Follow


Theses/Dissertations from 2012

PDF

Obfuscating Against Side-Channel Power Analysis Using Hiding Techniques for AES, Austin W. Fritzke

PDF

OFDM-Based Signal Exploitation Using Quadrature Mirror Filter Bank (QMFB) Processing, Felipe E. Garrido

PDF

Intra-procedural Path-insensitive Grams (i-grams) and Disassembly Based Features for Packer Tool Classification and Detection, Scott E. Gerics

PDF

Scalable Wavelet-Based Active Network Stepping Stone Detection, Joseph I. Gilbert

PDF

Magnesium Object Manager Sandbox, A More Effective Sandbox Method for Windows 7, Martin A. Gilligan

PDF

Air-to-Air Missile Enhanced Scoring with Kalman Smoothing, Jonathon S. Gipson

PDF

The White-hat Bot: A Novel Botnet Defense Strategy, Tyrone C. Gubler

PDF

Passive Synthetic Aperture Radar Imaging Using Commercial OFDM Communication Networks, Jose R. Gutierrez del Arroyo

PDF

Vulnerability Analysis of the Player Command and Control Protocol, John T. Hagen

PDF

Modeling the Effects of the Local Environment on a Received GNSS Signal, Marshall E. Haker

PDF

Target Classification of Canonical Scatterers Using Classical Estimation and Dictionary Based Techniques, G. Barry Hammond II

PDF

Magnetic Field Generation and B-Dot Sensor Characterization in the High Frequency Band, Ryan L. Hardin

PDF

Forensic Memory Analysis for Apple OS X, Andrew F. Hay

PDF

Utilizing Graphics Processing Units for Network Anomaly Detection, Jonathan D. Hersack

PDF

The Effects of Cognitive Jamming on Wireless Sensor Networks used for Geolocation, Michael A. Huffman

PDF

Design, Modeling, and Measurement of a Metamaterial Electromagnetic Field Concentrator, Noel A. Humber

PDF

An Analysis of Error Reconciliation Protocols for use in Quantum Key Distribution, James S. Johnson

PDF

Enhanced Image-Aided Navigation Algorithm with Automatic Calibration and Affine Distortion Prediction, Juan D. Jurado

PDF

Enhancing Trust in the Smart Grid by Applying a Modified Exponentially Weighted Averages Algorithm, Andrew T. Kasperek

PDF

Radar Based Navigation in Unknown Terrain, Kyle J. Kauffman

PDF

Augmenting the Global Positioning System with Foreign Navigation Systems and Alternative Sensors, Christopher B. Killion

PDF

Binary Classification of an Unknown Object through Atmospheric Turbulence Using a Polarimetric Blind-Deconvolution Algorithm Augmented with Adaptive Degree of Linear Polarization Priors, Mu J. Kim

PDF

Effects of Architecture on Information Leakage of a Hardware Advanced Encryption Standard Implementation, Eric A. Koziel

PDF

Design, Fabrication and Testing of Tunable RF Meta-atoms, Derrick Langley

PDF

Evaluation of Traditional Security Solutions in the SCADA Environment, Robert D. Larkin

PDF

Improvements to Optical Communication Capabilities Achieved through the Optical Injection of Semiconductor Lasers, Timothy P. Locke

PDF

UHF Antenna Design for AFIT Random Noise Radar, Matthew T. Ludwig

PDF

Exploiting the Automatic Dependent Surveillance-Broadcast System via False Target Injection, Domenic Magazu III

PDF

Resolution Study of a Hyperspectral Sensor Using Computed Tomography in the Process of Noise, Samuel V. Mantravadi

PDF

Evaluation of Malware Target Recognition Deployed in a Cloud-Based Fileserver Environment, G. Parks Masters

PDF

External Verification of SCADA System Embedded Controller Firmware, Lucille R. McMinn

PDF

Creating Network Attack Priority Lists by Analyzing Email Traffic Using Predefined Profiles, Eric J. Merrit

PDF

Cyberspace and Real-World Behavioral Relationships: Towards the Application of Internet Search Queries to Identify Individuals At-risk for Suicide, Casey C. Miller

