Projects

Refine Results

(Filters Applied) Clear All
Small satellites are an attractive option for missions because of their low costs; however, they are vulnerable to cyberattacks. We provide a securable and usable architecture for keeping small satellites resilient to system compromise.
software
A secure reference architecture enables satellites to recover from cyberattacks and carry on their missions.
TKM enables seamless over-the-network key distribution to unmanned aerial vehicles (UAVs) and authorized terminals. At left, UAV video is accessible to authorized terminals. At right, an operator has modified access during the mission.
cryptography
Cryptographic keys can now be created and securely distributed in real time during a mission.
HARDEN interface screenshot
software
A new tool enables mission system designers to design for functionality and security together and provide evidence for how design choices affect a mission’s security posture.
Picture of rubble after a natural disaster.
disaster relief
Novel metamaterials deployed to provide a barrier around critical structures are designed to redirect and attenuate hazardous seismic waves.
Graphic of TbD-net subtasks
artificial intelligence
A new neural network model reveals some of the mystery behind the decision-making capability of artificial intelligence systems.
Haystack Ultrawideband Satellite Imaging Radar at night
space situational awareness
Lincoln Laboratory created the world's highest-resolution radar for imaging of space objects in support of space situational awareness.
The ASIC system on chip was fabricated using industry processes and best practices. This image shows the chip during the packaging process.
embedded computing
A power-efficient application-specific integrated circuit system on chip that performs up to 2 trillion computations per second has potential for use in mobile communication systems.
The Laboratory's novel optical communication system was integrated on a robotic undersea vehicle.
optical systems
A system that enables robust, long-distance communications between underwater vehicles exploits laser technology.
A goal of the program is to develop a system that can identify spatial relationships between objects in a scene, such as counting how many planes are parked at the terminal on the left.
information, computation, & exploitation
An artificial intelligence application that automatically identifies objects in aerial imagery could reduce the time analysts spend in manually combing through images.