Filter Results
The technology provides a means for a nearly lossless modulation of a continuous variable (CV) optical field. This type of approach would be a viable approach to CV quantum secret sharing (QSS).
In a world which is becoming increasingly reliant upon data-driven
This generalized framework leverages recent technological advances in artificial intelligence, large scale distributed computing, a large repository of both overhead and ground based imagery databases to propose a GIScience based object detection and counting platform.
By exploiting the latest high-performance computing technique and advances in deep learning, we propose a state-of-the-art building mapping method based on convolutional neural network.
The invention relates to cyber security and more specifically to methods for detecting malicious traffic injection attacks on a vehicle's CAN bus.
In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server).
Our Scalable Mutual Information to Register Keypoints accurately computes multiple Normalized Mutual Information (NMI) coefficients to perform a two steps process to achieve coarse and fine registration.
The invention relates to network security and more specifically to Pass-the-Hash and Pass-the-Ticket credential theft attacks. Our invention is a way to centrally trigger the removal of all previously issued authentication credentials for a user on particular client comp
The invention relates to cyber security and more specifically to methods for detecting attacks. This invention supports detection of cyber attacks by generating a signal on the target machine that is disrupted by malware and intrusion events.
The invention relates to anomaly detection and more specifically to a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints.