Publications
Simultaneous Transmit and Receive (STAR) mobile testbed
Summary
Summary
Simultaneous Transmit and Receive (STAR) systems typically utilize multiple cancellation layers to improve system isolation and avoid self-interference. The design of these different layers must be evaluated both individually and as a whole to determine their effectiveness in various environments. A flexible and reusable mobile testbed was constructed to aid...
Reagent approaches for improved detection of chlorate and perchlorate salts via thermal desorption and ionization
Summary
Summary
RATIONALE: Techniques for improving the detectability of chlorate and perchlorate salts with thermal desorption based ionizers (i.e. radioactive, corona discharge and photoionization-based) are desired. This work employs acidic reagents to chemically transform chlorate and perchlorate anions into traces of chloric and perchloric acid. These high vapor pressure acids are easier...
Finding malicious cyber discussions in social media
Summary
Summary
Today's analysts manually examine social media networks to find discussions concerning planned cyber attacks, attacker techniques and tools, and potential victims. Applying modern machine learning approaches, Lincoln Laboratory has demonstrated the ability to automatically discover such discussions from Stack Exchange, Reddit, and Twitter posts written in English.
Recommender systems for the Department of Defense and intelligence community
Summary
Summary
Recommender systems, which selectively filter information for users, can hasten analysts' responses to complex events such as cyber attacks. Lincoln Laboratory's research on recommender systems may bring the capabilities of these systems to analysts in both the Department of Defense and intelligence community.
Recommender systems for the Department of Defense and intelligence community
Summary
Summary
Recommender systems, which selectively filter information for users, can hasten analysts' responses to complex events such as cyber attacks. Lincoln Laboratory's research on recommender systems may bring the capabilities of these systems to analysts in both the Department of Defense and intelligence community.
Secure and resilient cloud computing for the Department of Defense
Summary
Summary
Cloud computing offers substantial benefits to its users: the ability to store and access massive amounts of data, on-demand delivery of computing services, the capability to widely share information, and the scalability of resource usage. Lincoln Laboratory is developing technology that will strengthen the security and resilience of cloud computing...
Secure embedded systems
Summary
Summary
Developers seek to seamlessly integrate cyber security within U.S. military system software. However, added security components can impede a system's functionality. System developers need a well-defined approach for simultaneously designing functionality and cyber security. Lincoln Laboratory's secure embedded system co-design methodology uses a security coprocessor to cryptographically ensure system confidentiality...
Cloudbreak: answering the challenges of cyber command and control
Summary
Summary
Lincoln Laboratory's flexible, user-centered framework for the development of command-and-control systems allows the rapid prototyping of new system capabilities. This methodology, Cloudbreak, effectively supports the insertion of new capabilities into existing systems and fosters user acceptance of new tools.
Building Resource Adaptive Software Systems (BRASS): objectives and system evaluation
Summary
Summary
As modern software systems continue inexorably to increase in complexity and capability, users have become accustomed to periodic cycles of updating and upgrading to avoid obsolescence—if at some cost in terms of frustration. In the case of the U.S. military, having access to well-functioning software systems and underlying content is...
Scalability of VM provisioning systems
Summary
Summary
Virtual machines and virtualized hardware have been around for over half a century. The commoditization of the x86 platform and its rapidly growing hardware capabilities have led to recent exponential growth in the use of virtualization both in the enterprise and high performance computing (HPC). The startup time of a...