This paper describes the evolution of REQcollect (REQuirements Collection). REQcollect was developed through several iterations of agile development and the transition of other projects. Multiple federal agencies have sponsored the work as well as transitioned the technologies into use. The parents of REQcollect are REQdb (REQuirements Database) and DART3 (Department of Homeland Security Assistant for R&D Tracking and Technology Transfer) [1]. DART3 was developed from three other projects: TPAM (Transition Planning and Assessment Model) [2], GNOSIS (Global Network Operations Survey and Information Sharing) [3,4] Aqueduct [5], a semantic MediaWiki extension.REQcollect combines the best components of these previous systems: a requirements elicitation and collection tool and a Google-like matching algorithm to identify potential transitions of R&D projects that match requirements.
Abstract. As global threats to information systems continue to increase, the value of effective cybersecurity research has never been greater. There is a pressing need to educate future researchers about the research process itself, which is increasingly unpredictable, multi-disciplinary, multiorganizational, and team-oriented. In addition, there is a growing demand for cybersecurity research that can produce fast, authoritative, and actionable results. In short, speed matters. Organizations conducting cyber defense can benefit from the knowledge and experience of the best minds in order to make effective decisions in difficult and fast moving situations. The Agile Research process is a new approach to provide such rapid, authoritative, applied research. It is designed to be fast, transparent, and iterative, with each iteration producing results that can be applied quickly. Purdue University is employing Agile Research as a teaching vehicle in an innovative, multi-university graduate program with government sponsor participation, as described in this paper. Because it simulates real-world operations and processes, this program is equipping students to become effective contributors to cybersecurity research.
This paper describes a paradigm shift from how cybersecurity research and development (R&D) is traditionally applied in an operational environment. The methodology is referred to as embedded R&D (eR&D); cybersecurity researchers are tightly coupled with the operational stakeholders. This tight-knit relationship allows the researchers to elicit R&D requirements from the stakeholders seamlessly on a continuous basis, and gives the researchers immediate access to the tactical environment in which the analysts and operators work; this helps close the gap in the age-old disconnect between the research and operational communities.Tools may be employed to enhance, augment, and advance the mission of an eR&D team. One such tool, REQcollect [5], was developed through several agile development iterations and the through the transition of other projects. Multiple federal agencies have sponsored the work and subsequently transitioned the technologies into use. The predecessors to REQcollect are REQdb (REQuirements Database) and DART3 (Department of Homeland Security Assistant for R&D Tracking and Technology Transfer) [6]. REQcollect combines the best components of these two systems: a requirements elicitation and collection tool and a Google-like matching algorithm to identify potential transitions of R&D projects with similar or identical requirements.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.