Search Results - cryptography+and+intrusion+detection

8 Results Sort By:
CYBERSECURITY: Reliability Of A Computer Network
Competitive Advantages This analytical model is developed using real data of the National Vulnerability Database, NVD. This analytical model is made up of data from Microsoft, Linux, and Apple computer operating systems that represents 99.34% of the market around the globe. This analytical model can identify the minimum number of steps, n, that...
Published: 7/12/2023   |   Inventor(s): Chris Tsokos, Freeh Alenezi
Keywords(s): Computers Software and Information Technology, Cryptography and Intrusion Detection, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity
Deploying Neural-Trojan-Resistant Convolutional Neural Networks for Self-Driving Vehicles
­Competitive Advantages This method can amplify Trojan’s malicious impact by making it more easily detectable so that system can provide rapid response and mitigation against the attacks This technology can prevent the spread of the attack to other connected systems and defend against attacks initiated through fake update requests The...
Published: 2/6/2024   |   Inventor(s): Robert Karam, Brooks Olney
Keywords(s): Autonomous Vehicle, Cryptography and Intrusion Detection, Cybersecurity, Hardware Based Security, Machine Learning
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Engineering > Autonomous Vehicle, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity
Wireless Efficient Privacy, Authentication and Resiliency Technologies for Forensic and Sensitive Data
Competitive Advantages Shows a near-optimal performance at the logger (e.g., resource limited IoT device). Achieves post-quantum security. FHE-based alternatives are ideal for single-server setting without a collusion-risk. Develop strategies to achieve scalable signature verification for constructions. Summary This invention creates a new...
Published: 1/12/2023   |   Inventor(s): Attila Yavuz
Keywords(s): Cryptography and Intrusion Detection, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations, Telecommunication and Wireless Communication
Category(s): Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Electronics, Technology Classifications > Computer Science > C/S Cybersecurity
A System And Method For Lightweight Post-Quantum Authentication For The Internet Of Things And Systems
Competitive Advantages Less memory is required for the signature and communication, as it does not require the signer to store and send the public key. Meets the NIST post-quantum cryptography standard with faster and memory-efficient processing on the signer’s side. The algorithm does not require any repetition of the signing algorithm....
Published: 7/12/2023   |   Inventor(s): Rouzbeh Behnia, Attila Yavuz
Keywords(s): Authentication and Biometric Systems, Cryptography and Intrusion Detection, Internet of Things / IoT
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > C/S Sensors, Technology Classifications > Computer Science, Technology Classifications > Data/AI, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Medical > Medical Devices, Technology Classifications > Medical > Medical Sensors
MAST Gas Loader Cell
Competitive Advantages Easy to use Cheaper in cost Portable Multiple samples can be prepared at once Summary Currently, there are no commercially available gas loader cell apparatus for solid-state NMR ultra-high spinning rotors used in solid-state Magic Angle Spinning experiments. The gas loader cells available today for NMR rotors are costumed...
Published: 9/8/2022   |   Inventor(s): Jason Mast, Edwin Rivera, Perry Pellechia
Keywords(s): Cryptography and Intrusion Detection, Cybersecurity , Materials, Mechanical and Structural Engineering
Category(s): Technology Classifications > Engineering > Mechanical Engineering
Hardware Supported Authentication and Signatures For Wireless, Distributed and Blockchain Systems
Competitive Advantages Energy-aware authentication protocol suitable for IoT devices and embedded devices Provable Security standards to the level of upcoming post-quantum security breaches in cryptosystems Scalable security architecture support for massive IoT applications Summary IoT devices play a central role in the distributed systems for...
Published: 8/16/2024   |   Inventor(s): Attila Yavuz, Saif Nouma
Keywords(s): Blockchain, Cryptography and Intrusion Detection, Cybersecurity
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > Network Systems
An SR Flip-Flop based Physical Unclonable Functions for Hardware Security
Competitive Advantages Promising solution to identify and authenticate Integrated Circuits Robust responses in terms of uniqueness, randomness, and uniformity Reduced bit-aliasing compared to other metastability-based PUFs Summary The novel PUF design proposed is unlike previous studies which typically require additional hardware...
Published: 7/17/2023   |   Inventor(s): Srinivas Katkoori, Rohith Prasad Challa, Sheikh Ariful Islam
Keywords(s): Cryptography and Intrusion Detection, Machine Learning
Category(s): Technology Classifications > Computer Science
System/Methods for Compromise Resilient and Compact Authentication for Digital Forensics
Competitive Advantages Reduce total space of signature and public key storage High space efficiency for low state transition systems Useful for security monitoring applications Summary Our proposed technology addresses many of the concerns in state-of-the-art cryptographic techniques. The coding tools ensure breach-resilience while...
Published: 7/18/2023   |   Inventor(s): Attila Yavuz
Keywords(s): Computer Science, Cryptography and Intrusion Detection, Database Management
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science