Follow


Theses/Dissertations from 2011

PDF

Optical Flow-Based Odometry for Underground Tunnel Exploration, Terra Kier

PDF

A Multispectral Bidirectional Reflectance Distribution Function Study of Human Skin for Improved Dismount Detection, Bradley M. Koch

PDF

Combinational Circuit Obfuscation through Power Signature Manipulation, Hyunchul Ko

PDF

Twitter Malware Collection System: An Automated URL Extraction and Examination Platform, Benjamin B. Kuhar

PDF

Routing UAVs to Co-Optimize Mission Effectiveness and Network Performance with Dynamic Programming, Spenser D. Lee

PDF

Non-GPS Navigation Using Vision-Aiding and Active Radio Range Measurements, Erich H. Lichtfuss

PDF

Simultaneous Range/Velocity Detection with an Ultra-Wideband Random Noise Radar through Fully Digital Cross-Correlation in the Time Domain, James R. Lievsay

PDF

Optical Metamaterial Design, Fabrication and Test, Jack P. Lombardi

PDF

Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic

PDF

Blind Deconvolution Method of Image Deblurring Using Convergence of Variance, Quentin D. MacManus

PDF

Estimating Anthropometric Marker Locations from 3-D LADAR Point Clouds, Matthew J. Maier

PDF

Critical Information Technology on FPGAs through Unique Device Specific Keys, Miles E. McGee

PDF

Effect of Coudé Pupil Rotation on Sodium Laser Beacon Perspective Elongation, Russell J. McGuigan

PDF

Spear Phishing Attack Detection, David T. Merritt

PDF

An Architecture for Improving Timeliness and Relevance of Cyber Incident Notifications, James L. Miller

PDF

Vision Aided Inertial Navigation System Augmented with a Coded Aperture, Jamie R. Morrison

PDF

Evaluating Information Assurance Control Effectiveness on an Air Force Supervisory Control and Data Acquisition (SCADA) System, Jason R. Nielsen

PDF

Signals of Opportunity Navigation Using Wi-Fi Signals, Wilfred E. Noel

PDF

A Simple Non-Destructive Method for Characterizing Non-Dispersive, Low-Loss Dielectrics, Thomas S. Olney

PDF

Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling, Ryan T. Ostler

PDF

Coupling Vanishing Point Tracking with Inertial Navigation to Estimate Attitude in a Structured Environment, Dayvid Prahl

PDF

Electroluminescence studies on longwavelength indium arsenide quantum dot microcavities grown on gallium arsenide, John C. Ramsey

PDF

Context Aided Tracking with Adaptive Hyperspectral Imagery, Andrew C. Rice

PDF

Linear-Quadratic Control of a MEMS Micromirror Using Kalman Filtering, Jamie P. Schnapp

PDF

Effects of Cyclic Prefix Jamming Versus Noise Jamming in OFDM Signals, Amber L. Scott

PDF

Automated Analysis of ARM Binaries using the Low-Level Virtual Machine Compiler Framework, Jeffrey B. Scott

PDF

Characterizing Cyclostationary Features of Digital Modulated Signals with Empirical Measurements Using Spectral Correlation Function, Mujun Song

PDF

Android Protection System: A Signed Code Security Mechanism for Smartphone Applications, Jonathan D. Stueckle

PDF

Integrated Approach to Free Space Optical Communications in Strong Turbulence, Jason A. Tellez

PDF

Bistatic 3D Electromagnetic Scattering from a Right-Angle Dihedral at Arbitrary Orientation and Position, Andreas Z. Tempelis

PDF

Detecting Man-in-the-Middle Attacks against Transport Layer Security Connections with Timing Analysis, Lauren M. Wagoner

PDF

Kernelized Locality-Sensitive Hashing for Fast Image Landmark Association, Mark A. Weems

PDF

Multiple Integrated Navigation Sensors for Improving Occupancy Grid FastSLAM, Christopher P. Weyers

