OUR CORE R&D / These systems range from individual

autonomous robotic platforms to large-scale, multi-agent systems

for information management, command & control

OUR CORE R&D

These systems range from individual  autonomous robotic platforms to large-scale, multi-agent systems  for information management, command & control

Cybersecurity

Filter by category
Filter by category

Cybersecurity

Related Projects:

Depiction of cyber attacker

CIRCE

A tool that uses cyber-psychological tactics to
exploit human vulnerabilities in cyber attackers

Two soldiers at a laptop discussing cyber shield exercise

CRAFT

An automated cybertraining tool that customizes behavior to meet training objectives

Photo of the ocean with a barge in the foreground and several other ships in the background. Large image in the front of a recreational boat that is sending out signals to the other vessels that they are in the area.

ShipShape

Boat safety challenges and real-time performance using onboard sensor data

AI Brain Neural Network Super Computer. Artificial Intelligent, Deep Learning, Machine Learning, and NLP Natural Language Processing cognitive computer technology concept. 3D Render

CyGRAMMAR

Cyber meta-monitor technology to mitigate in-flight attacks

Abstract illustrative showing how disinformation can be observed with CADE.

CADE

A forensic analysis tool for cybertechnical and cybersocial attacks

Photo of a man using a computer looking to his left at an AI rendering of a person at a computer.

SLICK

Automatically verify code, catch errors, and seamlessly make recommendations

CANVAS

Understand adversary behavior and develop proactive cyber security strategies

Fleet Cyber Command Sailors Stand Watch in the Fleet Operations Center

CARES

A cybersecurity approach using systemic functioning grammars

CANDID

CANDID

A system that detects and prevents cybersecurity breaches in military ground vehicles

CYMOD

Cyber adversary modeling and simulation

GRAVITY

A cyber defense tool that analyzes vulnerabilities

SPNN

A secure neural network that protects sensitive information

PRINCESS

Probabilistic representation of intent commitments to ensure software survival

PSYCHIC

An automated method to forecast and detect cyberattacks

DAAMS

Detecting anomalies and defending against cyberattacks

US Fleet Cyber Command

MOC-WAR

War gaming exercises without need for extensive adversary behavior modeling experience

padlocks, green, abstract

GearCASE

A systemic functional grammar application for design models

HAMLET

Avoiding malice with linguistics-inspired exploit testing

EAC

A cyber-resilient framework to protect cyber physical systems from threats

abstract image of lock with computer chips in background

PMD

Predictive malware defense research

MAAGI

Software to detect and analyze malware attacks