Theses/Dissertations from 2011
Optical Flow-Based Odometry for Underground Tunnel Exploration, Terra Kier
A Multispectral Bidirectional Reflectance Distribution Function Study of Human Skin for Improved Dismount Detection, Bradley M. Koch
Combinational Circuit Obfuscation through Power Signature Manipulation, Hyunchul Ko
Twitter Malware Collection System: An Automated URL Extraction and Examination Platform, Benjamin B. Kuhar
Routing UAVs to Co-Optimize Mission Effectiveness and Network Performance with Dynamic Programming, Spenser D. Lee
Non-GPS Navigation Using Vision-Aiding and Active Radio Range Measurements, Erich H. Lichtfuss
Simultaneous Range/Velocity Detection with an Ultra-Wideband Random Noise Radar through Fully Digital Cross-Correlation in the Time Domain, James R. Lievsay
Optical Metamaterial Design, Fabrication and Test, Jack P. Lombardi
Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic
Blind Deconvolution Method of Image Deblurring Using Convergence of Variance, Quentin D. MacManus
Estimating Anthropometric Marker Locations from 3-D LADAR Point Clouds, Matthew J. Maier
Critical Information Technology on FPGAs through Unique Device Specific Keys, Miles E. McGee
Effect of Coudé Pupil Rotation on Sodium Laser Beacon Perspective Elongation, Russell J. McGuigan
Spear Phishing Attack Detection, David T. Merritt
An Architecture for Improving Timeliness and Relevance of Cyber Incident Notifications, James L. Miller
Vision Aided Inertial Navigation System Augmented with a Coded Aperture, Jamie R. Morrison
Evaluating Information Assurance Control Effectiveness on an Air Force Supervisory Control and Data Acquisition (SCADA) System, Jason R. Nielsen
Signals of Opportunity Navigation Using Wi-Fi Signals, Wilfred E. Noel
A Simple Non-Destructive Method for Characterizing Non-Dispersive, Low-Loss Dielectrics, Thomas S. Olney
Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling, Ryan T. Ostler
Coupling Vanishing Point Tracking with Inertial Navigation to Estimate Attitude in a Structured Environment, Dayvid Prahl
Electroluminescence studies on longwavelength indium arsenide quantum dot microcavities grown on gallium arsenide, John C. Ramsey
Context Aided Tracking with Adaptive Hyperspectral Imagery, Andrew C. Rice
Linear-Quadratic Control of a MEMS Micromirror Using Kalman Filtering, Jamie P. Schnapp
Effects of Cyclic Prefix Jamming Versus Noise Jamming in OFDM Signals, Amber L. Scott
Automated Analysis of ARM Binaries using the Low-Level Virtual Machine Compiler Framework, Jeffrey B. Scott
Android Protection System: A Signed Code Security Mechanism for Smartphone Applications, Jonathan D. Stueckle
Integrated Approach to Free Space Optical Communications in Strong Turbulence, Jason A. Tellez
Bistatic 3D Electromagnetic Scattering from a Right-Angle Dihedral at Arbitrary Orientation and Position, Andreas Z. Tempelis
Detecting Man-in-the-Middle Attacks against Transport Layer Security Connections with Timing Analysis, Lauren M. Wagoner
Kernelized Locality-Sensitive Hashing for Fast Image Landmark Association, Mark A. Weems
Multiple Integrated Navigation Sensors for Improving Occupancy Grid FastSLAM, Christopher P. Weyers
Modeling Self-Referencing Interferometers with Extended Beacons and Strong Turbulence, Daniel J. Wheeler
Hyperspectral-Based Adaptive Matched Filter Detector Error as a Function of Atmospheric Profile Estimation, Allan W. Yarbrough
Theses/Dissertations from 2010
Effects of Channel Mismatches on Beamforming and Signal Detection, Christopher I. Allen
Utilizing the Digital Fingerprint Method for Secure Key Generation, Jennifer C. Anilao
Performance of Scattering Matrix Decomposition and Color Spaces for Synthetic Aperture Radar Imagery, Manuel E. Arriagada
Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System, William T. Bai
Hijacking User Uploads to Online Persistent Data Repositories for Covert Data Exfiltration, Curtis P. Barnard
Applying Image Matching to Video Analysis, Adam J. Behring
Performance Characteristics of a Kernel-Space Packet Capture Module, Samuel W. Birch
Developing a Qualia-Based Multi-Agent Architecture for Use in Malware Detection, Bobby D. Birrer
Reputation-Based Trust for a Cooperative, Agent-Based Backup Protection Scheme for Power Networks, John F. Borowski
Frequency Diverse Array Radar: Signal Characterization and Measurement Accuracy, Steven H. Brady
Static and Dynamic Component Obfuscation on Reconfigurable Devices, Camdon R. Cady
Improving the Quality of Service and Security of Military Networks with a Network Tasking Order Process, Matthew D. Compton
Pulse Shape Correlation for Laser Detection and Ranging (LADAR), Brian T. Deas
Visually Managing IPsec, Peter J. Dell'Accio
Statistical Image Recovery from Laser Speckle Patterns with Polarization Diversity, Donald B. Dixon
Cyber Situational Awareness Using Live Hypervisor-Based Virtual Machine Introspection, Dustyn A. Dodge
Developing Cyberspace Data Understanding: Using CRISP-DM for Host-based IDS Feature Mining, Joseph R. Erskine
High Power Microwave (HPM) and Ionizing Radiation Effects on CMOS Devices, Nicholas A. Estep
Analysis of a Rumor Routing Protocol with Limited Packet Lifetimes, Peter R. Francik
A Distributed Network Logging Topology, Nicholas E. Fritts
Network Security Toolkit Including Heuristic Solutions for Trust System Placement and Network Obfuscation, Gabriel H. Greve
Handshaking Protocols and Jamming Mechanisms for Blind Rendezvous in a Dynamic Spectrum Access Environment, Aaron A. Gross
Application of the Three Short Calibration Technique in a Low Frequency Focus Beam System, William E. Gunn Jr.
