Projects
Tagged As

Reconnaissance of Influence Operations
New software takes advantage of artificial intelligence techniques to automate the detection and assessment of aggressive influence operations.
Tags

Applied Resilience for Mission Systems
We’re improving and guiding the resilience of Department of Defense missions by adapting commercial practices and academic research for the development, operation, and sustainment of software-intensive systems.
Tags

Keylime
We're enabling trust in the cloud with this free, open-source key bootstrapping and integrity management software architecture.
Tags

Secure Small Satellite Processing Platform
A secure reference architecture enables satellites to recover from cyberattacks and carry on their missions.
Tags

High Assurance Design Environment
A new tool enables mission system designers to design for functionality and security together and provide evidence for how design choices affect a mission’s security posture.
Tags

Computer on Watch
An artificial intelligence application that automatically identifies objects in aerial imagery could reduce the time analysts spend in manually combing through images.
Tags

Cyber Adversarial Scenario Modeler and Artificial Intelligence Decision Engine (CASCADE)
CASCADE software simulates cyber attacker and defender actions and recommends multiple courses of action to make systems and networks more secure.
Tags

Next-Generation Incident Command System
Emergency agencies around the world are using NICS to coordinate rapid and organized response to disasters.
Tags

CHARIOT
Using CHARIOT software, cybersecurity analysts can quickly filter online data to discover conversations that hint at cyber threat
Tags

Large-scale Automated Vulnerability Addition
Computer scientists can test techniques for finding vulnerabilities in code.
Tags