Follow


Theses/Dissertations from 2014

PDF

Non-Linear Optimization Applied to Angle-of-Arrival Satellite-Based Geolocation, Stephen D. Hartzell

PDF

Opportunistic Access in Frequency Hopping Cognitive Radio Networks, Ethan S. Hennessey

PDF

Selective Dry Etch for Defining Ohmic Contacts for High Performance ZnO TFTs, Matthew L. Herold

PDF

A Quantification of the 3D Modeling Capabilities of the Kinect Fustion Algorithm, Jeremy M. Higbee

PDF

Improving Statistical Machine Translation Through N-best List, Jordan S. Keefer

PDF

Complexity, Heuristic, and Search Analysis for the Games of Crossings and Epaminondas, David W. King Jr.

PDF

Design, Fabrication and Testing of Two Dimensional Radio Frequency Metamaterials, Russell P. Krones

PDF

Radio Frequency Fingerprinting Techniques through Preamble Modification in IEEE 802.11b, Nicholas J. Kulesza

PDF

Characterization and Performance Comparison of Low-Voltage, High-Speed, Push-Pull and traveling-wave Silicon Mach-Zehnder Modulators, Tristan A. Latchu

PDF

Terrain Referenced Navigation Using SIFT Features in LiDAR Range-Based Data, Matthew T. Leines

PDF

An Artificial Neural Network-based Decision-Support System for Integrated Network Security, Tyrone A. Lewis

PDF

A Recommender System in the Cyber Defense Domain, Katherine B. Lyons

PDF

Vulnerability Analysis of the MAVLink Protocol for Command and Control of Unmanned Aircraft, Joseph A. Marty

PDF

Estimation and Coordination of Sequence Patterns for Frequency Hopping Dynamic Spectrum Access Networks, Curtis C. Medve

PDF

Characterizing and Optimizing the Performance of the MAESTRO 49-core Processor, Eric W. Mote

PDF

Large Scale Hierarchical K-Means Based Image Retrieval With MapReduce, William E. Murphy

PDF

Outperforming Game Theoretic Play with Opponent Modeling in Two Player Dominoes, Michael M. Myers

PDF

Microelectromechanical Systems (MEMS) Photoacoustic (PA) Detector of Terahertz (THz) Radiation for Chemical Sensing, Richard A. Newberry

PDF

Advances in SCA and RF-DNA Fingerprinting Through Enhanced Linear Regression Attacks and Application of Random Forest Classifiers, Hiren J. Patel

PDF

Scalable System Design for Covert MIMO Communications, Jason R. Pennington

PDF

Enhanced Polarimetric Radar Imaging Using Cross-Channel Coupling Constraints, Andrea E. Perhai

PDF

Bayesian Methods and Confidence Intervals for Automatic Target Recognition of SAR Canonical Shapes, Richard W. Rademacher

PDF

Improved Wireless Security through Physical Layer Protocol Manipulation and Radio Frequency Fingerprinting, Benjamin W. Ramsey

PDF

Nondestructive Electromagnetic Characterization of Uniaxial Materials, Neil G. Rogers

PDF

Simulated Assessment of Interference Effects in Direct Sequence SpreadSpectrum (DSSS) QPSK Receiver, Luis S. Rojas

PDF

Blind Demodulation of Pass Band OFDMA Signals and Jamming Battle Damage Assessment Utilizing Link Adaptation, Nicholas A. Rutherford

PDF

Programmable Logic Controller Modification Attacks for Use in Detection Analysis, Carl D. Schuett

PDF

Complex VLSI Feature Comparison for Commercial Microelectronics Verification, Michael K. Seery

PDF

Radio Frequency Emitter Geolocation Using Cubesats, Andrew J. Small

PDF

REDIR: Automated Static Detection of Obfuscated Anti-Debugging Techniques, Adam J. Smith