A Comparative Analysis of ASCII and XML Logging Systems, Eric C. Hanington
Code White: A Signed Code Protection Mechanism for Smartphones, Joseph M. Hinson IV
An Application of Automated Theorem Provers to Computer System Security: The Schematic Protection Model, Mitchell D.I. Hirschfeld
Coalition Formation under Uncertainty, Daylond J. Hooper
Flexible Computing Architecture for Real Time Skin Detection, Matthew P. Hornung
Attaining Realistic Simulations of Mobile Ad-hoc NETworks, Derek J. Huber
Determining the Index of Refraction of an Unknown Object Using Passive Polarimetric Imagery Degraded by Atmospheric Turbulence, Milo W. Hyde IV
Augmenting Latent Dirichlet Allocation and Rank Threshold Detection with Ontologies, Laura A. Isaly
Deterministic, Efficient Variation of Circuit Components to Improve Resistance to Reverse Engineering, Daniel F. Koranek
Accelerating Malware Detection via a Graphics Processing Unit, Nicholas S. Kovach
Toward A Mobile Agent Relay Network, Hyon H. Kwak
Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobil Ad Hoc Networks, Timothy H. Lacey
An Integrity Framework for Image-Based Navigation Systems, Craig D. Larson
An Approach to Large Scale Radar-Based Modeling and Simulation, Lester C. Long IV
Characterization and Measurement of Passive and Active Metamaterial Devices, Christopher A. Lundell
Scalable and Fault Tolerant Group Key Management, Nicholas A. Lupien
Artificial Inhomogeneous Tapered Impedance Sheet Characterization and Applications, Jeffrey P. Massman
Multi-Objective Constraint Satisfaction for Mobile Robot Area Defense, Kenneth W. Mayo
Global Navigation Satellite System Software Defined Radio, Jason M. McGinthy
The Effect of Synthetic Aperture Radar Image Resolution on Target Discrimination, John E. McGowan
Improving Range Estimation of a 3D FLASH LADAR via Blind Deconvolution, Jason R. McMahon
Codifying Information Assurance Controls for Department of Defense (DoD) Supervisory Control and Data Acquisition (SCADA) Systems (U), Eddie A. Mendezllovet
Evolutionary Artificial Neural Network Weight Tuning to Optimize Decision Making for an Abstract Game, Corey M. Miller
Spectral Domain RF Fingerprinting for 802.11 Wireless Devices, Sheldon A. Munns
Aiding GPS with Additional Satellite Navigation Services, Yasin A. Mutlu
Real Time Fault Detection and Diagnostics Using FPGA-Based Architecture, Nathan P. Naber
Development and Evaluation of a Multistatic Ultrawideband Random Noise Radar, Matthew E. Nelms
Component Hiding Using Identification and Boundary Blurring Techniques, James D. Parham Jr.
Phase Unwrapping in the Presence of Strong Turbulence, Casey J. Pellizzari
Design of a Monocular Multi-Spectral Skin Detection, Melanin Estimation, and False-Alarm Suppression System, Keith R. Peskosky
Investigating the Use of Frequency Selective Surfaces in High Power Microwave Applications, Steven M. Pugh
Investigation of Thermal Management and Metamaterials, Calvin T. Roman
Navigation with Limited Prior Information Using Time Difference of Arrival Measurements from Signals of Opportunity, Christopher M. Rondeau
Modeling Computer Communication Networks in a Realistic 3D Environment, Charles R. Rowell Jr.
A Linear Combination of Heuristics Approach to Spatial Sampling Hyperspectral Data for Target Tracking, Barry R. Secrest
Increasing the Sensitivity of Surface Acoustic Wave (SAW) Chemical Sensors and other Chemical Sensing Investigations, Nina R. Smith
Developing a Hybrid Virtualization Platform Design for Cyber Warfare and Simulation, Kyle E. Stewart
Performance Evaluation of a Field Programmable Gate Array-Based System for Detecting and Tracking Peer-to-Peer Protocols on a Gigabit Ethernet Network, Brennon D. Thomas
Developing an Effective and Efficient Real Time Strategy Agent for Use as a Computer Generated Force, Kurt Weissgerber
Monocular Vision Localization Using a Gimbaled Laser Range Sensor, Don J. Yates