PDF

Modeling Self-Referencing Interferometers with Extended Beacons and Strong Turbulence, Daniel J. Wheeler

PDF

Hyperspectral-Based Adaptive Matched Filter Detector Error as a Function of Atmospheric Profile Estimation, Allan W. Yarbrough

Theses/Dissertations from 2010

PDF

Effects of Channel Mismatches on Beamforming and Signal Detection, Christopher I. Allen

PDF

Utilizing the Digital Fingerprint Method for Secure Key Generation, Jennifer C. Anilao

PDF

Performance of Scattering Matrix Decomposition and Color Spaces for Synthetic Aperture Radar Imagery, Manuel E. Arriagada

PDF

Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System, William T. Bai

PDF

Hijacking User Uploads to Online Persistent Data Repositories for Covert Data Exfiltration, Curtis P. Barnard

PDF

Applying Image Matching to Video Analysis, Adam J. Behring

PDF

Performance Characteristics of a Kernel-Space Packet Capture Module, Samuel W. Birch

PDF

Developing a Qualia-Based Multi-Agent Architecture for Use in Malware Detection, Bobby D. Birrer

PDF

Reputation-Based Trust for a Cooperative, Agent-Based Backup Protection Scheme for Power Networks, John F. Borowski

PDF

Frequency Diverse Array Radar: Signal Characterization and Measurement Accuracy, Steven H. Brady

PDF

Improved Multispectral Skin Detection and its Application to Search Space Reduction for Dismount Detection Based on Histograms of Oriented Gradients, Adam L. Brooks

PDF

Static and Dynamic Component Obfuscation on Reconfigurable Devices, Camdon R. Cady

PDF

Improving the Quality of Service and Security of Military Networks with a Network Tasking Order Process, Matthew D. Compton

PDF

Pulse Shape Correlation for Laser Detection and Ranging (LADAR), Brian T. Deas

PDF

Visually Managing IPsec, Peter J. Dell'Accio

PDF

Statistical Image Recovery from Laser Speckle Patterns with Polarization Diversity, Donald B. Dixon

PDF

Cyber Situational Awareness Using Live Hypervisor-Based Virtual Machine Introspection, Dustyn A. Dodge

PDF

Developing Cyberspace Data Understanding: Using CRISP-DM for Host-based IDS Feature Mining, Joseph R. Erskine

PDF

High Power Microwave (HPM) and Ionizing Radiation Effects on CMOS Devices, Nicholas A. Estep

PDF

Analysis of a Rumor Routing Protocol with Limited Packet Lifetimes, Peter R. Francik

PDF

A Distributed Network Logging Topology, Nicholas E. Fritts

PDF

Network Security Toolkit Including Heuristic Solutions for Trust System Placement and Network Obfuscation, Gabriel H. Greve

PDF

Handshaking Protocols and Jamming Mechanisms for Blind Rendezvous in a Dynamic Spectrum Access Environment, Aaron A. Gross

PDF

Application of the Three Short Calibration Technique in a Low Frequency Focus Beam System, William E. Gunn Jr.

PDF

A Comparative Analysis of ASCII and XML Logging Systems, Eric C. Hanington

PDF

Code White: A Signed Code Protection Mechanism for Smartphones, Joseph M. Hinson IV

PDF

An Application of Automated Theorem Provers to Computer System Security: The Schematic Protection Model, Mitchell D.I. Hirschfeld

PDF

Coalition Formation under Uncertainty, Daylond J. Hooper

PDF

Flexible Computing Architecture for Real Time Skin Detection, Matthew P. Hornung

PDF

Attaining Realistic Simulations of Mobile Ad-hoc NETworks, Derek J. Huber

PDF

Determining the Index of Refraction of an Unknown Object Using Passive Polarimetric Imagery Degraded by Atmospheric Turbulence, Milo W. Hyde IV

PDF

Augmenting Latent Dirichlet Allocation and Rank Threshold Detection with Ontologies, Laura A. Isaly

