Showing 7664 results for all fiscal years.
Click the column headings to sort the list below.
No research summaries found.
|
|
|
2009
|
Assessing Risk of COTS Software for Open Architecture-Based US Navy Weapon System Acquisition Programs
|
Computer Science
|
Luqi
|
|
2010
|
Identity and Database Challenges for Force Protection
|
Computer Science
|
Irvine, Cynthia E.
|
|
2012
|
Navy Certifier Program Special Offerings
|
Computer Science
|
Burke, Karen L.
|
|
2013
|
Monarch: Cyber Corps Through Metamorphosis
|
Computer Science
|
Irvine, Cynthia E.
|
|
2014
|
DARPA Cyber Grand Challenge Test and Evaluation Framework Development
|
Computer Science
|
Eagle, Christopher S.
|
|
2020
|
Labtainers Exercises and Collaboration Support
|
Computer Science
|
Irvine, Cynthia E.
|
|
2008
|
Establish and Maintain Software Engineering Test Lab (SETL)
|
Computer Science
|
Luqi
|
|
2011
|
Multilevel Secure Collaborative Web Technologies
|
Computer Science
|
Irvine, Cynthia E.
|
|
2012
|
National Security Agency Centers of Excellence Seminar Development
|
Computer Science
|
Dinolt, George W.
|
|
2012
|
Methodology for Assessment of Security Properties
|
Computer Science
|
Irvine, Cynthia E.
|
|
2015
|
Predicting Military Movements Using Social Medial Data
|
Computer Science
|
Gillen, Patrick
|
|
2020
|
Innovating Intrapreneurial DevOps
|
Computer Science
|
Yu, Warren
|
|
2009
|
Tools for Topic Analysis in Blogs and Online Chat
|
Computer Science
|
Martell, Craig H.
|
|
2011
|
Information Assurance Scholarship Program Support - 2011
|
Computer Science
|
Irvine, Cynthia E.
|
|
2012
|
Malware Research and Tools Project
|
Computer Science
|
Eagle, Christopher S.
|
|
2009
|
Monarch: Cyber Corps Through Metamorphosis
|
Computer Science
|
Irvine, Cynthia E.
|
|
2010
|
TC: Large: Collaborative Research: 3DSEC: Trustworthy System Security Through 3-D Integrated Hardware
|
Computer Science
|
Huffmire, Theodore D.
|
|
2008
|
Designing a Conceptual Data Model for the ACSIS Database
|
Computer Science
|
Otani, Thomas W.
|
|
2010
|
Investigation of Dependable, Trustworthy, and Evolvable Distributed Computing
|
Computer Science
|
Michael, James B.
|
|
2008
|
Random Sampling and Small Block Forensics Innovation
|
Computer Science
|
Garfinkel, Simson L.
|
|
2014
|
Risk-Based Specification, Validation and Verification Using Software Slicing
|
Computer Science
|
Luqi
|
|
2013
|
Developing Materials to Teach Technical Privacy Auditing with Computer Forensic Tools and Realistic Computer Forensic Datasets
|
Computer Science
|
Irvine, Cynthia E.
|
|
2009
|
SSC-LANT Charleston MSCS Program
|
Computer Science
|
Peitso, Loren E.
|
|
2011
|
LPD 17 Network Study
|
Computer Science
|
Michael, James B.
|
|
2012
|
ADOMEX Research and Development
|
Computer Science
|
Garfinkel, Simson L.
|
|
2014
|
CAPS for ARPI
|
Computer Science
|
Luqi
|
|
2015
|
CAPS for ARPI
|
Computer Science
|
Luqi
|
|
2007
|
Shared Text Input
|
Computer Science
|
Singh, Gurminder
|
|
2011
|
Investigation of Ways to Leverage Cloud Computing in the Tactical Environment
|
Computer Science
|
Michael, James B.
|
|
2012
|
ADOMEX Operations and Engineering
|
Computer Science
|
Garfinkel, Simson L.
|
|
|
|
|
|
|