Showing 7604 results for all fiscal years.
Click the column headings to sort the list below.
No research summaries found.
|
|
|
|
2008
|
Techniques for High Assurance and Multilevel Systems
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Irvine, Cynthia E.
|
|
2010
|
Navy Certifier Program Special Offering
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Burke, Karen L.
|
|
2008
|
A Postgraduate Training Program for Cryptologic Computer Scientists Phase I: Initiation
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Irvine, Cynthia E.
|
|
2010
|
Navy Certifier Program Special Offering
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Burke, Karen L.
|
|
2007
|
Protection Profile and Hardware Security Support
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Irvine, Cynthia E.
|
|
2010
|
OB-1 Evaluation Support
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Dinolt, George W.
|
|
2007
|
Cyberciege Use as a Defensive Information Operations Strategy and Analysis Tool
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Irvine, Cynthia E.
|
|
2009
|
Software Crypto Modeling
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Dinolt, George W.
|
|
2007
|
Securecore for Trustworthy Commodity Computing and Communications
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Irvine, Cynthia E.
|
|
2010
|
OB-1 Evaluation Support
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Dinolt, George W.
|
|
2008
|
Information Assurance Scholarship Program Support - 2008
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Irvine, Cynthia E.
|
|
2009
|
Development of Formal Method Strategy for the Next Generation Security Network Server (SNS)
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Dinolt, George W.
|
|
2007
|
Analysis of XML Security Labels for Control of Access to Sensitive Information
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Irvine, Cynthia E.
|
|
2008
|
Formal UML Requirement Specification-Based Automatic Software Testing
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Drusinsky, Doron
|
|
2007
|
CT-T: Collaborative Research: Adaptive Security and Separation in Reconfigurable Hardware
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Irvine, Cynthia E.
|
|
2010
|
Team Monterey: Analysis of Identity Management Security for Groups
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Eagle, Christopher S.
|
|
2007
|
Cyber Defense Initiative Workshop: Research and Technology Framework and Plan
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Irvine, Cynthia E.
|
|
2010
|
Creating Realistic Forensic Corpora for Undergraduate Education and Research
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Garfinkel, Simson L.
|
|
2008
|
Trusted Computing Exemplar: Least Privilege Separation Kernel - Vertical Slice
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Irvine, Cynthia E.
|
|
2010
|
DOD Cyber Policy Review
|
Graduate School of Operational & Information Sciences
|
Computer Science
|
Garfinkel, Simson L.
|
|
|
|
|
|
|
|