Cyber Network Attack & Intrusion Detection & Recovery Environment (CYANIDE) CYANIDE is a customizable environment for developing, testing and deploying out-of-brand sensing,

CYANIDE is a customizable environment for developing, testing and deploying out-of-brand sensing, monitoring, and recovery technologies for the cyber defense of information and sensor networks.

KBSI’s Cyber Network Attack and Intrusion Detection and Recovery Environment (CYANIDE) initiative developed a customizable environment that supports the modeling, development, test, and deployment of sensing, monitoring and recovery technology for centralized and distributed cyber attacks on a wide range of sensor and information networks.  The CYANIDE vision was to provide a comprehensive experimentation framework that supports a wide range of attack, detection, and recovery modules. The framework is extensible and supports new research ideas for cyber exploitation, cyber infrastructure protection, anomaly detection, distributed intrusion detection and cyber recovery.

Continue reading

New Phase I: TraceLogic

The TraceLogic initiative is developing methods, processes and algorithms to decipher the hidden rules or logic of complex flight operations aboard Navy aircraft carriers. The TraceLogic technology will help the Navy to better understand and address the technical and pragmatic problems associated with improving flight operation performance.

More

BAA: T-SAT

The Text Analytics Situation Awareness Toolkit (T-SAT) will allow users to quickly build text analytics-based systems that support the research and analysis of disparate, unstructured text sources. T-SAT uses an advanced object model that allows users to combine text analytics algorithms and create complex research and analysis scenarios.

 

More…

New Phase II: AD­VICE

The ADVICE initiative is developing an experimental framework that improves the situational awareness of cyber systems under attack.  The initiative will provide innovative human-computer interaction and visualization technology for developing cyber security controls, improving cyber situational awareness, and evaluating cyber security control architectures.

Phase I Award: CDAT

The CDAT initiative is designing and developing a toolkit that will help clinicians, healthcare administrators and public health professionals to compare the effectiveness of different clinical practices, including preventive and treatment modalities.

The Cohort Development and Analysis Toolkit (CDAT) will allow healthcare professionals to better leverage the large amounts of healthcare data available in electronic health records, facilitating cohort development and analysis along the entire healthcare spectrum: healthcare providers, patients, systems and processes, and case management/discharge planning. By providing intuitive interfaces and workflows that are designed to support a medical practitioner rather than an IT or data expert, CDAT will make data mining and analytics more accessible to the medical community without the need for statisticians or data mining professionals.Continue reading

Environment, Epidemiology, & Etiology Surveillance & Analysis Toolkit (E3SAT)

The E3SAT tool suite allows researchers to collect, integrate and data mine medical records, environmental exposures, and deployment locations. This provides an encompassing data view of soldier health in the military healthcare system and enables studies of environmental, epidemiological and etiological factors driving the system.

In the aftermath of Desert Shield and Desert Storm, researchers have struggled with explaining the array of serious health impairing symptoms that have become collectively known as Gulf War Syndrome.  Approximately 30 percent of the 700,000 U.S. servicemen and servicewomen in the first Persian Gulf War have registered in the Gulf War Illness database complaining of these symptoms.  A key stumbling block in researching Gulf War Syndrome is the absence of a means for integrating relevant data—soldier medical records, environmental health and surveillance data, deployment data—and discovering and analyzing to discover patterns and correlations between deployment exposures and soldier signs, symptoms, and potential causes.

Continue reading

Human Enemy Network Influence Operations Map (HENIOMAP™)

The HENIOMAP™ technology uses advanced utility-theoretic models to provide a human enemy network influence operations map that incorporates cultural, social, and other factors using a simple knowledge acquisition process. The system assists influence operations (IO) planners in the evaluation and formation of influence operations.

KBSI, in a contract funded by the Office of Naval Research, is developing the hidden enemy network influence operations map (HENIOMAP™) capability, a decision-support tool for course of action (COA) design, analysis and selection in the counterinsurgency (COIN) domain. HENIOMAP™ provides middleware capabilities, assisting COA planners in gap analysis using forward (from COAs to commander’s objective) and backward (from commander’s objective to COAs) reasoning methods. The HENIOMAP™ COA ontology represents COAs, phases, activities, states, outcomes, measures-of-performance (MOP), and measures-of-effectiveness (MOE).

Continue reading