PDF

Binary Disassembly Block Coverage by Symbolic Execution vs. Recursive Descent, Jonathan D. Miller

PDF

Detecting Hardware-assisted Hypervisor Rootkits within Nested Virtualized Environments, Daniel B. Morabito

PDF

Computer Aided Multi-Data Fusion Dismount Modeling, Juan L. Morales

PDF

LADAR Range Image Interpolation Exploiting Pulse Width Expansion, Jeramy W. Motes

PDF

Short Message Service (SMS) Command and Control (C2) Awareness in Android-based Smartphones using Kernel-Level Auditing, Robert J. Olipane

PDF

Timing Variations in a Magnetic Pulse Compression Circuit, Jeremy S. Oliver

PDF

Process Flow Features as a Host-based Event Knowledge Representation, Benhur E. Pacer

PDF

All Source Sensor Integration Using an Extended Kalman Filter, Timothy R. Penn

PDF

Near Earth Object Detection Using a Poisson Statistical Model for Detection on Images Modeled from the Panoramic Survey Telescope and Rapid Response System, Curtis J. R. Peterson

PDF

Cross Hallway Detection and Indoor Localization Using Flash Laser Detection and Ranging, Istvan M. Prileszky

PDF

Passive Multistatic Radar Imaging using an OFDM based Signal of Opportunity, Matthew B. P. Rapson

PDF

Exploitation of RF-DNA for Device Classification and Verification Using GRLVQI Processing, Donald R. Reising

PDF

Covariance Analysis of Vision Aided Navigation by Bootstrapping, Andrew L. Relyea

PDF

Resource Provisioning in Large-Scale Self-Organizing Distributed Systems, M. Brent Reynolds

PDF

Application of Game Theory to Improve the Defense of the Smart Grid, Keith J. Ross

PDF

Multi-Observation Continuous Density Hidden Markov Models for Anomaly Detection in Full Motion Video, Matthew P. Ross

PDF

An Application of Con-Resistant Trust to Improve the Reliability of Special Protection Systems within the Smart Grid, Crystal M. Shipman

PDF

Ground Vehicle Navigation Using Magnetic Field Variation, Jeremiah A. Shockley

PDF

Electromagnetic Characterization of Inhomogeneous Media, Marcus A. Sitterly

PDF

Security Verification of Secure MANET Routing Protocols, Matthew F. Steele

PDF

Implementation of Branch-Point-Tolerant Wavefront Reconstructor for Strong Turbulence Compensation, Michael J. Steinbock

PDF

Air-to-Air Missile Vector Scoring, Nicholas Sweeney

PDF

A High Bandwidth Non-Destructive Method for Characterizing Simple Media, Matthew L. Szuster

PDF

Simultaneous Range-Velocity Processing and SNR Analysis of AFIT's Random Noise Radar, T. Joel Thorson

PDF

Distributed Localization of Active Transmitters in a Wireless Sensor Network, Oba L. Vincent

PDF

An Inquiry: Effectiveness of the Complex Empirical Mode Decomposition Method, the Hilbert-Huang Transform, and the Fast-Fourier Transform for Analysis of Dynamic Objects, Kristen L. Wallis

PDF

Silicon Carbide Capacitive High Temperature MEMS Strain Transducer, Richard P. Weisenberger

PDF

MFIRE-2: A Multi Agent System for Flow-based Intrusion Detection Using Stochastic Search, Timothy J. Wilson

PDF

A Performance Analysis of the Optimized Link State Routing Protocol Using Voice Traffic Over Mobile Ad Hoc Networks, André Wolf

Theses/Dissertations from 2011

PDF

Characterization of Noise Technology Radar Signal Detectability Using a Non-Cooperative Receiver, Daniel V. Atienza

PDF

Vision-Aided Autonomous Precision Weapon Terminal Guidance Using a Tightly-Coupled INS and Predictive Rendering Techniques, Jonathan W. Beich

