zRecommended
research investments
yInformation
and network security
xAuthentication, intrusion
detection, containment, recovery, bug
prevention/detection/repair
yC3I
(Command, Control, Communication, and Intelligence)
systems
xInteroperability,
capacity, decision support, location-aware systems,
sensornets
yInformation
fusion and datamining
yPrivacy
and confidentiality
yHuman
and organizational factors