Showing 7604 results for all fiscal years.
Click the column headings to sort the list below.
No research summaries found.
|
|
|
2012
|
Net: Large: Collaborative Research: Exploring the Evolution of IPV6: Topology, Performance, and Traffic
|
Computer Science
|
Beverly, Robert E.
|
|
2015
|
Navy Certifier Course Special Offering
|
Computer Science
|
Burke, Karen L.
|
|
2019
|
Innovation, Intrapreneurship, and Risk-Taking
|
Computer Science
|
Yu, Warren
|
|
2009
|
Automated Media Exploitation and Information Fusion
|
Computer Science
|
Garfinkel, Simson L.
|
|
2010
|
Identity and Database Challenges for Force Protection
|
Computer Science
|
Peterson, Zachary N.
|
|
2011
|
Malware Analysis Short Course
|
Computer Science
|
Eagle, Christopher S.
|
|
2012
|
High-Frequency Active Internet Topology Mapping
|
Computer Science
|
Beverly, Robert E.
|
|
2015
|
Navy Certifier Course Special Offering
|
Computer Science
|
Burke, Karen L.
|
|
2009
|
A Postgraduate Training Program for Cryptologic Computer Scientists Phase I: Initiation
|
Computer Science
|
Irvine, Cynthia E.
|
|
2010
|
Protecting Mobile Defense Networks from Adversary Influence
|
Computer Science
|
Rowe, Neil C.
|
|
2010
|
Identity and Database Challenges for Force Protection
|
Computer Science
|
Eagle, Christopher S.
|
|
2014
|
High-Frequency Active Internet Topology Mapping
|
Computer Science
|
Beverly, Robert E.
|
|
2015
|
Navy Certifier Course Special Offering
|
Computer Science
|
Burke, Karen L.
|
|
2008
|
Identity Management Education Program: Launch Preparation
|
Computer Science
|
Irvine, Cynthia E.
|
|
2007
|
EXP-SA: Adaptive Automated Detection of Emplacement of Explosive Devices
|
Computer Science
|
Rowe, Neil C.
|
|
2011
|
Automated Media Exploitation Research 3
|
Computer Science
|
Garfinkel, Simson L.
|
|
2012
|
Risk-Based Specification, Validation and Verification Using Software Slicing
|
Computer Science
|
Berzins, Valdis A.
|
|
2011
|
OCI-Software Development for CI
|
Computer Science
|
Beverly, Robert E.
|
|
2015
|
Navy Certifier Course Special Offering
|
Computer Science
|
Burke, Karen L.
|
|
2009
|
Identity Management Education Program Year 1 Operations
|
Computer Science
|
Irvine, Cynthia E.
|
|
2010
|
Behavioral Analysis of Network Flow Traffic
|
Computer Science
|
Xie, Geoffrey G.
|
|
2011
|
Celex, Carving and Contracts
|
Computer Science
|
Garfinkel, Simson L.
|
|
2011
|
Transport-Layer ID of Botnets and Malicious Traffic
|
Computer Science
|
Beverly, Robert E.
|
|
2014
|
Navy Certifier Course Special Offering
|
Computer Science
|
Burke, Karen L.
|
|
2015
|
Navy Certifier Course Special Offering
|
Computer Science
|
Burke, Karen L.
|
|
2009
|
Information Systems Security Engineering: A Postgraduate Training Program Phase I: Pilot
|
Computer Science
|
Irvine, Cynthia E.
|
|
2007
|
Collaborative Research: NETS-NBD: A Revolutionary 4D Approach to Network-Wide Control and Management
|
Computer Science
|
Xie, Geoffrey G.
|
|
2011
|
DARPA Insider Project
|
Computer Science
|
Garfinkel, Simson L.
|
|
2011
|
NPS Technical Investigation in Support of the Network Management System-Tactical Mobile Ad-Hoc Networking (MANET) (NMS-TM) Initiative
|
Computer Science
|
Bordetsky, Alexander B.
|
|
2014
|
Navy Certifier Course Special Offering
|
Computer Science
|
Burke, Karen L.
|
|
|
|
|
|
|