Department of Electrical and Computer Engineering | Student Graduate Works | Air Force Institute of Technology
 

Follow


Theses/Dissertations from 2013

PDF

Emulation of Industrial Control Field Device Protocols, Robert M. Jaromin

A Formal Approach to Vulnerability Discovery in Binary Programs, William B. Kimball

PDF

Development of a Model and Localization Algorithm for Received Signal Strength-Based Geolocation, Amanda S. King

PDF

Development of a Response Planner Using the UCT Algorithm for Cyber Defense, Michael P. Knight

PDF

RF Emitter Tracking and Intent Assessment, Benjamin J. Kuhar

PDF

Constitutive Parameter Measurement Using Double Ridge Waveguide, Nathan J. Lehman

PDF

Dynamic Network Topologies, Heather A. Lingg

PDF

Sensitivity Analysis of an Automated Calibration Routine for Airborne Cameras, Philip E. Lorenzini

PDF

A Study of Dim Object Detection for the Space Surveillance Telescope, Stephen D. Maksim

PDF

Error Characterization of Vision-Aided Navigation Systems, Daniel A . Marietta

PDF

An Architecture for Coexistence with Multiple Users in Frequency Hopping Cognitive Radio Networks, Ryan K. McLean

PDF

Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment, David P. Montminy

PDF

Evaluating the Effectiveness of IP Hopping via an Address Routing Gateway, Ryan A . Morehart

PDF

The Miniaturization of the AFIT Random Noise Radar, Aaron T. Myers

PDF

Improving Multiple Surface Range Estimation of a 3-Dimensional FLASH LADAR in the Presence of Atmospheric Turbulence, Brian J. Neff

PDF

Image Annotation and Topic Extraction Using Super-Word Latent Dirichlet, George E. Noel III

PDF

Spectral Detection of Acute Mental Stress with VIS-SWIR Hyperspectral Imagery, Elizabeth K. Norvell

PDF

Evaluation of Cyber Sensors for Enhancing Situational Awareness in the ICS Environment, Jeremy R. Otis

PDF

Metamaterial Structure Design Optimization: A Study of the Cylindrical Cloak, Jason V. Paul

PDF

Atmospheric Impact on Long Pulse Laser Detection and Ranging (LADAR) Systems, Isaac B. Putnam

PDF

Inertial Navigation System Aiding Using Vision, James O. Quarmyne

PDF

Modeling Cyber Situational Awareness through Data Fusion, Evan L. Raulerson

PDF

Detection Optimization of the Progressive Multi-Channel Correlation Algorithm Used in Infrasound Nuclear Treaty Monitoring, Anthony M. Runco

PDF

A Multi Agent System for Flow-Based Intrusion Detection, David A . Ryan

PDF

Material Characterization Using Passive Multispectral Polarimetric Imagery, Melissa A . Sawyer

PDF

Characterization and Dynamic Analysis of Long-Cavity Multi-Section Gain-Levered Quantum-Dot Lasers, John R. Schmidt

PDF

File Carving and Malware Identification Algorithms Applied to Firmware Reverse Engineering, Karl A . Sickendick

PDF

Kernel Extended Real-Valued Negative Selection Algorithm (KERNSA), Brett A . Smith

PDF

Metrics for Emitter Selection for Multistatic Synthetic Aperture Radar, Sean R. Stevens

PDF

Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone

PDF

Development of a Resource Manager Framework for Adaptive Beamformer Selection, Jeremy P. Stringer

PDF

Novel Test Fixture for Characterizing Microcontacts: Performance and Reliability, Benjamin F. Toler

PDF

Airborne Network Data Availability Using Peer to Peer Database Replication on a Distributed Hash Table, Trevor J. Vranicar

PDF

Network Intrusion Dataset Assessment, David J. Weller-Fahy

PDF

The Design and Analysis of Electrically Large Custom-Shaped Reflector Antennas, Joshua M. Wilson

PDF

Adaptations and Analysis of the AFIT Noise Radar Network for Indoor Navigation, Russell D. Wilson IV

PDF

The Dynamic Multi-objective Multi-vehicle Covering Tour Problem, Joshua S. Ziegler

PDF

Enhancing Ground Based Telescope Performance with Image Processing, John C. Zingarelli

Theses/Dissertations from 2012

PDF

Empirical Analysis of Optical Attenuator Performance in Quantum Key Distribution Systems Using a Particle Model, Thomas C. Adams

PDF

Optimum Concentration Ratio Analysis Using Dynamic Thermal Model for Concentrated Photovoltaic System, John T. Avrett

PDF

A Black Hole Attack Model for Reactive Ad-Hoc Protocols, Christopher W. Badenhop

PDF

RSA Power Analysis Obfuscation: A Dynamic FPGA Architecture, John W. Barron

PDF

Spectral Detection of Human Skin in VIS-SWIR Hyperspectral Imagery without Radiometric Calibration, Andrew P. Beisley

PDF

Emulating Industrial Control System Field Devices Using Gumstix Technology, Dustin Berman

PDF

Context Aware Routing Management Architecture for Airborne Networks, Joan A. Betances

PDF

Detector Design Considerations in High-Dimensional Artificial Immune Systems, Jason M. Bindewald

PDF

Covert Android Rootkit Detection: Evaluating Linux Kernel Level Rootkits on the Android Operating System, Robert C. Brodbeck

PDF

An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration, Brandon A. Brown

PDF

Trade-offs in a 1 Tbps MIMO Communication System Between an Airship and an Array of Ground Receive Antennas, Adam R. Brueggen

PDF

Understanding How Reverse Engineers Make Sense of Programs from Assembly Language Representations, Adam R. Bryant

