Search Results - technology+classifications+%3e+computer+science+%3e+c%2fs+cybersecurity

19 Results Sort By:
Resilient Multi-Robot System with Social Learning for Smart Factories
Advantages: This technology improves productivity, enabling seamless collaboration and optimized resource utilization in smart factories. The technology enhances the robustness and resilience of smart factories, maintaining objective performance under challenging circumstances. It strengthens security measures and cyber defense, ensuring the integrity...
Published: 9/3/2024   |   Inventor(s): Zixiang Nie, Kwang-Cheng Chen
Keywords(s): Artificial Intelligence, Cybersecurity, Industrial Applications, Robotics
Category(s): Technology Classifications > Data/AI, Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Engineering > Industrial Engineering
System and Method for Reducing a Threat Footprint of an Area-of-Interest
Advantages: The AI-enabled technology automates the risk assessment process and eliminates the need for manual techniques, which can be time-consuming and prone to human error. By leveraging AI, the technology is able to learn patterns and analyze complex data, uncovering new and previously unrecognized attack paths and strategies. The methodical...
Published: 2/6/2024   |   Inventor(s): Ankit Shah, Soumyadeep Hore, Dinesh Sharma
Keywords(s): Artificial Intelligence, Diagnostic Tools for Network Vulnerability Evaluations, Machine Learning
Category(s): Technology Classifications > Software > Multimedia, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity
Graphene Based Scheme for IoT and Forensic Applications
Competitive Advantages This Graphene based scheme is profoundly lightweight but offers strong features, which make it ideal for resource-restricted IoT applications. This scheme provides a solution for application where it requires the minimal expense and wide organization of sensors, like in smart cities, and combat zones, wherein forward-security...
Published: 9/3/2024   |   Inventor(s): Attila Yavuz
Keywords(s): Health Tech, Internet of Things / IoT, Medical Devices
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > C/S Sensors, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Medical > Cybersecurity, Technology Classifications > Medical > Medical Devices
System and Method for Cryptographic Forensic Audits on Lightweight IoT and Digital Archives
­­­Competitive Advantages: Our solution solves the problem of bottleneck by converting it into logarithmic seed storage overhead, which helps in offering the service to different categories of end devices In terms of cryptographic audit data and time-combined performance, the suggested OPAS schemes achieve outstanding performance...
Published: 9/3/2024   |   Inventor(s): Attila Yavuz, Saif Nouma
Keywords(s): Internet of Things / IoT, Medical Devices, Medical Imaging, Sensor
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Medical > Medical Sensors
CYBERSECURITY: Reliability Of A Computer Network
Competitive Advantages This analytical model is developed using real data of the National Vulnerability Database, NVD. This analytical model is made up of data from Microsoft, Linux, and Apple computer operating systems that represents 99.34% of the market around the globe. This analytical model can identify the minimum number of steps, n, that...
Published: 7/12/2023   |   Inventor(s): Chris Tsokos, Freeh Alenezi
Keywords(s): Computers Software and Information Technology, Cryptography and Intrusion Detection, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity
Deploying Neural-Trojan-Resistant Convolutional Neural Networks for Self-Driving Vehicles
­Competitive Advantages This method can amplify Trojan’s malicious impact by making it more easily detectable so that system can provide rapid response and mitigation against the attacks This technology can prevent the spread of the attack to other connected systems and defend against attacks initiated through fake update requests The...
Published: 2/6/2024   |   Inventor(s): Robert Karam, Brooks Olney
Keywords(s): Autonomous Vehicle, Cryptography and Intrusion Detection, Cybersecurity, Hardware Based Security, Machine Learning
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Engineering > Autonomous Vehicle, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity
Wireless Efficient Privacy, Authentication and Resiliency Technologies for Forensic and Sensitive Data
Competitive Advantages Shows a near-optimal performance at the logger (e.g., resource limited IoT device). Achieves post-quantum security. FHE-based alternatives are ideal for single-server setting without a collusion-risk. Develop strategies to achieve scalable signature verification for constructions. Summary This invention creates a new...
Published: 1/12/2023   |   Inventor(s): Attila Yavuz
Keywords(s): Cryptography and Intrusion Detection, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations, Telecommunication and Wireless Communication
Category(s): Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Electronics, Technology Classifications > Computer Science > C/S Cybersecurity
A System And Method For Lightweight Post-Quantum Authentication For The Internet Of Things And Systems
Competitive Advantages Less memory is required for the signature and communication, as it does not require the signer to store and send the public key. Meets the NIST post-quantum cryptography standard with faster and memory-efficient processing on the signer’s side. The algorithm does not require any repetition of the signing algorithm....
Published: 7/12/2023   |   Inventor(s): Rouzbeh Behnia, Attila Yavuz
Keywords(s): Authentication and Biometric Systems, Cryptography and Intrusion Detection, Internet of Things / IoT
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > C/S Sensors, Technology Classifications > Computer Science, Technology Classifications > Data/AI, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Medical > Medical Devices, Technology Classifications > Medical > Medical Sensors
Safe Controller: Efficient and Transparent CFI for RTL Design
Competitive Advantages Provides an efficient, transparent, and scalable approach to enforcing CFG of RTL controller. Can protect RTL design from contemporary and future control-flow attacks. Additional securely stored monitor works as an additional RTL module enforcing controller to follow CFG with overhead on communication. Summary USF researchers...
Published: 7/13/2023   |   Inventor(s): Srinivas Katkoori, Sheikh Ariful Islam
Keywords(s): Electronic Design Automation (EDA)
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > Hardware, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics, Technology Classifications > Engineering > Electrical Engineering
Deep Cyber Vulnerability Mitigator
Competitive Advantages Organization-specific context-based threat detection and mitigation. Continuous refinement of defender’s policies according to the threats identified. Assignment of security personnel according to the threat level of vulnerability and skills of the individual. Summary Cyberthreats are increasing daily with continuously...
Published: 9/12/2024   |   Inventor(s): Ankit Shah
Keywords(s): Computer Science, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Algorithms
1 2