Completed Problems

 
 

 Stanford University – Spring 2018

  • Social Media for Recruiting, D.C. Air National Guard

  • Vehicle Immobilization, ERDC

  • Commander's Knowledge Management, USF Korea

  • Power, Air Force Research Lab

  • Non-Instrusive Load Monitoring, Department of Energy

  • BYOD in the DoD, NAVSUP

  • Indoor Transport of Missile Systems, Air Force Nuclear Weapons Center

  • Protecting Energy-Related Data, A.F. Office of Energy Assurance (OEA)

  • OBC Imagery, 9th ISR Wing

  • Building Survivability During Military Operations, ERDC

  • Finding Life Beyond Earth, NASA

  • Protocol Analysis, National Security Agency

  • e-Acquisitions, Defense Acquisitions University

  • Simplifying Recommendations, Army Research Lab

University of Southern California – Spring 2018

  • Emergency Patient Redistribution, 18AF

  • Minerva's Owl, ARCYBER

  • Resilient Installations, ERDC

  • Hacking Radicalization, State Department

  • Preventing and Predicting Cyber Threats, A.F. Office of Energy Assurance (OEA)

University of Southern Mississippi – Spring 2018

  • Pilot Scheduling, AMW

  • Hydration, Air Force Research Lab

  • Rapidly Deployable Protection, ERDC

  • Gamification, ERDC

  • Long-Range Camera, Army Research Lab

  • Obscuring Electromagnetic Signatures, Asymmetric Warfare Group

James Madison University – Spring 2018

  • Tracking Fliers and Carry-Ons, Department of Homeland Security

  • Standoff Battery Drain, JIDO

  • Fast Flight Records, 60 AMW

  • Unwanted Attached Device Detect, JIDO

  • Preventing Forced Labor, State Department

  • Device Recall Tracking, USAMMA

  • Automating Astrobiology Discovery, NASA

Rochester Institute of Technology – Spring 2018

  • Detecting Bombs in Laptops, Department of Homeland Security

  • Protecting Air Traffic Management Systems, NASA

  • VA/AR Repairs, 60 AMC

  • Occupancy Pattern Recognition, Department of Energy

  • Leveraging Neuroscience, Army Research Lab

  • Failing Infrastructure on DoD Installations, A.F. Office of Energy Assurance (OEA)

  • Remote Stopping of VBIED, JIDO

Johns Hopkins University – Spring 2018

  • Personal Signature Reduction, Air Force Research Lab

  • Publicly Available Information for Speedy Deployment, NATO

  • Energy Storage Integration, A.F. Office of Energy Assurance (OEA)

  • Cyber Indications of Strategic Warning, Defense Intelligence Agency

  • Employing Counter Drones, D.C. National Guard

University of Colorado, Boulder – Spring 2018

  • Over the Horizon Scouting, 3rd Fleet

  • SubT Awareness, Asymmetric Warfare Group

  • Drone Detection, SOFWERX

  • Protecting IoT Devices, National Security Agency

  • OBAC Data Fusion, Space and Missile Command

University of Pittsburgh – Spring 2018

  • Detecting WMD, USF-Korea

  • Community Resilience, OEA

  • Enabling Information Sharing despite Geographical Distance, Army Research Lab

DC Consortium (Georgetown, GW, George Mason, Howard) – Spring 2018

  • Data-Mining Social media, ​MCWL

  • Prevent Security Force Abuses, State Department

University of Southern Mississippi – Summer 2017

  • Dragon Army– Engagement through Gaming, ​Army Cyber Command

  • Marine Corps Logistics Mobile Applications, HQMC

  • Future Marine Corps Autonomous Cargo Systems, US Marine Corps

  • Associating IP Addresses with Malicious Activity, National Security Administration

Stanford University – Spring 2017

  • Data for Effective Navy Seal Training, ​Navy Special Warfare Center

  • Knowledge Management for Analysts, Central Intelligence Agency (CIA)

  • Lifelong Independence Solutions for Veterans with Complex Injuries,
    Veterans Administration (VA)

  • Detection and Monitoring of Illicit Maritime Activities, ​US Southern Command (SOUTHCOM)

  • Robotic Telesurgery, ​Army Medical Research and Material Command

  • Developing Cybersecurty Standards for Strategic Seaports,
    US Transportation Command (TRANSCOM)

  • Semi-Autonomous Stand-Off Detection, ​Joint Improvised Threat Defeat Agency (JIDO)

Georgetown University – Spring 2017

  • Augmented Reality for Facial Recognition, ​Joint Improvised Threat Defeat Agency (JIDO)

  • ​Understanding Social Media / Information Warfare, Asymmetric Warfare Group (AWG)

  • Detecting Aerial Based Threats, ​Asymmetric Warfare Group (AWG)

  • Tactical One-Way Cross Domain Solution (CDS), ​Special Operations Command (SOCOM)

James Madison University – Spring 2017 

  • Humanitarian Assistance / Disaster Relief Mobile & Web Based Applications,
    Cybersecurity National Action Plan (CNAP) Acting Force Organization

  • UAS Hard Kill Challenge, ​Joint Improvised Threat Defeat Organization (JIDO)

  • Digital Overlay, ​Asymmetric Warfare Group (AWG)

  • Deep Clearance Situational Awareness, ​75th Ranger Regiment

  • Social Media for the Connected "Customer Development" Culture at USSOCOM,Special Operations Command (SOCOM)

  • Drone Defense System– Detect, Identify, Track, & Counter,
    Air Force Nuclear Weapons Center

​University of Pittsburgh – Spring 2017

  • Big Crypto for Little Things, National Security Agency (NSA)

  • Light Tactical All-terrain Vehicle (LTATV) Crew Augmentation,
    Special Operations Command (SOCOM)

  • Modern Day Minutemen, ​Army Cyber Command

  • Technology Threat Prediction– DELPHI, ​Joint Improvised Threat Defeat Organization (JIDO)

Boise State University – Spring 2017

  • Human ID with Radio Frequency Emitters, ​Special Operations Command (SOCOM)