MIT Lincoln Laboratory
  • Home
  • Contact Us
  • Sitemap
  • About ›
    • History ›
    • Organization ›
    • Facilities ›
    • Field Sites ›
    • Lincoln Laboratory/ MIT Interactions ›
    • Technology Transfer ›
    • Small Business Office ›
    • Visitor Information / Directions ›
    • Laboratory Status ›
  • Mission Areas ›
    • Space Control ›
    • Air and Missile Defense Technology ›
    • Communication Systems ›
    • Cyber Security and Information Sciences ›
    • ISR Systems and Technology ›
    • Advanced Technology ›
    • Tactical Systems ›
    • Homeland Protection ›
    • Air Traffic Control ›
    • Engineering ›
  • Employment ›
    • Employment Opportunities ›
    • Professional Development ›
    • Staff Profiles ›
    • Benefits ›
    • Work-Life Balance ›
    • Diversity and Inclusion ›
    • Leadership Development Program for Contracting ›
    • Organization of Technical Divisions ›
  • College Recruiting ›
    • Search for On-Campus Activities ›
    • Recruitment Calendar ›
    • Summer Research Program ›
    • Student Programs ›
    • Fellowship Programs ›
    • Organization of Technical Divisions ›
    • Technical Seminar Series ›
  • News ›
    • Awards ›
    • Lincoln Laboratory in the News ›
  • Publications ›
    • Annual Report ›
    • Lincoln Laboratory Journal ›
    • Lab Notes ›
    • Tech Notes ›
    • Discover Your Mission ›
    • Lincoln Laboratory Community Outreach Brochure ›
    • Lincoln Laboratory History Book › 
  • Outreach ›
    • Support STEM Programs ›
    • Educational Outreach ›
    • Community Service and Giving ›
    • Retiree Information ›
    • Marshallese Community Outreach ›
  • Workshops/Education ›
Home  ›  Mission Areas  ›  Communication Systems and Cyber Security  ›  Publications  ›  Cyber Systems and Technology

PUBLICATIONS

  • Communication Systems and Cyber Security Home ›
  • Cyber Security ›
  • Human Language Technology ›
  • Wireless Networking Library  ›
  • Publications ›
    • Cyber Security ›
    • Human Language Technology ›

Cyber Systems and Technology

Publications By Topic

Cyber and Computer Network Operations

  • Attack Graphs
  • Cryptographic Protocols and Network Security
  • Intrusion Detection and Monitoring
  • Machine Learning Applied to Security
  • Software Security Analysis
  • System Security Analysis
  • Visualization Techniques
  • Evaluation, Corpora, and Testing
  • Survivable System Architecture
  • Security Architecture

Historical Publications

  • Integration of Voice and Data Networks
  • Machine Learning

 

Publications by Author

  • Baker, Graham
  • Blumenthal, Uri
  • Boyer, Stephen W.*
  • Brown, Ruben E.
  • Chu, Matthew B.
  • Cooley, Joseph A.
  • Cunningham, Robert K.
  • Dain, Oliver M.*
  • Fuller, Benjamin W.
  • Graf, Isaac*
  • Haines, Joshua W.
  • Ingols, Kyle W.
  • Jones, Douglas A.
  • Kassay, David A.*
  • Khazan, Roger I.
  • Kratkiewicz, Kendra
  • Leek, Timothy R.
  • Lewandowski, Scott M.*
  • Lippmann, Richard P.
  • McLain, Cynthia D.
  • Maddi, Siddartha
  • Miller, Duncan C.*
  • Okhravi, Hamed
  • Parks, Thomas M.*
  • Pickard, Galen E.*
  • Piwowarski, Keith*
  • Riordan, James F.
  • Rossey, Lee M.
  • Schechter, Stuart*
  • Scott, Christopher G.*
  • Shah, Aakash B.
  • Steele, William R.*
  • Streilein, William W.
  • Truelove, John
  • Webster, Seth E.
  • Weinstein, Clifford J.*
  • Wright, Charles V.
  • Yu, Tamara H.
  • Yuditskaya, Sophia
  • Zhivich, Michael A.
  • Zissman, Marc A.*

*retired from the Laboratory or left the group to pursue other research.

top of page

© 2012 Lincoln Laboratory, Massachusetts Institute of Technology  |  Diversity  |  Disclaimer  |  contact: llwebmaster@ll.mit.edu