Ultra-dense Graph Representations | Many critical problems in national security, cybersecurity, and beyond can be best represented by graphs. While there is growing number graph databases that can scale linearly they are largely focused … | Cybersecurity, Systems Engineering | Grad | 2 to 4 | No | cyber se |
Successful Project Management | Project Management across technology projects derives greater challenges due to the complexity of projects at MITRE and other similar organizations. Use current project management methodology to streamline and curate options … | Systems Engineering | Undergrad | 5 or More | No | se |
Analytic Development through Capability Abstraction of ATT&CK Techniques | Research one or more ATT&CK Techniques using the “Capability Abstraction” approach used by SpectreOps to identify low-variance behaviors or “chokepoints” associated with those Techniques, and develop analytics and associated data … | Cybersecurity | Undergrad,Grad | 2 to 4 | No | cyber |
An Experiential Demonstration of the Benefits of Robotics Process Automation | When leaders or users face an opportunity to implement new technologies to improve their organizations, they often cannot imagine the impact of the change. This capstone seeks to create an … | Artificial Intelligence, Healthcare and Life Sciences, Machine Learning, Multidisciplinary, Systems Engineering | Grad,Undergrad | 2 to 4 | No | artificial-intelligence healthcare and-machine-learning multidisciplinary se |
Intelligent Automation Research Survey | There is much discussion and hype surrounding intelligent automation currently. It would be incredibly informative to understand the types and amount of academic research that has been conducted on intelligent … | Artificial Intelligence | Grad | 1 | No | artificial-intelligence |
Enterprise-level Intelligent Automation (IA) | Implementing isolated pockets of intelligent automation seems feasible for government organizations. However, little work appears to exist detailing the processes and methods required to scale Intelligent Automation at the enterprise … | Artificial Intelligence | Grad | 1 | No | artificial-intelligence |
Empirical Study of Authentication Methods; Is it time to do away with Passwords? | The purpose of this project would be to conduct a study of nuanced authentication mechanisms that have arisen as alternatives to traditional authentication methods such as password and physical tokens … | Cybersecurity, Data Science, Economics and Cost Analysis, Multidisciplinary, Systems Engineering | Grad,Undergrad | 2 to 4 | No | cyber datascience econ multidisciplinary se |
Applying ML/AI To Data Management Lifecycle Functions | Potential goals to consider: Streamline data tagging to increase turnaround time for discovery, orchestrate metadata between search technology tools, data management tools, and other prevalent technologies, and determine typical uses … | Data Science | Grad | 5 or More | No | datascience |
Detection of Insider Threat through OSINT | Expand the research that started with the original research started in the peer-reviewed article: “A Survey of Unintentional Insider Threat Category”, which is published at https://ijcsit.com/ijcsit-v14issue2.php. Conduct a literature review … | Artificial Intelligence, Cybersecurity, Machine Learning, Multidisciplinary | Grad,Undergrad | 2 to 4 | No | artificial-intelligence cyber and-machine-learning multidisciplinary |