Showing 7604 results for all fiscal years.
Click the column headings to sort the list below.
No research summaries found.
|
|
|
2014
|
Media Exploitation, Analysis and Visualization O&M FY14
|
Computer Science
|
Garfinkel, Simson L.
|
|
2013
|
DARPA Cyber Grand Challenge Test and Evaluation Framework
|
Computer Science
|
Eagle, Christopher S.
|
|
2009
|
Assessing Risk of COTS Software for Open Architecture-Based US Navy Weapon System Acquisition Programs
|
Computer Science
|
Luqi
|
|
2010
|
Identity and Database Challenges for Force Protection
|
Computer Science
|
Irvine, Cynthia E.
|
|
2012
|
Navy Certifier Program Special Offerings
|
Computer Science
|
Burke, Karen L.
|
|
2013
|
Monarch: Cyber Corps Through Metamorphosis
|
Computer Science
|
Irvine, Cynthia E.
|
|
2014
|
DARPA Cyber Grand Challenge Test and Evaluation Framework Development
|
Computer Science
|
Eagle, Christopher S.
|
|
2020
|
Labtainers Exercises and Collaboration Support
|
Computer Science
|
Irvine, Cynthia E.
|
|
2008
|
Establish and Maintain Software Engineering Test Lab (SETL)
|
Computer Science
|
Luqi
|
|
2011
|
Multilevel Secure Collaborative Web Technologies
|
Computer Science
|
Irvine, Cynthia E.
|
|
2012
|
National Security Agency Centers of Excellence Seminar Development
|
Computer Science
|
Dinolt, George W.
|
|
2012
|
Methodology for Assessment of Security Properties
|
Computer Science
|
Irvine, Cynthia E.
|
|
2015
|
Predicting Military Movements Using Social Medial Data
|
Computer Science
|
Gillen, Patrick
|
|
2020
|
Innovating Intrapreneurial DevOps
|
Computer Science
|
Yu, Warren
|
|
2009
|
Tools for Topic Analysis in Blogs and Online Chat
|
Computer Science
|
Martell, Craig H.
|
|
2011
|
Information Assurance Scholarship Program Support - 2011
|
Computer Science
|
Irvine, Cynthia E.
|
|
2012
|
Malware Research and Tools Project
|
Computer Science
|
Eagle, Christopher S.
|
|
2009
|
Monarch: Cyber Corps Through Metamorphosis
|
Computer Science
|
Irvine, Cynthia E.
|
|
2010
|
TC: Large: Collaborative Research: 3DSEC: Trustworthy System Security Through 3-D Integrated Hardware
|
Computer Science
|
Huffmire, Theodore D.
|
|
2008
|
Designing a Conceptual Data Model for the ACSIS Database
|
Computer Science
|
Otani, Thomas W.
|
|
|
|
|
|
|