Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Talks

PSCR 2021: An Introduction to WebXR

Author(s)
Paul Merritt
An overview and walkthrough of WebXR platforms A-Frame and AR.js, highlighting ease, convenience, and usability for developers and first responders.

PSCR 2021: Aerial LTE Network Testing

Author(s)
Maxwell Maurice, Sam Ray
This on demand session will outline the work done by PSCR on aerial LTE deployments. We will describe the project, the motivation for collecting these

PSCR 2021: Analog LMR to MCPTT Communications

Author(s)
Christopher Walton, Jonathan Cook, Chic O'Dell
A presentation that documents the development of an analog LMR to MCPTT communications system. The prototype developed bridges an analog LMR radio system with a

PSCR 2021: Localization Ground Truth System

Author(s)
Joe Grasso, Charlsea Hansen
The Location-Based Services (LBS) portfolio focuses on indoor mapping, tracking, and navigation. At the 2020 Digital Experience, we introduced concepts under

PSCR 2021: Pecha Kucha Portfolio Overviews

Author(s)
John Beltz, Scott Ledgerwood, Roger Blalock, Joe Grasso, John S. Garofolo, Jesse Frey, Cara O'Malley, Fernando Cintron, Bill Fisher, Gema Howell, Yee-Yin Choong, Jack Lewis, Paul Merritt, Edmond J. Golden III, Ian Soboroff, Craig Connelly, Gary Howarth, Brianna Vendetti, Katelynn Kapalo, Margaret Pinson
PSCR Research Portfolio Leaders join their staff to provide an overview of the projects housed within their PSCR portfolio. Each portfolio overview is delivered

The New NIST Phish Scale, Revealing Why End Users Click

Author(s)
Shanee T. Dawkins, Kristen Greene, Jody L. Jacobs
Developed based on over 4 years of NIST phishing training data, the NIST Phish Scale is a DIY method for rating human phishing detection difficulty – key to

Trojan Detection Evaluation: Finding Hidden Behavior in AI Models

Author(s)
Michael Paul Majurski, Derek Juba, Timothy Blattner, Peter Bajcsy, Walid Keyrouz
Neural Networks are trained on data, learn relationships in that data, and then are deployed to the world to operate on new data. For example, a traffic sign