Inteum Company
Links
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - technology+classifications+%3e+computer+science+%3e+c%2fs+cybersecurity
26
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
A Lightweight Multiple-Time Post-quantum Signature for Heterogeneous Internet of Things
Advantages Maximizes key reuse, enabling over one million efficient post-quantum signatures Ultra-fast signing—up to 2463× faster than NIST PQ alternatives on ARM Uses only 1.4KB signer memory, ideal for low-end embedded IoT devices Sub-kilobyte signature size minimizes transmission energy in constrained IoT networks Summary The...
Published: 7/21/2025
|
Inventor(s):
Attila Yavuz
,
Kiarash Sedghighadikolaei
Keywords(s):
Cybersecurity
,
Internet of Things / IoT
Category(s):
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Electronics > Electronics Telecommunications
,
Technology Classifications > Data/AI > Cybersecurity - Data/AI
,
Technology Classifications > Computer Science > C/S Sensors
Real-Time Program-Specific Log Consolidation for Intrusion Detection
Advantages Reduces logs 219× for efficient data storage Performs real-time analysis with zero offline cost Minimizes memory use through subject activity consolidation Maintains high detection accuracy with low alert fatigue Summary Enterprises today are increasingly targeted by Advanced Persistent Threats (APTs), stealthy, long-term attacks...
Published: 7/18/2025
|
Inventor(s):
Yao Liu
,
Xiao Han
,
Zhuo Lu
Keywords(s):
Computer Science
,
Cybersecurity
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > Computers Software & Information Technology
,
Technology Classifications > Computer Science > Datasets
Efficient, Scalable and Post-Quantum Authentication for Real-time Next Generation Networks with Probabilistic Data Structures
Advantages: 4x to 6x faster key generation and up to 5x faster signature verification than existing methods Works on low-power devices like drones, smartwatches, and medical implants Post-quantum secure and designed for real-time communication needs Scales easily across large systems with many devices and users Summary: Modern wireless systems...
Published: 4/16/2025
|
Inventor(s):
Attila Yavuz
,
Kiarash Sedghighadikolaei
Keywords(s):
Category(s):
Technology Classifications > Electronics > Electronics Telecommunications
,
Technology Classifications > Computer Science > C/S Cybersecurity
Privacy-Preserving and Post-Quantum Secure Counter Denial of Service
Advantages: Post-quantum secure protection against DoS and DDoS attacks Privacy-preserving spectrum access with location and identity anonymity Efficient puzzle outsourcing via Private Spectrum Bastions (PSBs) Flexible deployment options: hash-based, lattice-based, and blockchain-integrated Compliance-ready with FCC standards and NIST-approved...
Published: 6/11/2025
|
Inventor(s):
Attila Yavuz
,
SALEH DARZI
Keywords(s):
Cryptography and Intrusion Detection
,
Telecommunication / Wireless Communication
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Electronics > Electronics Telecommunications
Reinforcement Learning-Based Cooperative Adaptive Cruise Control Under False Data Injection Attacks
Advantages: Maintains safe inter-vehicle distance even under cyberattacks and disturbances Uses reinforcement learning with Lyapunov-based control for stability Features a neural network-based estimator to estimate and mitigate FDI attacks in real time Validated through simulation and real-world experimental testing Summary: Connected and automated...
Published: 7/18/2025
|
Inventor(s):
Arman Sargolzaei
,
Parisa Ansari Bonab
Keywords(s):
Autonomous Vehicle
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
An Automated False Data Injection Attack Generator for Testing and Verification of Networked Control Systems
Advantages: Automated security testing for networked control systems (NCSs), eliminating the need for manual attack scenario creation Reinforcement learning (RL)-based approach efficiently generates attack scenarios to identify vulnerabilities Proven stability using Lyapunov-based analysis, ensuring attack generation with convergence guarantees Adaptable...
Published: 7/15/2025
|
Inventor(s):
Arman Sargolzaei
,
Farahnaz Javidi Niroumand
Keywords(s):
Artificial Intelligence
,
Autonomous Vehicle
,
Cybersecurity
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Data/AI > Cybersecurity - Data/AI
Universal and Efficient Detection of Adversarial Data through Nonuniform Impact on Network Layers
Advantages: Universal and real-time detection across image, video, and audio domains Lightweight and highly efficient, operating orders of magnitude faster than existing defenses Achieves 98% detection accuracy, significantly outperforming other methods Compatible with any Deep Neural Network (DNN) without requiring modifications Summary: Deep...
Published: 7/9/2025
|
Inventor(s):
Yasin Yilmaz
,
Furkan Mumcu
Keywords(s):
Artificial Intelligence
,
Cybersecurity
Category(s):
Technology Classifications > Data/AI > Cybersecurity - Data/AI
,
Technology Classifications > Computer Science > C/S Cybersecurity
Defending Against Wi-Fi Spoofing Attacks Leveraging Physical-Layer Features
Advantages: Identifies Wi-Fi spoofing attacks by leveraging Doppler Effect and Symbol Timing Offset (STO) variations Protects against location manipulation, ensuring accurate navigation even in high-risk environments Improves navigation accuracy by differentiating legitimate and spoofed signals Cost-effective implementation with off-the-shelf...
Published: 1/22/2025
|
Inventor(s):
Xiao Han
,
Yao Liu
,
Zhuo Lu
Keywords(s):
Autonomous Vehicle
,
Cybersecurity
,
Telecommunication / Wireless Communication
,
Transportation
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Computer Science > Algorithms
Resilient Multi-Robot System with Social Learning for Smart Factories
Advantages: This technology improves productivity, enabling seamless collaboration and optimized resource utilization in smart factories. The technology enhances the robustness and resilience of smart factories, maintaining objective performance under challenging circumstances. It strengthens security measures and cyber defense, ensuring the integrity...
Published: 5/12/2025
|
Inventor(s):
Zixiang Nie
,
Kwang-Cheng Chen
Keywords(s):
Artificial Intelligence
,
Cybersecurity
,
Industrial Applications
,
Robotics
Category(s):
Technology Classifications > Data/AI
,
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Engineering > Industrial Engineering
System and Method for Reducing a Threat Footprint of an Area-of-Interest
Advantages: The AI-enabled technology automates the risk assessment process and eliminates the need for manual techniques, which can be time-consuming and prone to human error. By leveraging AI, the technology is able to learn patterns and analyze complex data, uncovering new and previously unrecognized attack paths and strategies. The methodical...
Published: 2/6/2024
|
Inventor(s):
Ankit Shah
,
Soumyadeep Hore
,
Dinesh Sharma
Keywords(s):
Artificial Intelligence
,
Diagnostic Tools for Network Vulnerability Evaluations
,
Machine Learning
Category(s):
Technology Classifications > Software > Multimedia
,
Technology Classifications > Data/AI > Cybersecurity - Data/AI
,
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > C/S Cybersecurity
1
2
3