Theses/Dissertations from 2009
An FPGA-Based System for Tracking Digital Information Transmitted via Peer-to-Peer Protocols, Karl R. Schrader
Using Covert Means to Establish Cybercraft Command and Control, Bradley D. Sevy
Power Generation by Harvesting Ambient Energy with a Micro-Electromagnetic Generator, James H. Shields
Characterization of Hardening by Design Techniques on Commercial, Small Feature Sized Field-Programmable Gate Arrays, Thomas E. Simmons
Electronic Image Stabilization for Mobile Robotic Vision Systems, Michael John Smith
System Identification of an on Orbit Spacecraft's Antenna Dynamics, Christopher M. Sylvester
Image Processing for Multiple-Target Tracking on a Graphics Processing Unit, Michael A. Tanner
The Modular Clock Algorithm for Blind Rendezvous, Nicholas C. Theis
Using Predictive Rendering as a Vision-Aided Technique for Autonomous Aerial Refueling, Adam D. Weaver
Precision Navigation Using Pre-Georegistered Map Data, Frederick C. Webber
Enhancing the NS-2 Network Simulator for Near Real-Time Control Feedback and Distributed Simulation Breaks, John S. Weir
Characterizing Component Hiding Using Ancestral Entropy, Jason A. Williams
Suite of Standards for Electromagnetic Material Characterization Using Mode Matching Theory, Brian J. Witthoeft
Dynamic Interactions for Network Visualization and Simulation, Cigdem Yetisti
Theses/Dissertations from 2008
Identification of Command and Control Information Requirements for the Cyberspace Domain, Brian D. Aschenbrenner
On Graph Isomorphism and the PageRank Algorithm, Christopher J. Augeri
Developing Network Situational Awareness through Visualization of Fused Intrusion Detection System Alerts, Serafin A. Avitia V
Application of Optimization Techniques to Spectrally Modulated, Spectrally Encoded Waveform Design, Todd W. Beard
Network Visualization Design using Prefuse Visualization Framework, John Mark Belue
Using Hierarchical Temporal Memory for Detecting Anomalous Network Activity, Gerod M. Bonhoff
Limitations of a True Random Number Generator in a Field Programmable Gate Array, Jennifer L. Brady
Construction and Testing of Broadband High Impedance Ground Planes (HIGPS) for Surface Mount Antennas, Bora Cakiroglu
Mission Impact Analysis Visualization for Enhanced Situational Awareness, Sean C. M. Carroll
Conceptual Study of Rotary-Wing Microrobotics, Kelson D. Chabak
Multi-Reference Frame Image Registration for Rotation, Translation, and Scale, Christopher S. Costello
Hot Swapping Protocol Implementations in the OPNET Modeler Development Environment, Mark E. Coyne
Digital Fingerprinting of Field Programmable Gate Arrays, James W. Crouch
Dynamic Protocol Reverse Engineering a Grammatical Inference Approach, Mark E. DeYoung
A Hybrid Communications Network Simulation-Independent Toolkit, David M. Dines
Design and Optimization of Broadband High Impedance Ground Planes (HIGP) for Surface Mount Antennas, Murat Dogrul
Dynamic Behavior Sequencing in a Hybrid Robot Architecture, Jeffrey P. Duffy
Dialable Cryptography for Wireless Networks, Marnita T. Eaddie
Tightly Integrating Optical and Inertial Sensors for Navigation Using the UKF, Sedat Ebcin
Cyber Power in the 21st Century, Joseph M. Elbaum
Digital Signal Processing Leveraged for Intrusion Detection, Theodore J. Erickson
Behavior-Based Power Management in Autonomous Mobile Robots, Charles A. Fetzek
Material Perturbations to Enhance Performance of the Theile Half-Width Leaky Mode Antenna, Jason A. Girard
DOD Role For Securing United States Cyberspace, Jane J. Griffin
Characterization and Implementation of a Real-World Target Tracking Algorithm on Field Programmable Gate Arrays with Kalman Filter Test Case, Benjamin D. Hancey
Cyber Flag: A Realistic Cyberspace Training Construct, Andrew P. Hansen
Optimal Guidance of a Relay MAV for ISR Support Beyond Line-of-Sight, John H. Hansen
Hardware, Software and Data Analysis Techniques for SRAM-Based Field Programmable Gate Array Circuits, Eugene B. Hockenberry
A Secure and Efficient Communications Architecture for Global Information Grid Users via Cooperating Space Assets, Victor P. Hubenko
An Analysis of Botnet Vulnerabilities, Sean W. Hudson
Developing a Reference Framework for Cybercraft Trust Evaluation, Shannon E. Hunt
Obfuscation Framework Based on Functionally Equivalent Combinatorial Logic Families, Moses C. James
An Investigation into the Advantages, Mechanisms, and Developmental Challenges of Scripted Mobile Routing, Boyeon Jang
SHI(EL)DS: A Novel Hardware-based Security Backplane to Enhance Security with Minimal Impact to System Operation, Matthew G. Judge
Integration of Information Operations Theory into the Corporate Air Force, Thomas R. Kettles Jr.
