Start a New Search
SHOWING 24 RESULTS
A team of researchers at Stony Brook University has developed a technology and prototype device based on quantum mechanics designed to prevent network hacking.
Safeguarding the Connected World | Protecting Systems | Stony Brook University - The State University of New YorkTwo Boston University computer scientists have developed a tool that could make it harder for hackers to find their way into networks where they don’t belong.
Safeguarding the Connected World | Protecting Systems | Boston UniversityUSC ISI researcher Wael Abd-Almageed and an international research team are building enhanced biometric security technologies to thwart would-be malefactors.
Safeguarding the Connected World | Protecting Systems | University of Southern CaliforniaA new software system being developed by cybersecurity researchers at the Georgia Institute of Technology will largely automate the process of assessing the extent of network or computer system attacks.
University Research | Safeguarding the Connected World | Protecting Systems | Georgia Institute of TechnologyUniversity of Arizona Associate Professor Roman Lysecky is pioneering technologies to protect implantable medical devices (IMDs) from hackers.
Safeguarding the Connected World | Protecting Systems | University Research | The University of ArizonaA team of MIT researchers has developed a new technique to defend multirobot systems such as delivery drones from hackers.
Safeguarding the Connected World | Protecting Systems | University Research | Massachusetts Institute of TechnologyResearchers at the Georgia Institute of Technology have developed a decoy robot designed to keep factories and other large facilities safe from hackers.
University Research | Safeguarding the Connected World | Protecting Systems | Georgia Institute of TechnologyUSC researchers have developed a powerful tool using pulses of light to translate and protect data.
University Research | Safeguarding the Connected World | Protecting Systems | University of Southern CaliforniaResearchers are studying how human voices are unique to help identify devices on electrical grid control networks, using their unique electronic “voices” to determine which signals are legitimate and which signals might be from attackers.
Protecting Systems | Safeguarding the Connected World | University Research | Georgia Institute of Technology“Analyst-driven solutions” rely on rules created by living experts and miss attacks that don’t match the rules. Machine-learning approaches rely on “anomaly detection,” which triggers false positives needing investigation by humans.
Protecting Individual Data | Protecting Systems | Safeguarding the Connected World | Massachusetts Institute of Technology