Research Summaries
Showing 7604 results for all fiscal years.
Click the column headings to sort the list below.
No research summaries found.
 
2008 Techniques for High Assurance and Multilevel Systems Computer Science Irvine, Cynthia E. View
2010 Navy Certifier Program Special Offering Computer Science Burke, Karen L. View
2008 A Postgraduate Training Program for Cryptologic Computer Scientists Phase I: Initiation Computer Science Irvine, Cynthia E. View
2010 Navy Certifier Program Special Offering Computer Science Burke, Karen L. View
2007 Protection Profile and Hardware Security Support Computer Science Irvine, Cynthia E. View
2010 OB-1 Evaluation Support Computer Science Dinolt, George W. View
2007 Cyberciege Use as a Defensive Information Operations Strategy and Analysis Tool Computer Science Irvine, Cynthia E. View
2009 Software Crypto Modeling Computer Science Dinolt, George W. View
2007 Securecore for Trustworthy Commodity Computing and Communications Computer Science Irvine, Cynthia E. View
2010 OB-1 Evaluation Support Computer Science Dinolt, George W. View
2008 Information Assurance Scholarship Program Support - 2008 Computer Science Irvine, Cynthia E. View
2009 Development of Formal Method Strategy for the Next Generation Security Network Server (SNS) Computer Science Dinolt, George W. View
2007 Analysis of XML Security Labels for Control of Access to Sensitive Information Computer Science Irvine, Cynthia E. View
2008 Formal UML Requirement Specification-Based Automatic Software Testing Computer Science Drusinsky, Doron View
2007 CT-T: Collaborative Research: Adaptive Security and Separation in Reconfigurable Hardware Computer Science Irvine, Cynthia E. View
2010 Team Monterey: Analysis of Identity Management Security for Groups Computer Science Eagle, Christopher S. View
2007 Cyber Defense Initiative Workshop: Research and Technology Framework and Plan Computer Science Irvine, Cynthia E. View
2010 Creating Realistic Forensic Corpora for Undergraduate Education and Research Computer Science Garfinkel, Simson L. View
2008 Trusted Computing Exemplar: Least Privilege Separation Kernel - Vertical Slice Computer Science Irvine, Cynthia E. View
2010 DOD Cyber Policy Review Computer Science Garfinkel, Simson L. View