Inteum Company
Links
seedsprint
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - cybersecurity
34
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
An Automated False Data Injection Attack Generator for Testing and Verification of Networked Control Systems
Advantages: Automated security testing for networked control systems (NCSs), eliminating the need for manual attack scenario creation Reinforcement learning (RL)-based approach efficiently generates attack scenarios to identify vulnerabilities Proven stability using Lyapunov-based analysis, ensuring attack generation with convergence guarantees Adaptable...
Published: 4/4/2025
|
Inventor(s):
Arman Sargolzaei
,
Farahnaz Javidi Niroumand
Keywords(s):
Artificial Intelligence
,
Autonomous Vehicle
,
Cybersecurity
Category(s):
Technology Classifications > Computer Science > C/S
Cybersecurity
,
Technology Classifications > Data/AI >
Cybersecurity
- Data/AI
Universal and Efficient Detection of Adversarial Data through Nonuniform Impact on Network Layers
Advantages: Universal and real-time detection across image, video, and audio domains Lightweight and highly efficient, operating orders of magnitude faster than existing defenses Achieves 98% detection accuracy, significantly outperforming other methods Compatible with any Deep Neural Network (DNN) without requiring modifications Summary: Deep...
Published: 3/24/2025
|
Inventor(s):
Yasin Yilmaz
,
Furkan Mumcu
Keywords(s):
Artificial Intelligence
,
Cybersecurity
Category(s):
Technology Classifications > Data/AI >
Cybersecurity
- Data/AI
,
Technology Classifications > Computer Science > C/S
Cybersecurity
Defending Against Wi-Fi Spoofing Attacks Leveraging Physical-Layer Features
Advantages: Identifies Wi-Fi spoofing attacks by leveraging Doppler Effect and Symbol Timing Offset (STO) variations Protects against location manipulation, ensuring accurate navigation even in high-risk environments Improves navigation accuracy by differentiating legitimate and spoofed signals Cost-effective implementation with off-the-shelf...
Published: 1/22/2025
|
Inventor(s):
Xiao Han
,
Yao Liu
,
Zhuo Lu
Keywords(s):
Autonomous Vehicle
,
Cybersecurity
,
Telecommunication / Wireless Communication
,
Transportation
Category(s):
Technology Classifications > Computer Science > C/S
Cybersecurity
,
Technology Classifications > Computer Science > Algorithms
Discriminating anti DDoS (DAD) Attacks
High level Architecture for Distributed anti Denial (DAD) of Service solution Invention Summary: With the increasing reliance on digital services, Distributed Denial of Service (DDoS) attacks have become one of the most challenging
cybersecurity
threats. These attacks aim to disrupt access to online resources by overwhelming servers with...
Published: 12/17/2024
|
Inventor(s):
Naftaly Minsky
Keywords(s):
Cybersecurity
,
Networks
Category(s):
Technology Classifications > Software & Algorithms
,
Technology Classifications > Software & Copyright
,
Technology Classifications > Physical Sciences & Engineering
,
Technology Classifications > Telecommunications & Networking
A Visual Brain Based Authentication
Advantages: Increases data security by utilizing people’s brain data, which is more difficult to hack than traditional methods. Intuitive design that can be used in any domain, by adjusting the visual display. User-friendly interface that only requires a username and brain activity to create and access profile without the need to remember...
Published: 8/16/2024
|
Inventor(s):
Tyree Lewis
,
Marvin Andujar
Keywords(s):
Authentication and Biometric Systems
,
Cybersecurity
Category(s):
Technology Classifications > Data/AI >
Cybersecurity
- Data/AI
,
Technology Classifications > Electronics > Electronics Sensors
FESA: Fast and Efficient Secure Aggregation for Privacy-Preserving Federated Learning
Advantages: Protects user data during federated learning, ensuring individual privacy without compromising analysis. Minimizes data transfer, improves federated learning convergence speed and reducing resource consumption. Requires just one trustworthy assisting node, making implementation and scalability more straightforward. Summary: This...
Published: 9/3/2024
|
Inventor(s):
Rouzbeh Behnia
,
Mohammedreza Ebrahimi
,
Thang Hoang
,
Balaji Padmanabhan
Keywords(s):
Cybersecurity
,
Data Mining
Category(s):
Technology Classifications > Data/AI >
Cybersecurity
- Data/AI
,
Technology Classifications > Computer Science > Computers Software & Information Technology
EW-Tune: A Framework for Privately Fine-Tuning Large Language Models with Differential Privacy
Advantages: EW-Tune framework ensures robust privacy, preventing unauthorized access to sensitive AI data. Differing from conventional approaches, EW-Tune is custom-tailored for enhancing already established AI models, streamlining the process. Summary: This technology introduces EW-Tune, a pioneering solution aimed at refining AI language...
Published: 2/19/2025
|
Inventor(s):
Reza Ebrahimi
,
Rouzbeh Behnia
,
Balaji Padmanabhan
Keywords(s):
Artificial Intelligence
,
Cybersecurity
Category(s):
Technology Classifications > Data/AI >
Cybersecurity
- Data/AI
Facilitating Security Verification of System Designs Using Adversarial Machine Learning
Advantages: Enhanced vulnerability identification Efficient verification process Proactive vulnerability detection Business Summary: Businesses seek innovative solutions for growth, efficiency, and digital adaptation amid the pandemic, requiring professional, trustworthy services, open communication, and continuous learning. The difficulties...
Published: 4/24/2024
|
Inventor(s):
Hao Zheng
Keywords(s):
Artificial Intelligence
,
Computer Science
,
Computers Software and Information Technology
,
Cybersecurity
,
Data Mining
,
Electronics
,
Machine Learning
,
Semiconductors
Category(s):
Technology Classifications > Computer Science
,
Technology Classifications > Data/AI
,
Technology Classifications > Data/AI >
Cybersecurity
- Data/AI
,
Technology Classifications > Electronics
,
Technology Classifications > Engineering
,
Technology Classifications > Engineering > Electrical Engineering
,
Technology Classifications > Engineering > Computer Engineering
,
Technology Classifications > Medical >
Cybersecurity
Resilient Multi-Robot System with Social Learning for Smart Factories
Advantages: This technology improves productivity, enabling seamless collaboration and optimized resource utilization in smart factories. The technology enhances the robustness and resilience of smart factories, maintaining objective performance under challenging circumstances. It strengthens security measures and cyber defense, ensuring the integrity...
Published: 9/3/2024
|
Inventor(s):
Zixiang Nie
,
Kwang-Cheng Chen
Keywords(s):
Artificial Intelligence
,
Cybersecurity
,
Industrial Applications
,
Robotics
Category(s):
Technology Classifications > Data/AI
,
Technology Classifications > Computer Science > C/S
Cybersecurity
,
Technology Classifications > Engineering > Industrial Engineering
CYBERSECURITY
: Reliability Of A Computer Network
Competitive Advantages This analytical model is developed using real data of the National Vulnerability Database, NVD. This analytical model is made up of data from Microsoft, Linux, and Apple computer operating systems that represents 99.34% of the market around the globe. This analytical model can identify the minimum number of steps, n, that...
Published: 7/12/2023
|
Inventor(s):
Chris Tsokos
,
Freeh Alenezi
Keywords(s):
Computers Software and Information Technology
,
Cryptography and Intrusion Detection
,
Cybersecurity
,
Diagnostic Tools for Network Vulnerability Evaluations
Category(s):
Technology Classifications > Computer Science > C/S
Cybersecurity
1
2
3
4