Search Results - cyber+security

11 Results Sort By:
Cyber Risk Loss Distribution of Hospital Infrastructure
Networks like those of healthcare infrastructure have been a primary target of cyberattacks for over a decade. From just a single cyberattack, a healthcare facility would expect to see millions of dollars in losses from legal fines, business interruption, and malpractice lawsuits. As more medical devices become interconnected, more cyber vulnerabilities...
Published: 4/5/2024   |   Inventor(s): Stefano Chiaradonna, Petar Jevtic, Nicolas Lanchier
Keywords(s): Algorithm Development, Cyber Security, Modeling, Networks, IT, Software and Communication, PS-Computing and Information Technology, PS-Wireless and Networking
Category(s): Computing & Information Technology, Intelligence & Security, Physical Science
Cyber Risk Loss Distribution Model of Client-Server Networks
Cyber risk has emerged as a significant threat to businesses that have increasingly relied on new and existing information technologies. Across various businesses in different industries and sectors, a distinct pattern of IT network architectures, such as the client-server network architecture, may expose those businesses, which share it, to similar...
Published: 3/18/2024   |   Inventor(s): Stefano Chiaradonna, Petar Jevtic, Nicolas Lanchier, Sasa Pesic
Keywords(s): Algorithm Development, Cyber Security, Decision Support, Insurance, Machine Learning, Networks, IT, Software and Communication, PS-Computing and Information Technology, PS-Wireless and Networking, Reliability, Risk Assessment, Security
Category(s): Computing & Information Technology, Intelligence & Security, Physical Science
Full-stack Obfuscation Tool to Mitigate Neural Architecture Stealing
The architecture information of a Deep Neural Network (DNN) model is considered a valuable, sensitive piece of property for a company. Knowledge of a DNN’s exact architecture allows any adversary to build a substitute model and use this substitute model to launch devastating adversarial attacks. Side-channel based DNN architecture stealing can...
Published: 2/14/2024   |   Inventor(s): Jingtao Li, Chaitali Chakrabarti, Deliang Fan, Adnan Siraj Rakin
Keywords(s): Artificial Intelligence, Cyber Security, Defense Applications, Machine Learning, Neural Computing, PS-Computing and Information Technology
Category(s): Computing & Information Technology, Physical Science, Intelligence & Security
Identify Targeted Attacks on Deep RL-Based Autonomous Driving
In the rapidly advancing landscape of deep reinforcement learning (RL), recent studies have highlighted vulnerabilities in control policies learned through deep RL. These vulnerabilities raise concerns surrounding adversarial attacks, especially in risk-sensitive domains such as autonomous driving. In these scenarios, the learned policies become susceptible...
Published: 12/5/2023   |   Inventor(s): Prasanth Buddareddygari, Travis Zhang, Yezhou Yang, Yi Ren
Keywords(s): Algorithm Development, Automotive, Cyber Security, Detection, Machine Learning, PS-Computing and Information Technology
Category(s): Computing & Information Technology, Intelligence & Security, Physical Science
Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums
There has been a rise in security breaches over the past few years, prompting an increasing need to mine insights from external discussion and social media platforms to raise alerts of possible attacks that might cater to specific industries. The dark web is one source of information on the internet where users can share information on software vulnerabilities...
Published: 8/8/2023   |   Inventor(s): Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Paulo Shakarian
Keywords(s): Algorithm Development, Cyber Security, Darknet/Darkweb, Machine Learning, PS-Computing and Information Technology, Security, Social Media Monitoring
Category(s): Computing & Information Technology, Intelligence & Security, Physical Science
Binary Neural Network for Improved Accuracy and Defense Against Bit-Flip Attacks
­Recently, Deep Neural Networks (DNNs) have been deployed in many safety-critical applications. The security of DNN models can be compromised by adversarial input examples, where the adversary maliciously crafts and adds input noise to fool a DNN model. The perturbation of model parameters (e.g., weight) is another security concern, one that relates...
Published: 2/24/2023   |   Inventor(s): Deliang Fan, Adnan Siraj Rakin, Li Yang, Chaitali Chakrabarti, Yu Cao, Jae-Sun Seo, Jingtao Li
Keywords(s): Algorithm Development, Artificial Intelligence, Cyber Security, Defense Applications, Machine Learning, Neural Computing
Category(s): Physical Science, Intelligence & Security, Wireless & Networking, Computing & Information Technology
MemPoline: Protecting Sensitive Software against Memory-based Information Leakage
INV-21111 Background In recent years, various side-channel timing attacks on both CPUs and GPUs, in diverse settings such as desktops, clouds, and mobile systems have been seen. These attacks observe events on different shared resources on the memory hierarchy from timing information, and then infer memory access patterns to retrieve the secret...
Published: 9/10/2024   |   Inventor(s): Yunsi Fei, Zhen Jiang
Keywords(s): cryptographic engineering, Cyber Security, Security
Category(s): Technology Classifications > 3. Computer Science > Software, Technology Classifications > 3. Computer Science > IoT
Radio-Frequency (RF) Imaging Sensor for Advanced Security Fingerprint Biometrics and Mobile Health Monitoring
Current portable and wearable devices use fingerprint analysis for secure authentication. The fingerprint pattern systems analyze only the surface morphology of the fingerprint, making it easy for hackers to spoof and bypass authentication. RF signals can collect tissue information beyond the surface of the finger and can provide increased security...
Published: 2/23/2023   |   Inventor(s): Georgios Trichopoulos, Panagiotis Theofanopoulos
Keywords(s): Authentication, Cyber Security, Cyber-Physical System, Engineering, Fingerprint, Graphenes, Health Monitoring, Medical Devices and Imaging, Mobile Biometrics, Real-Time System, Screening, Smart Devices, Transactions Security
Category(s): Chemical/Biological Sensors, Diagnostic Assays/Devices, Medical Diagnostics/Sensors, Physical Science, Intelligence & Security
An Architecture for Security Health Monitoring and Attestation in Cloud Computing
Princeton Docket # 15-3171-1Researchers at Princeton University, Department of Electrical Engineering, have developed a distributed architecture to monitor and attest the security health of cloud customers' virtual machines (VMs) in a cloud computing system.Cloud providers want to monitor VMs to provide a secure and efficient computing environment to...
Published: 7/7/2023   |   Inventor(s): Ruby Lee, Tianwei Zhang
Keywords(s): computers/software, cyber security, data security
Category(s): Computer Science and Information Technology
Novel Highly Scalable Adaptive Photonic Beamformer Using "Blind" Guided Accelerated Random Search
Highly Scalable Adaptive Photonic Beamformer using “Blind” Guided Accelerated Random Search for Wireless CommunicationPrinceton Docket # 15-3056Researchers in the Department of Electrical Engineering at Princeton University have developed an adaptive photonic beamformer for use in wireless communication. Wireless communication has experienced...
Published: 3/30/2022   |   Inventor(s): John Chang, Paul Prucnal, James Meister
Keywords(s): big data, communications, cyber security, data security, Opto-Electronics/ELE ENG
Category(s): Mechanical/Electrical Engineering
1 2