Theses/Dissertations from 2012
An Inquiry: Effectiveness of the Complex Empirical Mode Decomposition Method, the Hilbert-Huang Transform, and the Fast-Fourier Transform for Analysis of Dynamic Objects, Kristen L. Wallis
Silicon Carbide Capacitive High Temperature MEMS Strain Transducer, Richard P. Weisenberger
MFIRE-2: A Multi Agent System for Flow-based Intrusion Detection Using Stochastic Search, Timothy J. Wilson
Theses/Dissertations from 2011
Characterization of Noise Technology Radar Signal Detectability Using a Non-Cooperative Receiver, Daniel V. Atienza
Vision-Aided Autonomous Precision Weapon Terminal Guidance Using a Tightly-Coupled INS and Predictive Rendering Techniques, Jonathan W. Beich
Software and Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert
Direction Finding With Mutually Orthogonal Antennas, David F. Chick
Two Dimensional Positioning and Heading Solution for Flying Vehicles Using a Line-Scanning Laser Radar (LADAR), Brady T. Christel
Investigation of Gallium Nitride Transistor Reliability through Accelerated Life Testing and Modeling, Bradley D. Christiansen
Distributed Spacing Stochastic Feature Selection and its Application to Textile Classification, Jeffrey D. Clark
Overcoming Pose Limitations of a Skin-Cued Histograms of Oriented Gradients Dismount Detector through Contextual Use of Skin Islands and Multiple Support Vector Machines, Jonathon R. Climer
Exploitation of Unintentional Information Leakage from Integrated Circuits, William E. Cobb
Creating a Network Model for the Integration of Dynamic and Static Supervisory Control and Data Acquisition (SCADA) Test Environment, Marlon Coerbell
A Framework for the Measurement of Simulated Behavior Performance, Christopher M. Cooper
High Frequency Direction Finding Using Structurally Integrated Antennas on a Large Airborne Platform, Clair F. Corbin
Carbon Nanotube Field Emission Arrays, Benjamin L. Crossley
Development of an interference lithography capability using a helium cadmium ultraviolet multimode laser for the fabrication of sub-micron-structured optical materials, Stanley D. Crozier
Simulating the Effects of an Extended Source on the Shack-Hartmann Wavefront Sensor through Turbulence, Jeffery S. Dennison
A Statistical Approach to Fusing 2-D and 3-D LADAR Systems, Paul F. Dolce
A Novel Malware Target Recognition Architecture for Enhanced Cyberspace Situation Awareness, Thomas E. Dube
Trust Management and Security in Satellite Telecommand Processing, Mark C. Duncan
Shack-Hartmann and Interferometric Hybrid Wavefront Sensor, Troy R. Ellis
Three Channel Polarimetric Based Data Deconvolution, Kurtis G. Engelson
Using Reputation Based Trust to Overcome Malfunctions and Malicious Failures in Electric Power Protection Systems, Jose E. Fadul
Dynamic Polymorphic Reconfiguration to Effectively “CLOAK” a Circuit’s Function, Jeffrey L. Falkinburg
Virtual Battlespace Behavior Generation Through Class Imitation, Bryon K. Fryer Jr.
Phase History Decomposition for Efficient Scatterer Classification in SAR Imagery, Dane F. Fuller
Evaluation of the Single Keybit Template Attack, Eric W. Garcia
Radiation Induced Fault Detection, Diagnosis, and Characterization of Field Programmable Gate Arrays, Thomas B. Getz
Long Term Quadrotor Stabilization, Nicolas S. Hamilton
A Multi Agent System for Flow-Based Intrusion Detection Using Reputation and Evolutionary Computation, David Hancock
Malicious and Malfunctioning Node Detection via Observed Physical Layer Data, Tyler J. Hardy
Adaptive Quality of Service Engine with Dynamic Queue Control, James D. Haught
Covert Channels Within IRC, Wayne C. Henry
Image Dependent Relative Formation Navigation for Autonomous Aerial Refueling, James M. Howard
Host-Based Systemic Network Obfuscation System for Windows, Kevin E. Huber
Characteristics of a High Intensity, Pulsed, Potassium Vapor Laser in a Heat Pipe, Edward J. Hurd
Holistic Network Defense: Fusing Host and Network Features for Attack Classification, Jenny W. Ji
Polarimetric Enhancements to Electro-Optical Aided Navigation Techniques, Jeremiah D. Johnson
Electromagnetic Modeling and Measurement of Adaptive Metamaterial Structural Elements, Matthew E. Jussaume
Optical Flow-Based Odometry for Underground Tunnel Exploration, Terra Kier
A Multispectral Bidirectional Reflectance Distribution Function Study of Human Skin for Improved Dismount Detection, Bradley M. Koch
Combinational Circuit Obfuscation through Power Signature Manipulation, Hyunchul Ko
Twitter Malware Collection System: An Automated URL Extraction and Examination Platform, Benjamin B. Kuhar
Routing UAVs to Co-Optimize Mission Effectiveness and Network Performance with Dynamic Programming, Spenser D. Lee
Non-GPS Navigation Using Vision-Aiding and Active Radio Range Measurements, Erich H. Lichtfuss
Simultaneous Range/Velocity Detection with an Ultra-Wideband Random Noise Radar through Fully Digital Cross-Correlation in the Time Domain, James R. Lievsay
