News
-
Call for Proposals: CVN Workforce Development Grant FY25 Application
Due Date: June 14, 2024, 5:00 p.m. Objective The Commonwealth Cyber Initiative (CCI) is establishing Virginia as a global center…
Read More » -
Call for Proposals: CVN Research Grant FY25 Application
Due Date: June 21, 2024, 5:00 p.m. Objective The Commonwealth Cyber Initiative (CCI) is establishing Virginia as a global center…
Read More » -
RECAP: CCI Researchers Share Findings at CVN Spring Speaker Series
Our speaker series brought the future to life through the insights of our researchers. We’ve all imagined a world where…
Read More » -
Diving into NETWORK TOUCH: Human Haptic Perception for Network Traffic Monitoring and Situational Awareness
Imagine a world where network security isn’t a constant headache for overworked admins. That’s the dream behind NetworkTouch. Tamer Nadeem,…
Read More » -
Realert: An Emergency Response System for Educational Institutions
The "Best Smart City Hack" award went to Advay Choudhury and Nand Vinchhi for their Realert project.
Read More » -
BodySync: a Smartwatch Analyzing Sweat for Continuous, Noninvasive Health Monitoring
The "Best Smart Health Hack" award went to the BodySync team (Arya Nalavade, Fatima Shaikh,Thrishaa Jayaprakash, and Rudav Kathiravan) for…
Read More » -
Give Me a Hand: Virtual reality simulation helps people with phantom limb pain
The "Best Overall Hack" award went to a team of students from VCU (Benjamin Estrada, Enes Kalinsazlioglu, Michael Martinez-Posadas, and…
Read More » -
Pill Daddy: Your Automated Medication Assistant
The "Best Beginner Hack" award went to the Pill Daddy team ( Samuel Ray, Spencer Devine, and James Dapogny) for…
Read More » -
Designing hardware with security in mind
Wenjie Xiong, a Commonwealth Cyber Initiative Fellow, addresses cybersecurity gaps by designing attack-resilient hardware. By Kelly Izlar Wenjie Xiong (at right),…
Read More » -
The future of cybersecurity hinges on creating harder problems
In the science and technology magazine American Scientist, Gretchen Matthews discusses how the key to safe encrypted information relies on…
Read More »