• Information Security Management
Displaying 1-10 of 406 documents Export Results

Information Security Analysis Using Game Theory and Simulation Disclosure Number 201202961 Technology Summary The disclosure relates to cyber security systems and more specifically to the use of game theory. Information security analysis can be performed using game theory implemented in dynamic …

Environmental Vehicle Authentication Disclosure Number 201503604 Technology Summary The invention relates to cyber security and more specifically to systems, methods and software for securing a motor vehicle against malicious cyber-attacks. This invention addresses the recent vehicle attacks that have made the news, and it enforces geographic authentication on communicating devices. Thi…

Two-Factor Authentication Provisioning to Secure Access to Applications Cloud Two-Factor Authentication Provisioning to Secure Access to Applications Cloud Disclosure Number 201102726 Technology Summary In today s world of networked application and their migration to cloud computing, service provisioning as a set of actions to prepare appropriate systems…

Quantifying Security Threats and Their Impact Anis Ben Aissa Faculty of Sciences of Tunisia University of Tunis Tunis, Tunisia Anis_enit@yahoo.fr Robert K. Abercrombie, Frederick T. Sheldon Oak Ridge National Laboratory Oak Ridge, TN 37831 USA +1-865-241-6537/576-1339 abercrombier@ornl.gov sheldonft@ornl.gov Ali Mili College of Computing Sciences New Jersey Institut…

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop ISBN 978-1-4503-1687-3 Cover Artwork Copyright F. T. Sheldon Eight Annual Cyber Security and Information Intelligence Research Workshop January 8 10, 2013 Federal Cyber Security R&D Program Thrusts Frederick Sheldon, Annarita Giani, Axel Krings and Robe…

Load Monitoring for Cyber Event Detection Disclosure Number 201202856 Technology Summary The invention disclosure relates to cyber security systems for computing devices and more specifically to a load monitoring system to identify suspect activities on such devices. A nonintrusive load monitoring (NILM) device is connected to the computing device and cap…

: Fact Cards

Cyberspace Security Econometrics Systems Enhancements for Balancing (CSES-E) Cyberspace Security Econometrics Systems Enhancements for Balancing (CSES-E) Disclosure Number 201202949 Technology Summary The invention relates to a cyber-security system and more specifically to a tool to quantify improvements to counter vulnerabilities. The Cyberspace Securi…

: Fact Cards
: Cyber Security, Assembly, system...

Design and initial deployment of the wireless local area networking infrastructure at Sandia National Laboratories. SANDIA REPORT SAND2006-6616 Unlimited Release Printed November 2006 Design and Initial Deployment of the Wireless Local Area Networking Infrastructure at Sandia National Laboratories Marc M. Miller, Dallas J. Wiener, Edward L. Witzke, Joh…

Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA) Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA) Robert K. Abercrombie Frederick T. Sheldon Oak Ridge National Laboratory P. O. Box 2008 Oak Ridge, TN 37831-6085 +001-865-241-6537/576-1339 abercrombier@ornl.gov sheldonft@ornl.gov Katie…

Cyber Security Econometrics System (CSES) for Assessing/Ranking Threats Cyber Security Econometrics System (CSES) for Assessing/Ranking Threats Disclosure Number 201002514 Technology Summary Here, we discuss how CSES is used to rank candidate threats (i.e., semantically enhanced structural anomalies) for the benefit of a human operator assessment: (a) r…

: Fact Cards
: Cyber Security, Assembly, system...
Results: 12345678910... Next
Search Home Help About InSpire