PDF

Software and Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert

PDF

Direction Finding With Mutually Orthogonal Antennas, David F. Chick

PDF

Two Dimensional Positioning and Heading Solution for Flying Vehicles Using a Line-Scanning Laser Radar (LADAR), Brady T. Christel

PDF

Investigation of Gallium Nitride Transistor Reliability through Accelerated Life Testing and Modeling, Bradley D. Christiansen

PDF

Distributed Spacing Stochastic Feature Selection and its Application to Textile Classification, Jeffrey D. Clark

PDF

Overcoming Pose Limitations of a Skin-Cued Histograms of Oriented Gradients Dismount Detector through Contextual Use of Skin Islands and Multiple Support Vector Machines, Jonathon R. Climer

PDF

Exploitation of Unintentional Information Leakage from Integrated Circuits, William E. Cobb

PDF

Creating a Network Model for the Integration of Dynamic and Static Supervisory Control and Data Acquisition (SCADA) Test Environment, Marlon Coerbell

PDF

A Framework for the Measurement of Simulated Behavior Performance, Christopher M. Cooper

PDF

High Frequency Direction Finding Using Structurally Integrated Antennas on a Large Airborne Platform, Clair F. Corbin

PDF

Carbon Nanotube Field Emission Arrays, Benjamin L. Crossley

PDF

Development of an interference lithography capability using a helium cadmium ultraviolet multimode laser for the fabrication of sub-micron-structured optical materials, Stanley D. Crozier

PDF

Simulating the Effects of an Extended Source on the Shack-Hartmann Wavefront Sensor through Turbulence, Jeffery S. Dennison

PDF

A Statistical Approach to Fusing 2-D and 3-D LADAR Systems, Paul F. Dolce

PDF

A Novel Malware Target Recognition Architecture for Enhanced Cyberspace Situation Awareness, Thomas E. Dube

PDF

Trust Management and Security in Satellite Telecommand Processing, Mark C. Duncan

PDF

Shack-Hartmann and Interferometric Hybrid Wavefront Sensor, Troy R. Ellis

PDF

Three Channel Polarimetric Based Data Deconvolution, Kurtis G. Engelson

PDF

Using Reputation Based Trust to Overcome Malfunctions and Malicious Failures in Electric Power Protection Systems, Jose E. Fadul

PDF

Dynamic Polymorphic Reconfiguration to Effectively “CLOAK” a Circuit’s Function, Jeffrey L. Falkinburg

PDF

Virtual Battlespace Behavior Generation Through Class Imitation, Bryon K. Fryer Jr.

PDF

Phase History Decomposition for Efficient Scatterer Classification in SAR Imagery, Dane F. Fuller

PDF

Evaluation of the Single Keybit Template Attack, Eric W. Garcia

PDF

Radiation Induced Fault Detection, Diagnosis, and Characterization of Field Programmable Gate Arrays, Thomas B. Getz

PDF

Long Term Quadrotor Stabilization, Nicolas S. Hamilton

PDF

A Multi Agent System for Flow-Based Intrusion Detection Using Reputation and Evolutionary Computation, David Hancock

PDF

Malicious and Malfunctioning Node Detection via Observed Physical Layer Data, Tyler J. Hardy

PDF

Adaptive Quality of Service Engine with Dynamic Queue Control, James D. Haught

PDF

Covert Channels Within IRC, Wayne C. Henry

PDF

Image Dependent Relative Formation Navigation for Autonomous Aerial Refueling, James M. Howard

PDF

Host-Based Systemic Network Obfuscation System for Windows, Kevin E. Huber

PDF

Characteristics of a High Intensity, Pulsed, Potassium Vapor Laser in a Heat Pipe, Edward J. Hurd

PDF

Holistic Network Defense: Fusing Host and Network Features for Attack Classification, Jenny W. Ji

PDF

Polarimetric Enhancements to Electro-Optical Aided Navigation Techniques, Jeremiah D. Johnson

PDF

Electromagnetic Modeling and Measurement of Adaptive Metamaterial Structural Elements, Matthew E. Jussaume

PDF

Optical Flow-Based Odometry for Underground Tunnel Exploration, Terra Kier