Projects

Refine Results

(Filters Applied) Clear All
A photo of a service member preparing a small autonomous robot.
cyber security
A security module, pre-certified by the National Security Agency, for protecting communications on uncrewed platforms can accelerate the fielding of new systems and open opportunities for the commercial sector.
Graphic showing a military servicemember on the left and a full hospital scenario on the right.
machine learning
This machine learning model will help military and hospital personnel predict when servicemembers and patients may recover following an injury or surgery.
a collage of images showing a satellite, a jet, a warship, and soldiers on the ground. In the middle of the collage is an illustration of a circuit board.
cyber security
Lincoln Laboratory is developing technologies to meet the highest standards for information security at the tactical edge.
a screenshot of a user interface shows a world map with radar-like depictions of rain bands, colored blue, green, and yellow.
aviation weather
By compiling lightning data, satellite imagery, and numerical weather models, the GSWR provides radar-like analyses and forecasts over regions not observed by actual weather radars.
an illustration of satellite in space with Earth's blue surface in the background.
cyber security
We are researching and prototyping cyber-resilient space systems software that will enable critical national security space assets to withstand, operate through, and recover from cyberattack.
an illustration of several dozen translucent blue cubes, with highlighting lines connecting them, representing nodes.
cyber security
We are creating secure software foundations and applying them to operating systems used widely in mission-critical systems for the Department of War.
3 columns of text labeled "Secur Computation Engine," "Secure Data Capsule," and 'Content-centric network" laid over a graphic of the earth with "streams" of data, 0s and 1s, wrapping around Earth.
cyber security
We’re shifting the paradigm from system-centric to data-centric security, enabling automatic protection for data throughout all of its uses.

Showing Results

1-10 of 20