Follow


Theses/Dissertations from 2012

PDF

An Inquiry: Effectiveness of the Complex Empirical Mode Decomposition Method, the Hilbert-Huang Transform, and the Fast-Fourier Transform for Analysis of Dynamic Objects, Kristen L. Wallis

PDF

Silicon Carbide Capacitive High Temperature MEMS Strain Transducer, Richard P. Weisenberger

PDF

MFIRE-2: A Multi Agent System for Flow-based Intrusion Detection Using Stochastic Search, Timothy J. Wilson

PDF

A Performance Analysis of the Optimized Link State Routing Protocol Using Voice Traffic Over Mobile Ad Hoc Networks, André Wolf

Theses/Dissertations from 2011

PDF

Characterization of Noise Technology Radar Signal Detectability Using a Non-Cooperative Receiver, Daniel V. Atienza

PDF

Vision-Aided Autonomous Precision Weapon Terminal Guidance Using a Tightly-Coupled INS and Predictive Rendering Techniques, Jonathan W. Beich

PDF

Software and Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert

PDF

Direction Finding With Mutually Orthogonal Antennas, David F. Chick

PDF

Two Dimensional Positioning and Heading Solution for Flying Vehicles Using a Line-Scanning Laser Radar (LADAR), Brady T. Christel

PDF

Investigation of Gallium Nitride Transistor Reliability through Accelerated Life Testing and Modeling, Bradley D. Christiansen

PDF

Distributed Spacing Stochastic Feature Selection and its Application to Textile Classification, Jeffrey D. Clark

PDF

Overcoming Pose Limitations of a Skin-Cued Histograms of Oriented Gradients Dismount Detector through Contextual Use of Skin Islands and Multiple Support Vector Machines, Jonathon R. Climer

PDF

Exploitation of Unintentional Information Leakage from Integrated Circuits, William E. Cobb

PDF

Creating a Network Model for the Integration of Dynamic and Static Supervisory Control and Data Acquisition (SCADA) Test Environment, Marlon Coerbell

PDF

A Framework for the Measurement of Simulated Behavior Performance, Christopher M. Cooper

PDF

High Frequency Direction Finding Using Structurally Integrated Antennas on a Large Airborne Platform, Clair F. Corbin

PDF

Carbon Nanotube Field Emission Arrays, Benjamin L. Crossley

PDF

Development of an interference lithography capability using a helium cadmium ultraviolet multimode laser for the fabrication of sub-micron-structured optical materials, Stanley D. Crozier

PDF

Simulating the Effects of an Extended Source on the Shack-Hartmann Wavefront Sensor through Turbulence, Jeffery S. Dennison

PDF

A Statistical Approach to Fusing 2-D and 3-D LADAR Systems, Paul F. Dolce

PDF

A Novel Malware Target Recognition Architecture for Enhanced Cyberspace Situation Awareness, Thomas E. Dube

PDF

Trust Management and Security in Satellite Telecommand Processing, Mark C. Duncan

PDF

Shack-Hartmann and Interferometric Hybrid Wavefront Sensor, Troy R. Ellis

PDF

Three Channel Polarimetric Based Data Deconvolution, Kurtis G. Engelson

PDF

Using Reputation Based Trust to Overcome Malfunctions and Malicious Failures in Electric Power Protection Systems, Jose E. Fadul

PDF

Dynamic Polymorphic Reconfiguration to Effectively “CLOAK” a Circuit’s Function, Jeffrey L. Falkinburg

PDF

Virtual Battlespace Behavior Generation Through Class Imitation, Bryon K. Fryer Jr.

