Home          Services         Products/Downloads          Demos          Careers          About 

 

 

http://www.silverbulletinc.com/images/sectionheaders/projects_sub.gif

Why is it called"Silver Bullet"?

Corporate

Personnel

Recent Contracts

Office Locations

Seaport

Contact Us

Title

Client

Description of Work Performed

Cyber Ontology (CybOnt) Data Fusion

Intelligence and Information Warfare Directorate (I2WD), US Army Combat Capabilities Development Command, (CCDC)

CybOnt performs ontology-based fusion for cyber threat behavior estimation to contribute to an operator's cyber Situational Awareness (SA) and Situational Understanding (SU).  It is unique in that, (1) it is architected following the Joint Directors of Laboratories (JDL) fusion levels, (2) it uses formal ontology for the T-Box (types) and A-Box (actuals), and (3) it computes mathematically-principled -- and thus robust -- likelihood ratios of attack behavior hypotheses.  Inference links are visualized in a graph database tool that allows customized viewing tailored to operator requirements.  The likelihood ratios can be thresholded to give operators control over display clutter.  It runs in a tactical cloud environment and uses big data technologies.  As we continue to develop probabilistic fusion results in the forthcoming phases, we also plan to incorporate the advances in Deep Learning (DL) in a hybrid architecture.  Architectures we are looking into are: (a) bootstrapping where the Probabilistic Reasoner (PR) is used to develop training sets for DL and the DL living learning is used to adjust probabilistic reasoner’s knowledge base, (b) using the PR for rapid data triage by processing some subset of the observations and features to reduce their dimensionality for the DL, (c) augmenting, where the PR and DL both receive the sensor inputs and PR’s hypotheses and Λ become additional inputs to the DL, and (d) as a validator and explainer in which the PR is used to validate the DL has not be spoofed by adversarial AI or come into an environment it does not know.  The PR explains DL results it agrees with using pedigree or provenance embedded in fusion file and displayable in PR’s graph displays.

Systems Engineering and Architecture

Space and Naval Warfare Systems Center Atlantic (SPAWARSYSCEN-LANT)

This contract supports enterprise requirements analysis and assessments, architecture, human systems integration, modeling and simulation services and future capability engineering in support of various DoN, DoD and Federal civilian agency systems.

Naval Enterprise Architecture Repository (NEAR)

Assistant Secretary of the Navy for Research, Development, and Acquisition (ASN RDA)

Silver Bullet developed translators to and from enterprise architecture tools (IBM System Architect, IBM Rational Software Architect, No Magic Magic Draw) and the DoD Architecture Framework (DoDAF) formal ontology, the DoDAF Meta Model (DM2), and its XML Physical Exchange Specification (PES).  These translators enable Model Based Systems Engineering (MBSE) model reuse in conjunction with data exposure for future architecture and systems engineering analytics, execution, and simulation.  The data exposure enables cross-architecture analysis for interoperability assessment, cybersecurity risk assessment, mission capability gap analysis, and portfolio management.  The PES translators were successfully used to transform Joint Information Environment (JIE) architecture Magic Draw files developed by the JIE Technical Synchronization Organization (JTSO) to PES for the DoD CIO Enterprise Architecture and Engineering Panel (EAEP).

Semantic Distance Function (SDF)

IRaD

SDF computes semantic distances between pairs of text documents in the form of likelihood ratios of the likelihood that the same concepts would have produced the pair compared to the likelihood of the null hypothesis.  What is unique is, (1) the principled mathematics, (2) the concept of semantic mass and semantic mass ratios, and (3) an innovative way to compute the expected semantic mass ratio for the null hypothesis.  SDF was inspired by long-standing JDL Level 2 fusion track correlation problem.  A key element is a Gram Frequency Data Base (GFDB) implemented in Hbase for quick lookup of gram frequencies by distributed processors computing the semantic distance.  For some experiments the GFDB was initialized using Google's Web 1Terabyte database of one-to-five gram frequencies.  For cyber experiments, a domain-specific GFDB was developed by processing cyber corpii including Exploit DB (40K entries) and the Common Vulnerabilities and Exposures (CVE) database (100K entries).  The GFDB adapts as input documents are processed so the initialization only needs to bootstrap the processing.  Experiments have been run using newstories, the Enron email corpii, SNORT rules, and the Common Attack Pattern Enumeration and Classification (CAPEC) database.

Command and Control Systems Engineering Support

Navy Program Executive Office for Integrated Warfare Systems (PEO IWS) 6.0

Silver Bullet provided systems engineering support for Navy ship and submarine navigation systems including inertial, multi-source, alternative, and decision support.  Silver Bullet developed architecture descriptions and data models, acquisition documents, and specifications.  Silver Bullet conducted mathematical analyses, supports scientific research, and analyzes and synthesizes operational requirements.  Silver Bullet provides liaison between engineering and S&T communities.  Silver Bullet also supported Combat System and C4I systems integration and architecture, particularly for Ballistic Missile Defense (BMD).

DoD Information Enterprise Architecture

Department of Defense (DoD) Chief Information Officer (CIO)

Silver Bullet is DoD’s lead engineer for the DoD Architecture Framework (DoDAF).  Silver Bullet was key in moving DoD architectures from, 1) unstructured documents to structured data, 2) qualitative to quantitative, and 3) templates to fit-for-purpose models.  This derived from Silver Bullet's role as the U.S. DoD technical lead to an international defense team that developed a formal ontology for coalition data exchange called International Defence Enterprise Architecture Specification (IDEAS). It is formal in that it has a mathematical foundation that implements high order type theory and four-dimensional mereotopology. Silver Bullet used this ontology to develop the DoD Architecture Framework (DoDAF) Meta Model (DM2), in the Cyber Ontology (CybOnt) project, in the operationalization of the DoD Information Enterprise Architecture (DIEA), and in the architectures for the Joint Artificial Intelligence Center (JAIC) Common Foundation.   

Architecture and Systems Engineering

Space and Naval Warfare Systems Command

Architecture/systems engineering services for the development of the Navy/Department of Navy Enterprise Architecture (N/DoN EA).  Silver Bullet developed the data structure for the Naval Architecture Elements Reference Guide (NAERG) using DM2 and supported the analysis and restructuring of the existing architecture elements into the DM2.   Silver Bullet developed an OWL version of the DM2.

Enterprise and Strategic Engineering

Joint Improvised Explosive Device – Defeat Organization (JIEDDO) Counter IED Operations – Intelligence Center (COIC)

Silver Bullet is the EA team lead as part of the Systems Engineering and Technical Assistance (SETA) contractor for the COIC’s Enterprise Engineering Board.  Silver Bullet develops and maintains the JIEDDO-COIC Enterprise Architecture “As Is” and “To Be” baselines for capabilities, operations, systems, services, data, and standards including all COIC system interfaces, standards, and major technology insertion changes. Silver Bullet develops and maintains the EA Roadmap from the “As Is” to the “To Be” state.  This includes supporting mission analysis and identification of gaps to address in “To Be” EA end state, ensuring alignment with DOD and IC EA (e.g., JIE, DI2E and ICITE initiatives), supporting COIC portfolio management (PfM). Silver Bullet also conducts research into advanced analytic techniques (e.g., network analysis, search, predictive analysis) and technologies (e.g., electronics, forensics) and the information technology (e.g., software applications, databases and advanced database management).