{"id":12662,"date":"2019-11-26T15:55:21","date_gmt":"2019-11-26T20:55:21","guid":{"rendered":"https:\/\/web.uri.edu\/cs\/?page_id=12662"},"modified":"2020-05-18T10:33:58","modified_gmt":"2020-05-18T14:33:58","slug":"research","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/cs\/dfcsc\/research\/","title":{"rendered":"Research"},"content":{"rendered":"<h1>Digital Forensics and Cyber Security Center<\/h1>\n<section class=\"cl-wrapper cl-menu-wrapper\"><nav id=\"\" class=\"cl-menu  \" data-name=\"dfcsc\" data-show-title=\"0\"><ul id=\"menu-dfcsc\" class=\"cl-menu-list cl-menu-list-no-js\"><li id=\"menu-item-12584\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-12584\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/\">Overview<\/a><\/li>\n<li id=\"menu-item-12659\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-12659\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/academics\/\">Academics<\/a><\/li>\n<li id=\"menu-item-12686\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-12686\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/research\/\">Research<\/a><\/li>\n<li id=\"menu-item-12864\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-12864\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/active-students\/\">Active Students<\/a><\/li>\n<li id=\"menu-item-15066\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-15066\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/resources\/\">Resources<\/a><\/li>\n<li id=\"menu-item-12701\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-12701\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/about-us\/\">About Us<\/a><\/li>\n<\/ul><\/nav><\/section>\n<h2>Research Activities<\/h2>\n<div class=\"cl-wrapper cl-card-wrapper\"><a class=\"cl-card   right\" href=\"https:\/\/digitalcommons.uri.edu\/do\/search\/?q=cybersecurity\" title=\"\"><div class=\"cl-card-container media\"><img decoding=\"async\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/1531\/dfcsc_research.jpg\" srcset=\"\" alt=\"Research Graphic\"><\/div><div class=\"cl-card-container text\"><div class=\"cl-card-text\"><h2>Research Publications<\/h2><\/div><\/div><\/a><\/div>\n<p>The University of Rhode Island&#8217;s Digital Forensics and Cyber Security Center is a national leader in digital forensics and cyber security research and development, with several million dollars in federal funding from the U.S Department of Justice, the U.S National Science Foundation, and the U.S. Dept of Homeland Security.<br \/>\nThe URI DFCSC&#8217;s research objective is to formulate new concepts that help digital forensics and cyber security professionals protect the nation&#8217;s citizens. Our research in the &#8220;trust framework&#8221; concept is a model for understanding network security that includes a recent NSF award to study cyber security issues in the power grid. Our digital forensics research has been successfully transitioned to vendor&#8217;s, such as WetStone Technologies and ForensicSoft, for integration into currently existing tools or release as stand-alone products that law enforcement and security practitioners use regularly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital Forensics and Cyber Security Center Research Activities &nbsp; The University of Rhode Island&#8217;s Digital Forensics and Cyber Security Center is a national leader in digital forensics and cyber security research and development, with several million dollars in federal funding from the U.S Department of Justice, the U.S National Science Foundation, and the U.S. Dept [&hellip;]<\/p>\n","protected":false},"author":1322,"featured_media":0,"parent":12578,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-12662","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/12662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/users\/1322"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/comments?post=12662"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/12662\/revisions"}],"predecessor-version":[{"id":13401,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/12662\/revisions\/13401"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/12578"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/media?parent=12662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}