Special Projects

The I3P is a cornerstone of cyber security Research and Development in the United States. We support multiple research projects in areas that are considered critical to national security and lend themselves to a collaborative approach.

Our Approach: Science as a Service (SCaaS)

The I3P Science as a Service (SCaaS) model supports a spectrum of research processes to include traditional research to support in-depth, long-term analysis and agile research processes to support on-demand quick looks, incremental analysis, knowledge generation, technology transition and actionable advice.

Our established research infrastructure supports an operational and management structure that provides a single point of contact for stakeholder engagement, accountable management of research operations, and systematic operational processes that are invariant across the research spectrum for positive resource control.

Our researchers engage with each other on a regular basis, in person at team meetings and workshops and via regularly scheduled conference calls. The ability to exchange ideas and support imaginative thinking in a trusted environment is one of the I3P’s unique strengths. In addition, each project focuses on real-world issues and emphasizes outcomes, such as new security tools, best practices, and an improved understanding of the vulnerability landscape. These outcomes are made possible by engaging stakeholders and end-users in the research process and by integrating technology transfer into the project plan.

How Our Projects are Chosen

Before committing to new research initiatives, the I3P undertakes an assessment of the need, level of vulnerability and perceived threat to national security. In addition, the I3P asks three key questions of each prospective research project:

  1. Is the issue a pressing security need that will benefit from a multi-disciplinary and multi-institutional approach?
  2. Does the I3P have the collective expertise to address the identified vulnerabilities and develop effective mitigation strategies?
  3. Will the outcome be of general use to either an economic sector or a specific group of end users?