PDF

A Nonparametric Approach to Segmentation of Ladar Images, Eric A. Buschelman

PDF

Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits, Henry W. Bushey

PDF

Low Cost, Low Complexity Sensor Design for Non-Cooperative Geolocation via Received Signal Strength, Michael S. Butler

PDF

Field Emission of Thermally Grown Carbon Nanostructures on Silicon Carbide, Jonathon M. Campbell

PDF

Integration of Cold Atom Interferometry INS with Other Sensors, Aaron J. Canciani

PDF

Adaptive Routing Algorithm for Priority Flows in a Network, Timothy J. Carbino

PDF

Low Frequency Material Characterization of Thin Substrates in a Coaxial Transmission Line, Lee B. Cole

PDF

Workload-based Automated Interface Mode Selection, Andrew J. Compton

PDF

Spatial Identification of Passive Radio Frequency Identification Tags Using Software Defined Radios, Paul A. Cornn

PDF

Insider Threat Detection on the Windows Operating System using Virtual Machine Introspection, Martin H. Crawford

PDF

Automated Aerial Refueling Position Estimation Using a Scanning LiDAR, Joseph A. Curro II

PDF

A Real-time Strategy Agent Framework and Strategy Classifier for Computer Generated Forces, Lyall J. Di Trapani

PDF

Decentralized Riemannian Particle Filtering with Applications to Multi-Agent Localization, Martin J. Eilders

PDF

Universal Plug-n-Play Sensor Integration for Advanced Navigation, Daniel L. Elsner

PDF

Intelligent Behavioral Action Aiding for Improved Autonomous Image Navigation, Kwee Guan Eng

PDF

Development of a Radar-Frequency Metamaterial Measurement and Characterization Apparatus, Stephen I. Faris

PDF

Dismount Threat Recognition through Automatic Pose Identification, Andrew M. Freeman

PDF

Obfuscating Against Side-Channel Power Analysis Using Hiding Techniques for AES, Austin W. Fritzke

PDF

OFDM-Based Signal Exploitation Using Quadrature Mirror Filter Bank (QMFB) Processing, Felipe E. Garrido

PDF

Intra-procedural Path-insensitive Grams (i-grams) and Disassembly Based Features for Packer Tool Classification and Detection, Scott E. Gerics

PDF

Scalable Wavelet-Based Active Network Stepping Stone Detection, Joseph I. Gilbert

PDF

Magnesium Object Manager Sandbox, A More Effective Sandbox Method for Windows 7, Martin A. Gilligan

PDF

Air-to-Air Missile Enhanced Scoring with Kalman Smoothing, Jonathon S. Gipson

PDF

The White-hat Bot: A Novel Botnet Defense Strategy, Tyrone C. Gubler

PDF

Passive Synthetic Aperture Radar Imaging Using Commercial OFDM Communication Networks, Jose R. Gutierrez del Arroyo

PDF

Vulnerability Analysis of the Player Command and Control Protocol, John T. Hagen

PDF

Modeling the Effects of the Local Environment on a Received GNSS Signal, Marshall E. Haker

PDF

Target Classification of Canonical Scatterers Using Classical Estimation and Dictionary Based Techniques, G. Barry Hammond II

PDF

Magnetic Field Generation and B-Dot Sensor Characterization in the High Frequency Band, Ryan L. Hardin

PDF

Forensic Memory Analysis for Apple OS X, Andrew F. Hay

PDF

Utilizing Graphics Processing Units for Network Anomaly Detection, Jonathan D. Hersack

PDF

The Effects of Cognitive Jamming on Wireless Sensor Networks used for Geolocation, Michael A. Huffman

PDF

Design, Modeling, and Measurement of a Metamaterial Electromagnetic Field Concentrator, Noel A. Humber

PDF

An Analysis of Error Reconciliation Protocols for use in Quantum Key Distribution, James S. Johnson

PDF

Enhanced Image-Aided Navigation Algorithm with Automatic Calibration and Affine Distortion Prediction, Juan D. Jurado

PDF

Enhancing Trust in the Smart Grid by Applying a Modified Exponentially Weighted Averages Algorithm, Andrew T. Kasperek

PDF

Radar Based Navigation in Unknown Terrain, Kyle J. Kauffman

PDF

Augmenting the Global Positioning System with Foreign Navigation Systems and Alternative Sensors, Christopher B. Killion

PDF

Binary Classification of an Unknown Object through Atmospheric Turbulence Using a Polarimetric Blind-Deconvolution Algorithm Augmented with Adaptive Degree of Linear Polarization Priors, Mu J. Kim

PDF

Effects of Architecture on Information Leakage of a Hardware Advanced Encryption Standard Implementation, Eric A. Koziel

PDF

Design, Fabrication and Testing of Tunable RF Meta-atoms, Derrick Langley

PDF

Evaluation of Traditional Security Solutions in the SCADA Environment, Robert D. Larkin

PDF

Improvements to Optical Communication Capabilities Achieved through the Optical Injection of Semiconductor Lasers, Timothy P. Locke

PDF

UHF Antenna Design for AFIT Random Noise Radar, Matthew T. Ludwig

PDF

Exploiting the Automatic Dependent Surveillance-Broadcast System via False Target Injection, Domenic Magazu III

PDF

Resolution Study of a Hyperspectral Sensor Using Computed Tomography in the Process of Noise, Samuel V. Mantravadi

PDF

Evaluation of Malware Target Recognition Deployed in a Cloud-Based Fileserver Environment, G. Parks Masters

PDF

External Verification of SCADA System Embedded Controller Firmware, Lucille R. McMinn

PDF

Creating Network Attack Priority Lists by Analyzing Email Traffic Using Predefined Profiles, Eric J. Merrit

PDF

Cyberspace and Real-World Behavioral Relationships: Towards the Application of Internet Search Queries to Identify Individuals At-risk for Suicide, Casey C. Miller