Projects

Refine Results

(Filters Applied) Clear All
This image illustrates a retweet network for the #MacronLeaks narrative during the 2017 French presidential election. Each circle represents a Twitter account, and arrows represent “retweets.”
artificial intelligence
New software takes advantage of artificial intelligence techniques to automate the detection and assessment of aggressive influence operations.
an illustration of an infinity symbol with label of "ARMS: Applied Resilience for Mission Systems"
cyber security
We’re improving and guiding the resilience of Department of Defense missions by adapting commercial practices and academic research for the development, operation, and sustainment of software-intensive systems.
an illustration of a key lock protecting lines and nodes.
cyber security
We're enabling trust in the cloud with this free, open-source key bootstrapping and integrity management software architecture.
Small satellites are an attractive option for missions because of their low costs; however, they are vulnerable to cyberattacks. We provide a securable and usable architecture for keeping small satellites resilient to system compromise.
software
A secure reference architecture enables satellites to recover from cyberattacks and carry on their missions.
HARDEN interface screenshot
software
A new tool enables mission system designers to design for functionality and security together and provide evidence for how design choices affect a mission’s security posture.
A goal of the program is to develop a system that can identify spatial relationships between objects in a scene, such as counting how many planes are parked at the terminal on the left.
information, computation, & exploitation
An artificial intelligence application that automatically identifies objects in aerial imagery could reduce the time analysts spend in manually combing through images.
CHARIOT software helps reduce the time that analysts spend searching vast amounts of online data by automatically flagging content that likely contains cyber discussions indicative of potential cyber attacks.
human language technology
Using CHARIOT software, cybersecurity analysts can quickly filter online data to discover conversations that hint at cyber threat
Optical sensors, such as the Space Surveillance Telescope, collect data that are processed by analysts at Air Force sites who use OPAL to provide detections of space objects.
software
Our researchers developed a software architecture that allows analysts to rapidly run algorithms on the volumes of sensor data collected about space objects.
The FOVEA tool is just one of Lincoln Laboratory's efforts to help the Department of Homeland Security Science and Technology Directorate protect public spaces such as subways from attacks.
analytics
The tool lets security officials quickly analyze video surveillance footage and track incidents of interest.

Showing Results

1-10 of 10