Stanford University
- Data for Effective Navy Seal Training, Navy Special Warfare Center
- Knowledge Management for Analysts, Central Intelligence Agency (CIA)
-
Lifelong Independence Solutions for Veterans with Complex Injuries,
Veterans Administration (VA) - Detection and Monitoring of Illicit Maritime Activities, US Southern Command (SOUTHCOM)
- Robotic Telesurgery, Army Medical Research and Material Command
-
Developing Cybersecurty Standards for Strategic Seaports,
US Transportation Command (TRANSCOM) - Semi-Autonomous Stand-Off Detection, Joint Improvised Threat Defeat Agency (JIDO)
Georgetown University
- Augmented Reality for Facial Recognition, Joint Improvised Threat Defeat Agency (JIDO)
- Understanding Social Media / Information Warfare, Asymmetric Warfare Group (AWG)
- Detecting Aerial Based Threats, Asymmetric Warfare Group (AWG)
- Tactical One-Way Cross Domain Solution (CDS), Special Operations Command (SOCOM)
James Madison University
-
Humanitarian Assistance / Disaster Relief Mobile & Web Based Applications,
Cybersecurity National Action Plan (CNAP) Acting Force Organization - UAS Hard Kill Challenge, Joint Improvised Threat Defeat Organization (JIDO)
- Digital Overlay, Asymmetric Warfare Group (AWG)
- Deep Clearance Situational Awareness, 75th Ranger Regiment
- Social Media for the Connected "Customer Development" Culture at USSOCOM, Special Operations Command (SOCOM)
-
Drone Defense System– Detect, Identify, Track, & Counter,
Air Force Nuclear Weapons Center
University of Pittsburg
- Big Crypto for Little Things, National Security Agency (NSA)
-
Light Tactical All-terrain Vehicle (LTATV) Crew Augmentation,
Special Operations Command (SOCOM) - Modern Day Minutemen, Army Cyber Command
- Technology Threat Prediction– DELPHI, Joint Improvised Threat Defeat Organization (JIDO)
Boise State University
- Human ID with Radio Frequency Emitters, Special Operations Command (SOCOM)