Research Summaries
Showing 7604 results for all fiscal years.
Click the column headings to sort the list below.
No research summaries found.
 
2011 Requirements for Centers of Academic Excellence in Cyber Operations Computer Science Dinolt, George W. View
2015 Navy Certifier Course Special Offering Computer Science Burke, Karen L. View
2019 NAWC Cybersecurity Certificates AY2019-2020 Computer Science Irvine, Cynthia E. View
2009 Sector Discrimination Seedling Computer Science Garfinkel, Simson L. View
2010 Software Engineering Master's Degree Program Computer Science Peitso, Loren E. View
2011 IC Computer Network Operations Support Computer Science Dinolt, George W. View
2015 Navy Certifier Course Special Offering Computer Science Burke, Karen L. View
2019 NIWC-Pacific Cybersecurity Certificates AY2019-2020 Computer Science Irvine, Cynthia E. View
2009 Automated Media Exploitation Research FY10 Computer Science Garfinkel, Simson L. View
2008 Software Engineering Master's Degree Program Computer Science Peitso, Loren E. View
2007 UML-Based Validation and Verification (V&V) Computer Science Drusinsky, Doron View
2012 Net: Large: Collaborative Research: Exploring the Evolution of IPV6: Topology, Performance, and Traffic Computer Science Beverly, Robert E. View
2015 Navy Certifier Course Special Offering Computer Science Burke, Karen L. View
2019 Innovation, Intrapreneurship, and Risk-Taking Computer Science Yu, Warren View
2009 Automated Media Exploitation and Information Fusion Computer Science Garfinkel, Simson L. View
2010 Identity and Database Challenges for Force Protection Computer Science Peterson, Zachary N. View
2011 Malware Analysis Short Course Computer Science Eagle, Christopher S. View
2012 High-Frequency Active Internet Topology Mapping Computer Science Beverly, Robert E. View
2015 Navy Certifier Course Special Offering Computer Science Burke, Karen L. View
2009 A Postgraduate Training Program for Cryptologic Computer Scientists Phase I: Initiation Computer Science Irvine, Cynthia E. View
2010 Protecting Mobile Defense Networks from Adversary Influence Computer Science Rowe, Neil C. View
2010 Identity and Database Challenges for Force Protection Computer Science Eagle, Christopher S. View
2014 High-Frequency Active Internet Topology Mapping Computer Science Beverly, Robert E. View
2015 Navy Certifier Course Special Offering Computer Science Burke, Karen L. View
2008 Identity Management Education Program: Launch Preparation Computer Science Irvine, Cynthia E. View
2007 EXP-SA: Adaptive Automated Detection of Emplacement of Explosive Devices Computer Science Rowe, Neil C. View
2011 Automated Media Exploitation Research 3 Computer Science Garfinkel, Simson L. View
2012 Risk-Based Specification, Validation and Verification Using Software Slicing Computer Science Berzins, Valdis A. View
2011 OCI-Software Development for CI Computer Science Beverly, Robert E. View
2015 Navy Certifier Course Special Offering Computer Science Burke, Karen L. View