Start a New Search
SHOWING 24 RESULTS
USC ISI researcher Wael Abd-Almageed and an international research team are building enhanced biometric security technologies to thwart would-be malefactors.
Safeguarding the Connected World | Protecting Systems | University of Southern CaliforniaTwo Boston University computer scientists have developed a tool that could make it harder for hackers to find their way into networks where they don’t belong.
Safeguarding the Connected World | Protecting Systems | Boston UniversityA team of researchers at Stony Brook University has developed a technology and prototype device based on quantum mechanics designed to prevent network hacking.
Safeguarding the Connected World | Protecting Systems | Stony Brook University - The State University of New YorkResearchers at the Georgia Institute of Technology have developed a decoy robot designed to keep factories and other large facilities safe from hackers.
University Research | Safeguarding the Connected World | Protecting Systems | Georgia Institute of TechnologyUSC researchers have developed a powerful tool using pulses of light to translate and protect data.
University Research | Safeguarding the Connected World | Protecting Systems | University of Southern CaliforniaA new software system being developed by cybersecurity researchers at the Georgia Institute of Technology will largely automate the process of assessing the extent of network or computer system attacks.
University Research | Safeguarding the Connected World | Protecting Systems | Georgia Institute of TechnologyA team of MIT researchers has developed a new technique to defend multirobot systems such as delivery drones from hackers.
Safeguarding the Connected World | Protecting Systems | University Research | Massachusetts Institute of TechnologyUniversity of Arizona Associate Professor Roman Lysecky is pioneering technologies to protect implantable medical devices (IMDs) from hackers.
Safeguarding the Connected World | Protecting Systems | University Research | The University of Arizona“Analyst-driven solutions” rely on rules created by living experts and miss attacks that don’t match the rules. Machine-learning approaches rely on “anomaly detection,” which triggers false positives needing investigation by humans.
Protecting Individual Data | Protecting Systems | Safeguarding the Connected World | Massachusetts Institute of TechnologyResearchers are studying how human voices are unique to help identify devices on electrical grid control networks, using their unique electronic “voices” to determine which signals are legitimate and which signals might be from attackers.
Protecting Systems | Safeguarding the Connected World | University Research | Georgia Institute of Technology