Skip to main content

IT and Communications

41 - 50 of 77 Results
default image

The technology provides a means for a nearly lossless modulation of a continuous variable (CV) optical field. This type of approach would be a viable approach to CV quantum secret sharing (QSS).

default image

In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server).

default image

Our Scalable Mutual Information to Register Keypoints accurately computes multiple Normalized Mutual Information (NMI) coefficients to perform a two steps process to achieve coarse and fine registration.

default image

The invention relates to cyber security and more specifically to methods for detecting attacks. This invention supports detection of cyber attacks by generating a signal on the target machine that is disrupted by malware and intrusion events.