Abstract:The US Army faces a significant burden when authoring training content to meet the rapidly changing nature of potential threats and adversaries. Currently, training material is often tied to the implementation platform and cannot be easily redeployed to new platforms or systems. In addition,… more
Abstract:Post-deployment psychological health issues such as posttraumatic stress disorder (PTSD), substance abuse, and comorbid stress and anger management disorders are experienced by substantial numbers of service members. Fortunately, a number of proven, evidence-based treatments have been developed to… more
Abstract:ABSTRACT: Although next generation, military aircraft offer a wealth of technological capabilities and can adopt multiple roles, pilots are now presented with an extraordinarily complex set of tasks to master in comparison to third and fourth generation aircraft. Ensuring pilots are comprehensively… more
Abstract:ABSTRACT: The Air Force is increasingly using text-chat based communications in operational environments, such as operations using Remotely Piloted Aircraft (RPA) and in Air Operations Centers (AOC). Training Airmen for these operations using simulations requires synthetic teammates that understand… more
Abstract:ABSTRACT: Full-spectrum cyber operations, including both Cyber Network Attack and Cyber Network Defense, place enormous cognitive demands on operators and teams. When demands are too high or tasks are not properly allocated, performance degrades, and missions may fail. To avoid operator overload, a… more
Abstract:ABSTRACT: Intelligence, Surveillance, and Reconnaissance sensors deployed by the US Air Force generate enormous amounts of data, much of which may be used in a cross-domain security context. All of this data must be assigned an appropriate classification before it may be disseminated. Normally,… more
Abstract:ABSTRACT: In the modern battlespace, US forces must operate in a coordinated fashion across organizational and functional lines. Despite the increasing sophistication of the information systems supporting them, Warfighters are confronted with"stovepipes,"making it difficult to gain a full… more
Abstract:Transportation Security Officers (TSOs) are tasked with exploiting X-ray inspection systems to detect potential threats. To ensure efficient operation
and the safety of the traveling public, TSOs must maintain a 100% probability of detection (Pd) while minimizing screening time. To achieve… more
Abstract:ABSTRACT: Scheduling Air Force Satellite Control Network (AFSCN) resources is a challenge because windows of visibility are limited between satellites and remote tracking stations on the ground, and there are more requests for access than available resources. Human scheduling at a centralized… more
Abstract:ABSTRACT: Space system operators require the ability to detect and track potential threats to their platforms. One way to detect and track objects in the proximity of a satellite or other space vehicle without dedicated sensors and subsystems is to perform additional processing on existing system… more
Abstract:The Navy is developing and deploying day/night Wide Area Airborne Sensor (WAAS) payloads for tactical UASs, which can enable intelligence, surveillance, and reconnaissance (ISR) tasks to provide valuable situational awareness over large areas. However, the size, weight, and power constraints of… more
Abstract:Naval unmanned vehicle operators require mission displays that enable them to better collaborate with planning automation to rapidly understand and respond to complex and dynamic operating environments. To address this need, we will design and demonstrate Advanced Mission Display and Planning Tools… more
Abstract:Intelligence analysts are flooded with complex data, creating failures and delays in exploiting critical information. Attempts at automated decision-aids have failed because they ineffectively strive to supplant the analyst, rather than enable collaboration. Instead, analysts manually sift through… more
Abstract:Adversaries have become increasingly proficient at cyber attacks against our military"s command and control (C2) infrastructure. Maintaining security requires high-fidelity assessments of software services, often implemented as cyber Red Team exercises in which Systems Under Test (SUTs) are… more
Abstract:As command and control, doctrine, and tactics evolve with the cyber network at its core, mission-critical tasks increasingly rely on the integrity and responsiveness of the network and other cyber assets. While this trend has acted as a tremendous force multiplier and OPTEMPO accelerator, two major… more
Abstract:CNDSP analysts protect US computer networks, detect threat occurrences on those networks, and respond to threat incidents. The adage"know thy enemy"is as true for network defense as it is for defense of any asset. A robust computer network defense requires current knowledge of possible and… more
Abstract:Members of the armed forces depend on the quality of their information for mission success. Providing high quality information requires optimizing the value of the dynamic"information economy,"where data fusion is the supply, information requirements are the demand, and information… more
Abstract:The wealth of data provided by modern information fusion (IF) tools to intelligence analysts exceeds their ability to effectively process, exploit, and disseminate actionable intelligence. This issue arises because these IF tools define information value and usage statically, and consider analysts… more
Abstract:ABSTRACT: Recent years have seen an explosion in the number and sophistication of malware attacks. The sheer volume of novel malware has made purely manual signature development impractical and has led to research on applying machine learning and data mining to automatically infer malware… more
Abstract:Submarine commanders must make complex decisions to accomplish increasingly diverse missions. Moreover, concurrent missions may involve contradictory requirements. Planning must also account for the unexpected, including equipment failures, environmental factors, or external events that impact the… more
Abstract:Wireless ground sensor networks provide superior situational awareness in operational areas, but their deployment is complicated by unpredictable signal traffic patterns, limited battery life, and physical obstacles that interfere with signal propagation. Sub-optimal layouts create transmission… more
Abstract:Despite the increased availability of information through systems such as DCGS-A, CPOF, and efforts such as P-OIC, intelligence organizations are still plagued by inefficiencies in TCPED and analysis activitiessuch as collection gaps, collection overlaps, and missed collection opportunities. These… more
Abstract:The effective functioning of embedded networked devices is critical to the US's national security. A successful malicious attack on these systems could cause widespread damage and possibly deaths. Unfortunately, most existing embedded systems are largely unprotected and vulnerable to attack. A… more
Abstract:The objective of the proposed project is to develop technology that infers the intent and strategy of malware. This technology can then be used in conjunction with decoys and honeytokens to gather detailed information on malware intent and strategy, which will reveal valuable intelligence concerning… more
Abstract:In Phase I, CTS Inc developed microwave plasma CVD process and hardware to achieve state of the art performance of diamond detectorsin both single crystal and polycrystalline formsand to indicate methods of costs reduction. In Phase II, CTS Inc will apply these methods to create a viable commercial… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.