Defense:
- Trustworthy embedded system architectures composed of components of mixed trust
- Trust scoring mechanisms
- Scalable HW/SW analysis and verification techniques
- Resilient mobility
Engagement:
- Control planes for heterogeneous components and systems
- Threat-aware defenses
- Real-time defensive traffic management
Situational Awareness and Courses of Action:
- Graded options responsive to commander’s intent
- Analysis of Mission Dependencies to Cyber Infrastructure
- Cyber-Kinetic integration, planning, and assessment