PDF

Image-Aided Navigation Using Cooperative Binocular Stereopsis, Justin T. Soeder

PDF

The Scattering of Partially Coherent Electromagnetic Beam Illumination from Statistically Rough Surfaces, Mark F. Spencer

PDF

Contact Resistance Evolution and Degradation of Highly Cycled Micro-Contacts, Christopher L. Stilson

PDF

A Comparison of RF-DNA Fingerprinting Using High/Low Value Receivers with ZigBee Devices, Tyler D. Stubbs

PDF

A Test Methodology for Evaluating Cognitive Radio Systems, Jared J. Thompson

PDF

Development of Adaptive Tilt Tracker that Utilizes QUAD-cell Detector to Track Extended Objects, Issac J. Thornton

PDF

Passive RF Tomography: Signal Processing and Experimental Validation, Thang M. Tran

PDF

Automated Driftmeter Fused with Inertial Navigation, Allan D. Tuma

PDF

Airborne Wireless Communication Modeling and Analysis with MATLAB, Matthew J. Vincie

PDF

Removing Parallax-Induced False Changes in Change Detection, Karmon M. Vongsy

PDF

Behavioral Profiling of SCADA Network Traffic using Machine Learning Algorithms, Jessica R. Werling

PDF

Carbon Nanotube Growth Rate Regression using Support Vector Machines and Artificial Neural Networks, Nicholas M. Westing

PDF

Distinguishing Internet-facing ICS devices using PLC programming information, Paul M. Williams

PDF

Signal Processing in Cold Atom Interferometry-Based INS, Kara M. Willis

PDF

PLC Hardware Discrimination using RF-DNA fingerprinting, Bradley C. Wright

PDF

Textile Fingerprinting for Dismount Analysis in the Visible, Near, and Shortwave Infrared Domain, Jennifer S. Yeom

PDF

Selectively Tuning a Buckled Si/SiO2 Membrane MEMS through Joule Heating Actuation and Mechanical Restriction, Kyle K. Ziegler

Theses/Dissertations from 2013

PDF

High Frequency Magnetic Field Direction Finding Using MGL-S8A B-dot Sensors, Michael D. Archer

PDF

Computer Based Behavioral Biometric Authentication via Multi-Modal Fusion, Kyle O. Bailey

PDF

Classification of Encrypted Web Traffic Using Machine Learning Algorithms, William C. Barto

PDF

Firmware Counterfeiting and Modification Attacks on Programmable Logic Controllers, Zachary H. Basnight

PDF

Laser Illuminated Imaging: Multiframe Beam Tilt Tracking and Deconvolution Algorithm, David J. Becker

PDF

Photoacoustic Detection of Terahertz Radiation for Chemical Sensing and Imaging Applications, Stjepan Blazevic

PDF

Learning Enterprise Malware Triage from Automatic Dynamic Analysis, Jonathan S. Bristow

PDF

Cloud Computing Trace Characterization and Synthetic Workload Generation, Salvatore Capra

PDF

Characterization of Metal-Insulator-Transition (MIT) Phase Change Materials (PCM) for Reconfigurable Components, Circuits, and Systems, Brent L. Danner

PDF

Real-time Heading Estimation using Perspective Features, James W. Dean

PDF

Machine Conscious Architecture for State Exploitation and Decision Making, Mark M. Derriso

PDF

Estimating and Measuring Application Latency of Typical Distributed Interactive Simulation (DIS) - Based Simulation Architecture, Ryan L. Drinkwater

PDF

Using RF-DNA Fingerprints to Discriminate ZigBee Devices in an Operational Environment, Clay K. Dubendorfer

PDF

Cognitive Augmentation for Network Defense, James E. Emge

Format Preserving Encryption: Evaluating FFX for Use Within the NextGen Air Traffic Control System, Cindy D. Finke

PDF

Rootkit Detection Using A Cross-View Clean Boot Method, Bridget N. Flatley

PDF

Applied Hypergame Theory for Network Defense, Alan S. Gibson

PDF

MEMS Cantilever Sensor for THz Photoacoustic Chemical Sensing and Spectroscopy, Nathan E. Glauvitz

