.edu\/nc\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}