PDF

Phase History Decomposition for Efficient Scatterer Classification in SAR Imagery, Dane F. Fuller

PDF

Evaluation of the Single Keybit Template Attack, Eric W. Garcia

PDF

Radiation Induced Fault Detection, Diagnosis, and Characterization of Field Programmable Gate Arrays, Thomas B. Getz

PDF

Long Term Quadrotor Stabilization, Nicolas S. Hamilton

PDF

A Multi Agent System for Flow-Based Intrusion Detection Using Reputation and Evolutionary Computation, David Hancock

PDF

Malicious and Malfunctioning Node Detection via Observed Physical Layer Data, Tyler J. Hardy

PDF

Adaptive Quality of Service Engine with Dynamic Queue Control, James D. Haught

PDF

Covert Channels Within IRC, Wayne C. Henry

PDF

Image Dependent Relative Formation Navigation for Autonomous Aerial Refueling, James M. Howard

PDF

Host-Based Systemic Network Obfuscation System for Windows, Kevin E. Huber

PDF

Characteristics of a High Intensity, Pulsed, Potassium Vapor Laser in a Heat Pipe, Edward J. Hurd

PDF

Holistic Network Defense: Fusing Host and Network Features for Attack Classification, Jenny W. Ji

PDF

Polarimetric Enhancements to Electro-Optical Aided Navigation Techniques, Jeremiah D. Johnson

PDF

Electromagnetic Modeling and Measurement of Adaptive Metamaterial Structural Elements, Matthew E. Jussaume

PDF

Optical Flow-Based Odometry for Underground Tunnel Exploration, Terra Kier

PDF

A Multispectral Bidirectional Reflectance Distribution Function Study of Human Skin for Improved Dismount Detection, Bradley M. Koch

PDF

Combinational Circuit Obfuscation through Power Signature Manipulation, Hyunchul Ko

PDF

Twitter Malware Collection System: An Automated URL Extraction and Examination Platform, Benjamin B. Kuhar

PDF

Routing UAVs to Co-Optimize Mission Effectiveness and Network Performance with Dynamic Programming, Spenser D. Lee

PDF

Non-GPS Navigation Using Vision-Aiding and Active Radio Range Measurements, Erich H. Lichtfuss

PDF

Simultaneous Range/Velocity Detection with an Ultra-Wideband Random Noise Radar through Fully Digital Cross-Correlation in the Time Domain, James R. Lievsay

PDF

Optical Metamaterial Design, Fabrication and Test, Jack P. Lombardi

PDF

Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic

PDF

Blind Deconvolution Method of Image Deblurring Using Convergence of Variance, Quentin D. MacManus

PDF

Estimating Anthropometric Marker Locations from 3-D LADAR Point Clouds, Matthew J. Maier

PDF

Critical Information Technology on FPGAs through Unique Device Specific Keys, Miles E. McGee

PDF

Effect of Coudé Pupil Rotation on Sodium Laser Beacon Perspective Elongation, Russell J. McGuigan

PDF

Spear Phishing Attack Detection, David T. Merritt

PDF

An Architecture for Improving Timeliness and Relevance of Cyber Incident Notifications, James L. Miller

PDF

Vision Aided Inertial Navigation System Augmented with a Coded Aperture, Jamie R. Morrison

PDF

Evaluating Information Assurance Control Effectiveness on an Air Force Supervisory Control and Data Acquisition (SCADA) System, Jason R. Nielsen

PDF

Signals of Opportunity Navigation Using Wi-Fi Signals, Wilfred E. Noel

PDF

A Simple Non-Destructive Method for Characterizing Non-Dispersive, Low-Loss Dielectrics, Thomas S. Olney

PDF

Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling, Ryan T. Ostler

PDF

Coupling Vanishing Point Tracking with Inertial Navigation to Estimate Attitude in a Structured Environment, Dayvid Prahl

PDF

Electroluminescence studies on longwavelength indium arsenide quantum dot microcavities grown on gallium arsenide, John C. Ramsey

PDF

Context Aided Tracking with Adaptive Hyperspectral Imagery, Andrew C. Rice

PDF

Linear-Quadratic Control of a MEMS Micromirror Using Kalman Filtering, Jamie P. Schnapp

PDF

Effects of Cyclic Prefix Jamming Versus Noise Jamming in OFDM Signals, Amber L. Scott

PDF

Automated Analysis of ARM Binaries using the Low-Level Virtual Machine Compiler Framework, Jeffrey B. Scott