PDF

Examining Application Components to Reveal Android Malware, John B. Guptill

PDF

Passive MIMO Radar Detection, Daniel E. Hack

PDF

Automatic Modulation Classification of Common Communication and Pulse Compression Radar Waveforms using Cyclic Features, John A . Hadjis

PDF

Mobile Network Defense Interface for Cyber Defense and Situational Awareness, James C. Hannan

PDF

Information Encoding on a Pseudo Random Noise Radar Waveform, Joshua A . Hardin

PDF

All-Optical Logic Gates and Wavelength Conversion Via the Injection-Locking of a Fabry-Perot Semiconductor Laser, Evan P. Harvey

PDF

Side-channel Analysis of Subscriber Identity Modules, John A. Hearle

PDF

Improving Bandwidth Utilization in a 1 Tbps Airborne MIMO Communications Downlink, Jonathan D. Hill

PDF

Emulation of Industrial Control Field Device Protocols, Robert M. Jaromin

A Formal Approach to Vulnerability Discovery in Binary Programs, William B. Kimball

PDF

Development of a Model and Localization Algorithm for Received Signal Strength-Based Geolocation, Amanda S. King

PDF

Development of a Response Planner Using the UCT Algorithm for Cyber Defense, Michael P. Knight

PDF

RF Emitter Tracking and Intent Assessment, Benjamin J. Kuhar

PDF

Constitutive Parameter Measurement Using Double Ridge Waveguide, Nathan J. Lehman

PDF

Dynamic Network Topologies, Heather A. Lingg

PDF

Sensitivity Analysis of an Automated Calibration Routine for Airborne Cameras, Philip E. Lorenzini

PDF

A Study of Dim Object Detection for the Space Surveillance Telescope, Stephen D. Maksim

PDF

Error Characterization of Vision-Aided Navigation Systems, Daniel A . Marietta

PDF

An Architecture for Coexistence with Multiple Users in Frequency Hopping Cognitive Radio Networks, Ryan K. McLean

PDF

Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment, David P. Montminy

PDF

Evaluating the Effectiveness of IP Hopping via an Address Routing Gateway, Ryan A . Morehart

PDF

The Miniaturization of the AFIT Random Noise Radar, Aaron T. Myers

PDF

Improving Multiple Surface Range Estimation of a 3-Dimensional FLASH LADAR in the Presence of Atmospheric Turbulence, Brian J. Neff

PDF

Image Annotation and Topic Extraction Using Super-Word Latent Dirichlet, George E. Noel III

PDF

Spectral Detection of Acute Mental Stress with VIS-SWIR Hyperspectral Imagery, Elizabeth K. Norvell

PDF

Evaluation of Cyber Sensors for Enhancing Situational Awareness in the ICS Environment, Jeremy R. Otis

PDF

Metamaterial Structure Design Optimization: A Study of the Cylindrical Cloak, Jason V. Paul

PDF

Atmospheric Impact on Long Pulse Laser Detection and Ranging (LADAR) Systems, Isaac B. Putnam

PDF

Inertial Navigation System Aiding Using Vision, James O. Quarmyne

PDF

Modeling Cyber Situational Awareness through Data Fusion, Evan L. Raulerson

PDF

Detection Optimization of the Progressive Multi-Channel Correlation Algorithm Used in Infrasound Nuclear Treaty Monitoring, Anthony M. Runco

PDF

A Multi Agent System for Flow-Based Intrusion Detection, David A . Ryan

PDF

Material Characterization Using Passive Multispectral Polarimetric Imagery, Melissa A . Sawyer

PDF

Characterization and Dynamic Analysis of Long-Cavity Multi-Section Gain-Levered Quantum-Dot Lasers, John R. Schmidt

PDF

File Carving and Malware Identification Algorithms Applied to Firmware Reverse Engineering, Karl A . Sickendick