Publications
Recommender systems for the Department of Defense and intelligence community
Summary
Summary
Recommender systems, which selectively filter information for users, can hasten analysts' responses to complex events such as cyber attacks. Lincoln Laboratory's research on recommender systems may bring the capabilities of these systems to analysts in both the Department of Defense and intelligence community.
Finding malicious cyber discussions in social media
Summary
Summary
Today's analysts manually examine social media networks to find discussions concerning planned cyber attacks, attacker techniques and tools, and potential victims. Applying modern machine learning approaches, Lincoln Laboratory has demonstrated the ability to automatically discover such discussions from Stack Exchange, Reddit, and Twitter posts written in English.
Threat-based risk assessment for enterprise networks
Summary
Summary
Protecting enterprise networks requires continuous risk assessment that automatically identifies and prioritizes cyber security risks, enables efficient allocation of cyber security resources, and enhances protection against modern cyber threats. Lincoln Laboratory created a network security model to guide the development of such risk assessments and, for the most important cyber...
Cloudbreak: answering the challenges of cyber command and control
Summary
Summary
Lincoln Laboratory's flexible, user-centered framework for the development of command-and-control systems allows the rapid prototyping of new system capabilities. This methodology, Cloudbreak, effectively supports the insertion of new capabilities into existing systems and fosters user acceptance of new tools.
Secure embedded systems
Summary
Summary
Developers seek to seamlessly integrate cyber security within U.S. military system software. However, added security components can impede a system's functionality. System developers need a well-defined approach for simultaneously designing functionality and cyber security. Lincoln Laboratory's secure embedded system co-design methodology uses a security coprocessor to cryptographically ensure system confidentiality...
Secure and resilient cloud computing for the Department of Defense
Summary
Summary
Cloud computing offers substantial benefits to its users: the ability to store and access massive amounts of data, on-demand delivery of computing services, the capability to widely share information, and the scalability of resource usage. Lincoln Laboratory is developing technology that will strengthen the security and resilience of cloud computing...
Building Resource Adaptive Software Systems (BRASS): objectives and system evaluation
Summary
Summary
As modern software systems continue inexorably to increase in complexity and capability, users have become accustomed to periodic cycles of updating and upgrading to avoid obsolescence—if at some cost in terms of frustration. In the case of the U.S. military, having access to well-functioning software systems and underlying content is...
Scalability of VM provisioning systems
Summary
Summary
Virtual machines and virtualized hardware have been around for over half a century. The commoditization of the x86 platform and its rapidly growing hardware capabilities have led to recent exponential growth in the use of virtualization both in the enterprise and high performance computing (HPC). The startup time of a...
Photothermal speckle modulation for noncontact materials characterization
Summary
Summary
We have developed a noncontact, photothermal materials characterization method based on visible-light speckle imaging. This technique is applied to remotely measure the infrared absorption spectra of materials and to discriminate materials based on their thermal conductivities. A wavelength-tunable (7.5-8.7 um), intensity-modulated, quantum cascade pump laser and a continuous-wave 532 nm...
Airspace flow rate forecast algorithms, validation, and implementation
Summary
Summary
This report summarizes work performed by MIT Lincoln Laboratory during the period 1 February 2015 - 30 November 2015 focused on developing and improving algorithms to estimate the impact of convective weather on air traffic flows. The core motivation for the work is the need to improve strategic traffic flow...