Projects

Refine Results

(Filters Applied) Clear All
a graphic of a "bubble" with gears inside, and locks surrounding it, laid on top of a drawing of the globe.
cyber security
We’re shifting the paradigm from system-centric to data-centric security, enabling automatic protection for data throughout all of its uses.
This image illustrates a retweet network for the #MacronLeaks narrative during the 2017 French presidential election. Each circle represents a Twitter account, and arrows represent “retweets.”
artificial intelligence
New software takes advantage of artificial intelligence techniques to automate the detection and assessment of aggressive influence operations.
an illustration of an infinity symbol with label of "ARMS: Applied Resilience for Mission Systems"
cyber security
We’re improving and guiding the resilience of Department of Defense missions by adapting commercial practices and academic research for the development, operation, and sustainment of software-intensive systems.
an illustration of a key lock protecting lines and nodes.
cyber security
We're enabling trust in the cloud with this free, open-source key bootstrapping and integrity management software architecture.
the letters "CEP"
cyber security
Developers can test cybersecurity solutions for government systems by using an integrated circuit modeled on Department of Defense designs.
an illustration of a circuit board
cyber security
We've developed an architecture and program plan for a moonshot to build a computer system that is secure to large classes of cyberattacks.
an illustration of a world map with network lines connecting countries
cyber security
A suite of technologies protects data both at rest and in transit by providing access to secure computation nodes distributed throughout a network.
TKM enables seamless over-the-network key distribution to unmanned aerial vehicles (UAVs) and authorized terminals. At left, UAV video is accessible to authorized terminals. At right, an operator has modified access during the mission.
cryptography
Cryptographic keys can now be created and securely distributed in real time during a mission.
HARDEN interface screenshot
software
A new tool enables mission system designers to design for functionality and security together and provide evidence for how design choices affect a mission’s security posture.

Showing Results

1-9 of 9