PDF

Characterizing Cyclostationary Features of Digital Modulated Signals with Empirical Measurements Using Spectral Correlation Function, Mujun Song

PDF

Android Protection System: A Signed Code Security Mechanism for Smartphone Applications, Jonathan D. Stueckle

PDF

Integrated Approach to Free Space Optical Communications in Strong Turbulence, Jason A. Tellez

PDF

Bistatic 3D Electromagnetic Scattering from a Right-Angle Dihedral at Arbitrary Orientation and Position, Andreas Z. Tempelis

PDF

Detecting Man-in-the-Middle Attacks against Transport Layer Security Connections with Timing Analysis, Lauren M. Wagoner

PDF

Kernelized Locality-Sensitive Hashing for Fast Image Landmark Association, Mark A. Weems

PDF

Multiple Integrated Navigation Sensors for Improving Occupancy Grid FastSLAM, Christopher P. Weyers

PDF

Modeling Self-Referencing Interferometers with Extended Beacons and Strong Turbulence, Daniel J. Wheeler

PDF

Hyperspectral-Based Adaptive Matched Filter Detector Error as a Function of Atmospheric Profile Estimation, Allan W. Yarbrough

Theses/Dissertations from 2010

PDF

Effects of Channel Mismatches on Beamforming and Signal Detection, Christopher I. Allen

PDF

Utilizing the Digital Fingerprint Method for Secure Key Generation, Jennifer C. Anilao

PDF

Performance of Scattering Matrix Decomposition and Color Spaces for Synthetic Aperture Radar Imagery, Manuel E. Arriagada

PDF

Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System, William T. Bai

PDF

Hijacking User Uploads to Online Persistent Data Repositories for Covert Data Exfiltration, Curtis P. Barnard

PDF

Applying Image Matching to Video Analysis, Adam J. Behring

PDF

Performance Characteristics of a Kernel-Space Packet Capture Module, Samuel W. Birch

PDF

Developing a Qualia-Based Multi-Agent Architecture for Use in Malware Detection, Bobby D. Birrer

PDF

Reputation-Based Trust for a Cooperative, Agent-Based Backup Protection Scheme for Power Networks, John F. Borowski

PDF

Frequency Diverse Array Radar: Signal Characterization and Measurement Accuracy, Steven H. Brady

PDF

Improved Multispectral Skin Detection and its Application to Search Space Reduction for Dismount Detection Based on Histograms of Oriented Gradients, Adam L. Brooks

PDF

Static and Dynamic Component Obfuscation on Reconfigurable Devices, Camdon R. Cady

PDF

Improving the Quality of Service and Security of Military Networks with a Network Tasking Order Process, Matthew D. Compton

PDF

Pulse Shape Correlation for Laser Detection and Ranging (LADAR), Brian T. Deas

PDF

Visually Managing IPsec, Peter J. Dell'Accio

PDF

Statistical Image Recovery from Laser Speckle Patterns with Polarization Diversity, Donald B. Dixon

PDF

Cyber Situational Awareness Using Live Hypervisor-Based Virtual Machine Introspection, Dustyn A. Dodge

PDF

Developing Cyberspace Data Understanding: Using CRISP-DM for Host-based IDS Feature Mining, Joseph R. Erskine

PDF

High Power Microwave (HPM) and Ionizing Radiation Effects on CMOS Devices, Nicholas A. Estep

PDF

Analysis of a Rumor Routing Protocol with Limited Packet Lifetimes, Peter R. Francik

PDF

A Distributed Network Logging Topology, Nicholas E. Fritts

PDF

Network Security Toolkit Including Heuristic Solutions for Trust System Placement and Network Obfuscation, Gabriel H. Greve

PDF

Handshaking Protocols and Jamming Mechanisms for Blind Rendezvous in a Dynamic Spectrum Access Environment, Aaron A. Gross

PDF

Application of the Three Short Calibration Technique in a Low Frequency Focus Beam System, William E. Gunn Jr.