12
zRecommended research investments
yInformation and network security
xAuthentication, intrusion detection, containment, recovery, bug prevention/detection/repair
yC3I (Command, Control, Communication, and Intelligence) systems
xInteroperability, capacity, decision support, location-aware systems, sensornets
yInformation fusion and datamining
yPrivacy and confidentiality
yHuman and organizational factors