• Cyber Security
Displaying 1-10 of 20 documents Export Results

Load Monitoring for Cyber Event Detection Disclosure Number 201202856 Technology Summary The invention disclosure relates to cyber security systems for computing devices and more specifically to a load monitoring system to identify suspect activities on such devices. A nonintrusive load monitoring (NILM) device is connected to the computing device and cap…

: Fact Cards

Cyberspace Security Econometrics Systems Enhancements for Balancing (CSES-E) Cyberspace Security Econometrics Systems Enhancements for Balancing (CSES-E) Disclosure Number 201202949 Technology Summary The invention relates to a cyber-security system and more specifically to a tool to quantify improvements to counter vulnerabilities. The Cyberspace Securi…

: Fact Cards
: Cyber Security, Assembly, system...

Cyber Security Econometrics System (CSES) for Assessing/Ranking Threats Cyber Security Econometrics System (CSES) for Assessing/Ranking Threats Disclosure Number 201002514 Technology Summary Here, we discuss how CSES is used to rank candidate threats (i.e., semantically enhanced structural anomalies) for the benefit of a human operator assessment: (a) r…

: Fact Cards
: Cyber Security, Assembly, system...

Environmental Vehicle Authentication Disclosure Number 201503604 Technology Summary The invention relates to cyber security and more specifically to systems, methods and software for securing a motor vehicle against malicious cyber-attacks. This invention addresses the recent vehicle attacks that have made the news, and it enforces geographic authentication on communicating devices. Thi…

A Frequency Data Recorder with Multiple Generator Tracking Disclosure Number 201202836 Technology Summary The invention relates to real-time monitoring of electrical distribution networks and more specifically to a sensor for performing real-time measurements of frequencies in an electric power system at a point-of-load. The sensor has the characteristics…

: Fact Cards

Information Security Analysis Using Game Theory and Simulation Disclosure Number 201202961 Technology Summary The disclosure relates to cyber security systems and more specifically to the use of game theory. Information security analysis can be performed using game theory implemented in dynamic …

Situ: Real-time Situational Understanding and Discovery of Cyber Attacks Situ: Real-time Situational Understanding and Discovery of Cyber Attacks Copyright Document Number CR14-00022 Copyright Summary Rapidly discovering novel and sophisticated cyber attacks and providing situation awareness to analysts are unsolved problems in cyber security. Researchers at ORN…

Hyperion Copyright Document Number 90000006 Copyright Summary From a cyber-security perspective, it would be advantageous to understand and analyze the functionality of binary executables of newly developed software or acquired software prior to installing and running these programs on a computer. This is very difficult to do. The Hyperion system was designed t…

: Fact Cards

Real-time Situational Understanding and Discovery of Cyber Attacks Disclosure Number 201303053 Technology Summary The invention relates to cyber security and more specifically to a tool that addresses the challenges of timely discovery and understanding of novel and sophisticated cyber attacks through the software integration of anomaly detection, mali…

Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure Michael Duren Hal Aldridge Sypris Electronics, LLC 10901 N. McKinley Drive Tampa, Florida, 33612 001-813-972-6000 mike.duren@sypris.com hal.a…

Results: 12Next
Search Home Help About InSpire