AI-based cyber threat detection and honeypots
AI-powered cyber threat detection honeypot technologies for ICS, CPS, and IoT that actively engage attackers and draw out more information about their tactics, providing organizations with the intelligence they need to better defend their systems.
Read more...Keywords:
Artificial Intelligence (AI), Energy, Cybersecurity, SoftwareCyber-resilient protection for energy grids
Logic for relays that can be used to significantly improve the cyber-resiliency of communication-assisted protection schemes.
Read more...Keywords:
Energy, Cybersecurity, Smart CitiesFully Homomorphic Encryption
This technology is an optimized version of the Ring-Learning-With-Errors (RLWE) Fully Homomorphic Encryption (FHE) system. This proprietary system maintains encrypted data privacy of communications while still allowing cloud operations to be carried out on the encrypted data, such as Secure Search and Spam-Filter Applications.
Read more...Keywords:
Companies, Cybersecurity, Electrical & Computer Engineering, SoftwareQuantum-Safe Encryption and Communication
Quantum-proof cybersecurity products and enabling technologies for the Quantum Internet. These technologies offer quantum-safe communication products ready for today's infrastructure, while building key components of the Quantum Internet, including Quantum Repeaters, Quantum Communication Protocols, and Quantum Network Simulators.
Read more...Keywords:
Communications, Companies, Computer Hardware, Cybersecurity, Electrical & Computer EngineeringBinPro: Tools and Techniques for Binary-Source Code Authentication
BinPro combines static analysis, graph matching and ML to detect and mitigate the threat of maliciously inserted backdoors by conducting binary source code audits.
Read more...