Optical Metamaterial Design, Fabrication and Test, Jack P. Lombardi
Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic
Blind Deconvolution Method of Image Deblurring Using Convergence of Variance, Quentin D. MacManus
Estimating Anthropometric Marker Locations from 3-D LADAR Point Clouds, Matthew J. Maier
Critical Information Technology on FPGAs through Unique Device Specific Keys, Miles E. McGee
Effect of Coudé Pupil Rotation on Sodium Laser Beacon Perspective Elongation, Russell J. McGuigan
Spear Phishing Attack Detection, David T. Merritt
An Architecture for Improving Timeliness and Relevance of Cyber Incident Notifications, James L. Miller
Vision Aided Inertial Navigation System Augmented with a Coded Aperture, Jamie R. Morrison
Evaluating Information Assurance Control Effectiveness on an Air Force Supervisory Control and Data Acquisition (SCADA) System, Jason R. Nielsen
Signals of Opportunity Navigation Using Wi-Fi Signals, Wilfred E. Noel
A Simple Non-Destructive Method for Characterizing Non-Dispersive, Low-Loss Dielectrics, Thomas S. Olney
Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling, Ryan T. Ostler
Coupling Vanishing Point Tracking with Inertial Navigation to Estimate Attitude in a Structured Environment, Dayvid Prahl
Electroluminescence studies on longwavelength indium arsenide quantum dot microcavities grown on gallium arsenide, John C. Ramsey
Context Aided Tracking with Adaptive Hyperspectral Imagery, Andrew C. Rice
Linear-Quadratic Control of a MEMS Micromirror Using Kalman Filtering, Jamie P. Schnapp
Effects of Cyclic Prefix Jamming Versus Noise Jamming in OFDM Signals, Amber L. Scott
Automated Analysis of ARM Binaries using the Low-Level Virtual Machine Compiler Framework, Jeffrey B. Scott
Android Protection System: A Signed Code Security Mechanism for Smartphone Applications, Jonathan D. Stueckle
Integrated Approach to Free Space Optical Communications in Strong Turbulence, Jason A. Tellez
Bistatic 3D Electromagnetic Scattering from a Right-Angle Dihedral at Arbitrary Orientation and Position, Andreas Z. Tempelis
Detecting Man-in-the-Middle Attacks against Transport Layer Security Connections with Timing Analysis, Lauren M. Wagoner
Kernelized Locality-Sensitive Hashing for Fast Image Landmark Association, Mark A. Weems
Multiple Integrated Navigation Sensors for Improving Occupancy Grid FastSLAM, Christopher P. Weyers
Modeling Self-Referencing Interferometers with Extended Beacons and Strong Turbulence, Daniel J. Wheeler
Hyperspectral-Based Adaptive Matched Filter Detector Error as a Function of Atmospheric Profile Estimation, Allan W. Yarbrough
Theses/Dissertations from 2010
Effects of Channel Mismatches on Beamforming and Signal Detection, Christopher I. Allen
Utilizing the Digital Fingerprint Method for Secure Key Generation, Jennifer C. Anilao
Performance of Scattering Matrix Decomposition and Color Spaces for Synthetic Aperture Radar Imagery, Manuel E. Arriagada
Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System, William T. Bai
Hijacking User Uploads to Online Persistent Data Repositories for Covert Data Exfiltration, Curtis P. Barnard
Applying Image Matching to Video Analysis, Adam J. Behring
Performance Characteristics of a Kernel-Space Packet Capture Module, Samuel W. Birch
Developing a Qualia-Based Multi-Agent Architecture for Use in Malware Detection, Bobby D. Birrer
Reputation-Based Trust for a Cooperative, Agent-Based Backup Protection Scheme for Power Networks, John F. Borowski
Frequency Diverse Array Radar: Signal Characterization and Measurement Accuracy, Steven H. Brady
Static and Dynamic Component Obfuscation on Reconfigurable Devices, Camdon R. Cady
Improving the Quality of Service and Security of Military Networks with a Network Tasking Order Process, Matthew D. Compton
Pulse Shape Correlation for Laser Detection and Ranging (LADAR), Brian T. Deas
Visually Managing IPsec, Peter J. Dell'Accio
Statistical Image Recovery from Laser Speckle Patterns with Polarization Diversity, Donald B. Dixon
Cyber Situational Awareness Using Live Hypervisor-Based Virtual Machine Introspection, Dustyn A. Dodge
Developing Cyberspace Data Understanding: Using CRISP-DM for Host-based IDS Feature Mining, Joseph R. Erskine
High Power Microwave (HPM) and Ionizing Radiation Effects on CMOS Devices, Nicholas A. Estep
Analysis of a Rumor Routing Protocol with Limited Packet Lifetimes, Peter R. Francik
A Distributed Network Logging Topology, Nicholas E. Fritts
Network Security Toolkit Including Heuristic Solutions for Trust System Placement and Network Obfuscation, Gabriel H. Greve
Handshaking Protocols and Jamming Mechanisms for Blind Rendezvous in a Dynamic Spectrum Access Environment, Aaron A. Gross
Application of the Three Short Calibration Technique in a Low Frequency Focus Beam System, William E. Gunn Jr.