Application Briefs: Communications
Briefs: Regulations/Standards
Articles: Data Acquisition
Application Briefs: Data Acquisition
Articles: Data Acquisition
Articles: Electronics & Computers
Briefs: Connectivity
The Impact of Cyber Cameras on the Intelligence Community
Briefs: Defense
Articles: Aerospace
U.S. rival countries have been rapidly modernizing their militaries, with publicized advances that pose credible challenges to U.S. supremacy in all aspects of warfare: air, land, sea, space and...
Briefs: Data Acquisition
Maintaining Enterprise Resiliency Via Kaleidoscopic Adaption and Transformation of Software Services (MEERKATS)
This research investigates a new vision for increasing the resilience of computing clouds by elevating continuous change, evolution, and misinformation as first-rate design principles of the cloud's infrastructure. The work is...
Articles: Aerospace
In today’s interconnected world, the information that we generate, store, transmit, and receive has become a valuable commodity. We have increasingly turned to cryptography as a tool...
Articles: Aerospace
Not too many years ago, network security was a relatively low level priority in most organizations. That has changed today due to such high level failures as the recent breaches at Sony and Target. Closer to home,...
Briefs: Aerospace
Enterprise business processes are more connected than ever before, driven by the ability to share the right information with the right partners at the right time. While this...
Briefs: Electronics & Computers
A need exists for small, autonomic systems in the battlefield. Autonomy allows the creation of unmanned systems to perform complex, high-risk, and/or covert operations in the battlefield without the need...
Briefs: Information Technology
Infrastructure for Development of Secure, Reliable Software
The Verification and Automated Reasoning research group at Cornell University has been building an infrastructure, comprising human expertise and computational resources, for the development of secure, reliable software for critical military applications. Such software includes...
Briefs: Information Technology
A formal model has been devised to impart some mathematical rigor to the concept of the attack surface of a software system. Complementing the model is a definition of a quantitative...
Briefs: Information Technology
Explicitly Timed Authorization Logic
A document describes explicitly timed authorization logic (nicknamed "η-logic"). In prior authorization logics, it is, variously, impossible or difficult to handle time explicitly; express security policies that involve complex, time-dependent relationships; or reason accurately about time. By enabling...
Briefs: Information Technology
An improved method has been devised for defending a server or other computer against a code-injection attack, in which an attacker exploits a hardware or software vulnerability to inject...
Briefs: Photonics/Optics
Perfect information- theoretical security requires that the meaning of an encrypted message transmitted from point A to point B be statistically independent of the ciphertext in which that message...
Top Stories
INSIDER: Design

Autonomous Freight Aircraft Achieves Design/Development Milestones
INSIDER: Materials

Air Force Awards $100 Million to Continue B-1 Digital Engineering Program
INSIDER: Aerospace

Airbus’ High-Voltage Battery Technology Prepares for Flight Test
INSIDER: Aerospace

Abort Motor for NASA’s Orion Spacecraft Successfully Tested
Articles: Test & Measurement

Advancing Metrology at Mach Speed
INSIDER: Unmanned Systems

Webcasts
On-Demand Webinars: Automotive
Get Even More Out of Your EVs with Thermoplastics
Podcasts: Manufacturing & Prototyping
Here's an Idea: 3D-Printed Lubrication System for Single-Use Engines