The Network Security Section (Code 5544), a component of the Navy Center for High Assurance Computer Systems at the U.S. Naval Research Laboratory, focuses on the research and development of cyber defense solutions.

Scientists and engineers work closely with operational warfighters, the acquisition community, and resource sponsors to design and realize cyber technology (e.g., components, toolkits, equipment, and systems) that advances Navy, Joint, and Coalition capabilities. Code 5544 further performs testing and evaluation of emerging cyber solutions in order to assess their utility on military network environments. Efforts often involve strategic collaboration with International, U.S. Government, Industrial, and Academic community partners.

The major areas of work are listed as follows:

Network Inspection Technology

Design methods to discover, understand, and respond to cyber threats.

• Cyber Domain Awareness
• Intelligent Cyber Sensing
• Mission Assurance
• CounterMalware

Selected Publications

2019 Shing L, Wollaber A, Chikkagoudar S, Yuen J, Alvino P, Chambers A, Allard T.  2019.  Extracting Workflows from Natural Language Documents: A First Step. First International Workshop on Artificial Intelligence for Business Process Management (AI4BPM). :294-300.PDF icon AI4BPM_Shing_et_al.pdf (283.95 KB)
2019 Livingston MA, Brock D, Decker JW, Perzanowski DJ, Van Dolson C, Mathews J, Lulushi AS.  2019.  A Query Generation Technique for Measuring Comprehension of Statistical Graphics. 10th International Conference on Applied Human Factors and Ergonomics. PDF icon LivingstonEtAl_2019_AHFE_QueryGeneration.pdf (194.07 KB)
2018 Macklin T, West P.  2018.  Towards a Trustworthy Foundation for Assured Autonomous Systems. NATO IST-166 Specialist's Meeting on Mission Assurance for Autonomous Unmanned Systems. :15.PDF icon MP-IST-166-04.pdf (428.26 KB)
2018 Arthur-Durett K, Carroll TE, Chikkagoudar S.  2018.  Discovering Significant Co-Occurrences to Characterize Network Behaviors. 20th International Conference on Human Computer Interaction (HCII 2018). :609-623.PDF icon 2400_final(1).pdf (174.48 KB)
2018 Mathews J.  2018.  Navy Malware Catalog. 2017 NRL Review. :149-151.PDF icon 2017_NRL_Review_Mathews.pdf (209.26 KB)
2018 Wails R, Sun Y, Johnson A, Chiang M, Mittal P.  2018.  Temporal Dynamics in Anonymity Systems. Proceedings on Privacy Enhancing Technologies (PoPETS 2018). 2018(3)PDF icon tempest-popets2018.17-1231-3634.pdf (718.27 KB)
2018 Blowers M, Harney H, Wehner G.  2018.  Preventing the “Killer Robot” Scenario. NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience. :22-25.PDF icon Report of IST-152 workshop Prague 2017.pdf (1.15 MB)
2018 Guarino A, Komárková J, Rowell J.  2018.  “Hello, World” Autonomous Agent. NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience. :26-31.PDF icon Report of IST-152 workshop Prague 2017.pdf (1.15 MB)
2018 Blakely B, Henshel D, Wehner G, Rowell J.  2018.  Toward a Taxonomy of Fundamental System Properties of Cyber Resilience. NATO IST-153 Workshop on Cyber Resilience. :2-6.PDF icon Report of IST-153 workshop Munich 2017.pdf (1.55 MB)
2017 Wehner G, Rowell J, Langley J, Mathews J.  2017.  Federated Cybersecurity Policy Arbitration. NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience. :83-85.PDF icon Wehner et al.pdf (525.18 KB)
2017 Macklin T, Mathews J.  2017.  Big Data, Little Security: Addressing Security Issues in your Platform. SPIE Proceedings, Next-Generation Analyst V. :1-10.PDF icon Macklin et al.pdf (4.14 MB)
2017 Harrison A, Raglin A, Livingston M, Brock, Jr. D, Decker J, Perzanowski D, Van Dolson C, Mathews J, Lulush A.  2017.  The Analysis and Prediction of Eye Gaze When Viewing Statistical Graphs. International Conference on Augmented Cognition. :148-165.PDF icon Harrison et al.pdf (10.7 MB)
2014 Hyden P, Russell S, Jakubek D, Paxton N, Moskowitz I.  2014.  Advancing Future Network Science through Content Understanding. NATO IST-123 Cognitive Radio and Future Networks. :18.PDF icon HydenEtAl_2014_NATO_ContentUnderstanding.pdf (595.8 KB)
2014 Paxton N, Mathews J.  2014.  Identifying Network Packets Across Translational Boundaries. 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. PDF icon PaxtonEtAl_2014_IEEE_TranslationalBoundaries.pdf (577.5 KB)
2014 Jang D-il, Ahn G-J, Paxton N, Moscowitz I, Russell S.  2014.  Discovering and Analyzing Deviant Communities: Methods and Experiments. 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. PDF icon PaxtonEtAl_2014_IEEE_DeviantCommunities.pdf (360.64 KB)
2005 Macklin T, Jenket P.  2005.  Achieving Cross-Domain Collaboration in Heterogeneous Environments. NATO IST-042 Symposium on Coalition C4ISR Architectures and Information Exchange Capabilities. :34.PDF icon MP-IST-042-12.pdf (499.07 KB)
2004 Mathews J, Rowell J, Nadwodny D.  2004.  A Policy Based Approach to Securing Egress Secure Socket Layer Connections on Local Area Networks. NATO lST-041 Symposium on Adaptive Defense in Unclassified Networks. PDF icon ada447305.pdf (419.78 KB)