Despite appearances, Computer Security is not a technology problem. In reality, while technology underpins the entire discipline, we need to understand our organizations, social groups, psychology and cognition in order to really grasp the breadth of the challenges faced. Our research is therefore equally broad, and involves not only a deep understanding of computer science but also Business, Engineering, Psychology and Biology. Each member of the Institute is not only an expert in their own field, but is also aware of the interdependencies among the disciplines. As such, the Institute provides the perfect environment to help cut across different subjects, allowing us to seek pragmatic solutions that work outside of the laboratory.
Transitioning HIAI Cybersecurity research into tools and products that can be used by FIT network operators.
Federated Command and Control is a tool that increases the secuirty of network infrastructures by sharing learned knowledge of attacks and defensive postures within federation.
Building visual structures that enable network security operators to determine what behaviors are taking place on the network.
Research for a prototype agent-based infrastructure for pilot behavioral modeling in autonomous airborne vehicles.
A control framework for software-defined radios to support MANET and cognitive network applications, using Universal Software Radio Peripherals (USRP) and small factor, single-board computers such as Banana Pi, Intel NUC and MinnowBoard.
Research on resilient communication protocols for airborne networks at the transport and network levels, as well as integrated support of resilience at multiple layers in the system.
Fluxus is asensor that detects changes in its execution environment based on timing analysis of system calls.
A Defense Quantification Service that takes defense implementations and metadata as inputs, and produces characterization profiles of the defenses for use as part of an integrated C2PD decision tool.
A system for semi-automated modeling, representation, and integration of moving targets defenses (MTD) into command and control infrastructures.
A cyber operation scenario that replicates the conditions in a real world organization in terms of infrastructure, topography, network traffic, defenses and attacks in order to better understand the impact on scenario missions when an organization comes under attack.
A cross-layer framework that enables applications to better adapt to dynamic communications environments by leveraging the underlying network infrastructure to support QoS requirements and constrains.
Emulation systems that support different research tasks in the areas of network communications, distributed coordination and task allocation, path finding, collision avoidance, and optimization.
An extension that augments MIRA with declaratively specified behaviors that can be used by other agents to reason about the network security posture.
A realistic use modeling service that helps researchers study how the presence of cyber attacks and defenses effect and individual's ability to complete his/her mission.
Florida Tech is located in Melbourne on Florida’s Space Coast, one of the nation's fastest-growing high-tech areas. The campus is 5 minutes from the Indian River estuary, 10 minutes from the Atlantic Ocean and 50 minutes from Kennedy Space Center and Orlando. You can click the options to learn more about the job requirements for each position.
Applicants should send their resume to email@example.com. Review of applications will begin immediately and continue until the position is filled. Florida Tech is an Affirmative Action/ Equal Opportunity Employer committed to excellence through diversity.