This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice
March-April 2013 (vol. 11 no. 2)
pp. 14-23
Douglas Maughan, US Department of Homeland Security
David Balenson, SRI International
Ulf Lindqvist, SRI International
Zachary Tudor, SRI International
New and innovative technologies will only make a difference if they're deployed and used. It doesn't matter how visionary a technology is unless it meets user needs and requirements and is available as a product via user-acceptable channels. One of the cybersecurity research community's biggest ongoing challenges is transitioning technology into commercial or open source products available in the marketplace. This article presents an R&D execution model to increase the success rate of technology transition along with several examples of successful technology transition from the US Department of Homeland Security Science and Technology Directorate's cybersecurity R&D program.
Index Terms:
Computer crime,Technological innovation,Technology transfer,Commercialization,Marketing and sales,Computer security,small business,technology transition,cybersecurity,research and development,open source
Citation:
Douglas Maughan, David Balenson, Ulf Lindqvist, Zachary Tudor, "Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice," IEEE Security & Privacy, vol. 11, no. 2, pp. 14-23, March-April 2013, doi:10.1109/MSP.2013.31
Usage of this product signifies your acceptance of the Terms of Use.