PDF

Deterministic, Efficient Variation of Circuit Components to Improve Resistance to Reverse Engineering, Daniel F. Koranek

PDF

Accelerating Malware Detection via a Graphics Processing Unit, Nicholas S. Kovach

PDF

Toward A Mobile Agent Relay Network, Hyon H. Kwak

PDF

Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobil Ad Hoc Networks, Timothy H. Lacey

PDF

An Integrity Framework for Image-Based Navigation Systems, Craig D. Larson

PDF

Spectrally-Temporally Adapted Spectrally Modulated Spectrally Encoded (SMSE) Waveform Design for Coexistent CR-Based SDR Applications, Eric C. Like

PDF

An Approach to Large Scale Radar-Based Modeling and Simulation, Lester C. Long IV

PDF

Characterization and Measurement of Passive and Active Metamaterial Devices, Christopher A. Lundell

PDF

Scalable and Fault Tolerant Group Key Management, Nicholas A. Lupien

PDF

Artificial Inhomogeneous Tapered Impedance Sheet Characterization and Applications, Jeffrey P. Massman

PDF

Multi-Objective Constraint Satisfaction for Mobile Robot Area Defense, Kenneth W. Mayo

PDF

Global Navigation Satellite System Software Defined Radio, Jason M. McGinthy

PDF

The Effect of Synthetic Aperture Radar Image Resolution on Target Discrimination, John E. McGowan

PDF

Improving Range Estimation of a 3D FLASH LADAR via Blind Deconvolution, Jason R. McMahon

PDF

Codifying Information Assurance Controls for Department of Defense (DoD) Supervisory Control and Data Acquisition (SCADA) Systems (U), Eddie A. Mendezllovet

PDF

Evolutionary Artificial Neural Network Weight Tuning to Optimize Decision Making for an Abstract Game, Corey M. Miller

PDF

Spectral Domain RF Fingerprinting for 802.11 Wireless Devices, Sheldon A. Munns

PDF

Aiding GPS with Additional Satellite Navigation Services, Yasin A. Mutlu

PDF

Real Time Fault Detection and Diagnostics Using FPGA-Based Architecture, Nathan P. Naber

PDF

Development and Evaluation of a Multistatic Ultrawideband Random Noise Radar, Matthew E. Nelms

PDF

Component Hiding Using Identification and Boundary Blurring Techniques, James D. Parham Jr.

PDF

Phase Unwrapping in the Presence of Strong Turbulence, Casey J. Pellizzari

PDF

Design of a Monocular Multi-Spectral Skin Detection, Melanin Estimation, and False-Alarm Suppression System, Keith R. Peskosky

PDF

Investigating the Use of Frequency Selective Surfaces in High Power Microwave Applications, Steven M. Pugh

PDF

Investigation of Thermal Management and Metamaterials, Calvin T. Roman

PDF

Navigation with Limited Prior Information Using Time Difference of Arrival Measurements from Signals of Opportunity, Christopher M. Rondeau

PDF

Modeling Computer Communication Networks in a Realistic 3D Environment, Charles R. Rowell Jr.

PDF

A Linear Combination of Heuristics Approach to Spatial Sampling Hyperspectral Data for Target Tracking, Barry R. Secrest

PDF

Increasing the Sensitivity of Surface Acoustic Wave (SAW) Chemical Sensors and other Chemical Sensing Investigations, Nina R. Smith

PDF

Developing a Hybrid Virtualization Platform Design for Cyber Warfare and Simulation, Kyle E. Stewart

PDF

Performance Evaluation of a Field Programmable Gate Array-Based System for Detecting and Tracking Peer-to-Peer Protocols on a Gigabit Ethernet Network, Brennon D. Thomas

PDF

Developing an Effective and Efficient Real Time Strategy Agent for Use as a Computer Generated Force, Kurt Weissgerber

PDF

Monocular Vision Localization Using a Gimbaled Laser Range Sensor, Don J. Yates