Research concentrates on understanding and exploiting information’s interactions with socio-technical networks, particularly communications, and command and control networks, both formal and social. The objective is to develop novel techniques to connect, protect and process information at the tactical edge to enable Soldiers to operate in a contested and congested operational environment. Of particular importance is Network Science – the study of structure, dynamics, behaviors and evolutions of networks, especially in the context of interactions between communications, information and social networks. Research to protect these networks concentrates on understanding and exploiting interactions of information with cyber attackers – human and/or intelligent agents. These interactions involve friendly operations against adversary information systems and networks, defense of friendly information systems and networks, and assurance of persistent information support to Soldiers even when parts of the friendly systems and networks are compromised. Key to operating at the tactical edge are techniques to compute and fuse information that may be distributed across the edge network to provide Soldiers with relevant information needed to dominate and win.
C4I in Complex Environments
Quality of Information (QoI) for Semantically-Adaptive Networks (ALC)
Develop a foundational science to model, characterize, and control information delivered through multi-genre networks based on the semantics and context of information requests. With growing volume of information available in tactical and strategic networks, network operators and commanders will require enhanced capabilities to filter and process information. This includes development of 1) semantically aware communication and compression techniques from an information theoretic perspective, 2) protocols to provide efficient, quality-aware semantic information delivery to analysts and decision makers, 3) network design approaches to maximize QoI metrics dynamically, either centralized or decentralized, and 4) QoI and semantic-aware resource allocation and management algorithms that achieve the trade-offs between resource usage and quality delivered.
Kevin Chan, firstname.lastname@example.org, (301) 394-5640
Network Science Research Laboratory (ALC)
Facility that provides a controlled, repeatable emulation environment for the research, development, and evaluation of network science and information assurance algorithms for tactical wireless mobile ad hoc networks.
Geometric & Topological Structures in Composite Networks (ALC)
Adapt advanced mathematical theory from geometry and topology to network science via an empirical study of real network data. Since many networks of interest do not reside in an existing (known) geometric space and instead form their own intrinsic geometric and topological space, many geometric and topological concepts have relevance to structural characterizations of networks (e.g., power-law relationships and robustness) and processes on networks (e.g., link prediction, community detection, and epidemic spreading).
Ultraviolet Communications and Networking (ALC)
Study of unconventional free-space optical communication systems (particularly LED-based non-line-of-sight ultraviolet communications), including communication channel model development, the analysis of system design tradeoffs, novel multiplexing and networking methods and protocols, experimental validation, and prototype system development.
Robert Drost, email@example.com, (301) 394-0158
Cognitive Hybrid Networking (ALC)
Develop new communications networking capabilities for harsh tactical environments that integrate cognitive radio, autonomous agents, and highly novel methods for human-network-machine interaction.
Fikadu Dagefu, firstname.lastname@example.org, (301) 394-0405
Distributed Information Delivery
Information Dissemination (ALC)
Solutions to the challenges of achieving a unified network and information environment, including a set of mission command applications that support commanders and leaders across echelons, and enable all warfighting functions is aligned to the operational requirement for a Network and Mission Adaptive Common Operating Environment. Approaches, algorithms, and prototypes to identify, prioritize, characterize, and exploit sensor and other information assets for intelligent information dissemination and mediation, with resiliency to dynamic network conditions.
Jade Freeman, (301) 394-4962
Multi Domain Channels and Protocols
Networking in Resource Constrained Environments (ALC)
Investigate adaptive algorithms and radio hardware that provide robust and efficient communications under varied conditions using cognitive and dynamic spectrum access techniques for both sensor and soldier radios.
Ron Tobin, email@example.com, (301) 394-2184
Quantum Communication and Networking (ALC)
Quantum information science and optical physics, photonics, and communication technology focused on the functionality and behavior of quantum networks and sensors; the creation, manipulation, and transmission of multi-partite entangled states; entanglement decoherence; high capacity quantum communication channels; and quantum devices and technologies for switching, routing, delaying, and buffering entangled states in quantum networks, as well as for storage, retrieval, and processing of quantum information.
Dr. Michael Brodsky, firstname.lastname@example.org, 301-394-4664
Networked Trust and Its Impact on Security (ALC)
Develop models of networked trust and its impact on cybersecurity, and experimental validation with a mixture of agent models and HiTL testing.
Network Science Research Lab (ALC)
Live test bed for monitoring, collecting, and testing computer networks.
Adaptive Threat Analysis and Resilience
Agile Cyber Maneuver & Resilience (ALC)
Develop computational algorithms and techniques for detecting, monitoring, disrupting, analyzing, and predicting adversarial activities within cyber space, on Army tactical systems, and the IoBT. Develop on-device real-time protection against emerging threats that can be tailored to both mission requirements and device capabilities
Charles Kamhoua, Charles.A.Kamhoua.email@example.com, (301) 394-5963
Risk Modeling (ALC)
Develop mathematical models and approaches to measure user, defender and/or attacker behavior, cognitive processes and limitations. Develop a holistic, dynamic, predictive risk model that identifies most relevant risk parameters, includes humans, to mission objectives and provide courses of action to achieve an optimal/sub-optimal mission end state.
Hasan Cam, firstname.lastname@example.org, (301) 394-2871