Papers and Presentations
Cryptographic Security
- SUPERDES™ Cryptographic Family (Description)
- SUPERDES™ Applications
Supply Chain Security
- Weakening The Enemy From Within (In the Style of Sun Tsu)
- Information Security-The hidden force multiplier (Relevant Message – Examples from 1986)
- Defense Logistics Agency’s (DLA) Supply Chain Security Strategy-Strengthening Operational Resiliency
IOT SCADA ICS Security
Non-Lethal Compact Hi Power (CHP) Laser Dazzler™
Patenting and Invention
ISI Courses
Anti-Eavesdropping and Acoustic Security
ISI US Government & Contractor Capability Statement