A Fully Integrated COTS Approach for PNT to Ground Vehicles in GPS-Denied Environments
Explore new deployed approaches for detecting threats to GPS and providing position, navigation, and timing (PNT) information to the warfighter in GPS-denied environments.
Computer Hardware's Role in Securing Operating Systems and Hypervisors in Trusted Computing Applications
Many software applications run on “least privilege,” which means that software only receives minimal access to hardware, other applications, and other system resources.
Trusted Computing Hardware Features for Maintaining Cyber Security During Operation
We look at the hardware features built-in to the most popular defense and aerospace processor architectures to ensure the continued cyber security of a trusted computing system.