SecureQEMU: Emulation-based Software Protection Providing Encrypted Code Execution and Page Granularity Code Signing, William B. Kimball
Statistical Methods for Polarimetric Imagery, Daniel A. LeMaster
Sensitivity Analysis of Algan/Gan Hemts to Process Variation, Adam J. Liddle
A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission, Robert L. Lidowski
Signal Processing Design of Low Probability of Intercept Waveforms, Nathaniel C. Liefer
Software Obfuscation with Symmetric Cryptography, Alan C. Lin
Integrated Approach to Airborne Laser Communication, James A. Louthain
Composable Distributed Access Control and Integrity Policies for Query-Based Wireless Sensor Networks, David W. Marsh
Applying Automated Theorem Proving to Computer Security, Kelly K. McElroy
Development and Flight of a Robust Optical-Inertial Navigation System Using Low-Cost Sensors, Michael B. Nielsen
Algorithms for White-box Obfuscation Using Randomized Subcircuit Selection and Replacement, Kenneth E. Norman
Exploitation of Self Organization in UAV Swarms for Optimization in Combat Environments, Dustin J. Nowak
Development of a Night Vision Goggle Heads Up Display For Paratrooper Guidance, Fernando Ontiveros
Scripted Mobile Network Routing in a Contested Environment, Anthony R. Otto
Constellation Design of Geosynchronous Navigation Satellites Which Maximizes Availability and Accuracy over a Specified Region of the Earth, Halil Ibrahim Ozdemir
Increasing Combat Aircraft Survivability Through Coherent Self-Protection Jammers, Soner Ozer
Creating an Agent Based Framework to Maximize Information Utility, John M. Pecarina
A Secure Group Communication Architecture for a Swarm of Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips
Joint Image and Pupil Plane Reconstruction Algorithm based on Bayesian Techniques, James D. Phillips
Limitations of Segmented Wavefront Control Devices in Emulating Optical Turbulence, Michael D. Plourde
Multi-Objective UAV Mission Planning Using Evolutionary Computation, Adam J. Pohl
Feasibility Study of Encoding Operational Mission Metadata into IPv6 Packet Headers, Timothy R. Policarpio
Evaluating Security and Quality of Service Considerations in Critical Infrastructure Communication Networks, Gregory R. Roberts
Multi-Class Classification for Identifying JPEG Steganography Embedding Methods, Benjamin M. Rodriguez II
Performance Analysis of Effective Range and Orientation of UHF Passive RFID, Paul N. Roque
Statistical Methods for Image Registration and Denoising, Matthew D. Sambora
Priority Based Buffering over Multiple Lossy Links Using TCP Aware Layer Buffering, Kevin J. Savidge
Establishing the Human Firewall: Reducing an Individual's Vulnerability to Social Engineering Attacks, Jamison W. Scheeres
Effects of Multipath and Oversampling on Navigation Using Orthogonal Frequency Division Multiplexed Signals of Opportunity, Christopher M. Schexnayder
Collision Avoidance for UAVs Using Optic Flow Measurement with Line of Sight Rate Equalization and Looming, Paul J. Shelnutt
Hardware Algorithm Implementation for Mission Specific Processing, Jason W. Shirley
Sub-circuit Selection and Replacement Algorithms Modeled as Term Rewriting Systems, Eric D. Simonaire
Operationalizing Offensive Social Engineering for the Air Force, Bryan E. Skarda
Hyperspectral-Augmented Target Tracking, Neil A. Soliman
Microfluidic Power Generation, Aaron J. Sprecher
A Survey of Satellite Communications System Vulnerabilities, Jessica A. Steinberger
Anti-Tamper Method for Field Programmable Gate Arrays Through Dynamic Reconfiguration and Decoy Circuits, Samuel J. Stone
Applying Frequency-Domain Equalization to Code-Division Multiple Access and Transform-Domain Communications Systems, Alfred A. Tamayo III
Improvement of ECM Techniques through Implementation of a Genetic Algorithm, James D. Townsend
A Wide Area Bipolar Cascade Resonant Cavity Light Emitting Diode for a Hybrid Range-Intensity, Reginald J. Turner
Closed-Loop Adaptive Optics Control in Strong Atmospheric Turbulence, Todd M. Venema
Analysis of Non-Uniform Gain for Control of a Deformable Mirror in an Adaptive-Optics System, Kevin P. Vitayaudom
A Formal Specification and Proof of System Safety Using the Schematic Protection Model, Raymond S. Way
Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection, Matthew A. Zimmerman
Theses/Dissertations from 2007
Adaptive Gravitational Gossip in Monitoring the Joint Battlespace Infosphere, Edmund Descartes Aban
Multi-dimensional Classification Algorithm for Automatic Modulation Recognition, Ouail Albairat
Characterizationn of Polumer-Based MEMS Pyroelectic Infrared Detector, Mark E. Allard
Controller Design for Accurate Antenna Pointing Onboard a Spacecraft, Victor M. Barba
Software Protection against Reverse Engineering Tools, Joshua A. Benson
A Modular Mixed Signal VLSI Design Approach for Digital Radar Applications, Brian M. Brakus
Multi-Dimensional Range Querying using a Modification of the Skip Graph, Gregory J. Brault