Filter Results
Researcher
- Corson Cramer
- Steve Bullock
- Brian Post
- Chad Steed
- Erdem Asa
- Greg Larsen
- Jim Tobin
- Junghoon Chae
- Mike Zach
- Nicholas Peters
- Omer Onar
- Sam Hollifield
- Travis Humble
- Trevor Aguirre
- Vivek Sujan
- Vlastimil Kunc
- Aaron Myers
- Adam Stevens
- Ali Passian
- Andrew F May
- Ben Garrison
- Brad Johnson
- Brian Weber
- Brian Williams
- Bruce Hannan
- Chris Tyler
- Dan Coughlin
- David J Mitchell
- David Olvera Trejo
- Dustin Gilmer
- Harper Jordan
- Hsin Wang
- Hsuan-Hao Lu
- Isabelle Snyder
- J.R. R Matheson
- James Klett
- Jason Jarnagin
- Joel Asiamah
- Joel Dawson
- Jordan Wright
- Joseph Lukens
- Josh Crabtree
- Justin Cazares
- Justin Griswold
- Justin West
- Kevin Spakes
- Kim Sitzlar
- Lilian V Swann
- Loren L Funk
- Louise G Evans
- Luke Chapman
- Luke Koch
- Mark Provo II
- Mary A Adkisson
- Matt Larson
- Mengdawn Cheng
- Mingyan Li
- Muneer Alshowkan
- Nance Ericson
- Nedim Cinbiz
- Pablo Moriano Salazar
- Padhraic L Mulligan
- Paula Cable-Dunlap
- Polad Shikhaliev
- Raymond Borges Hink
- Richard L. Reed
- Robert Stewart
- Rob Root
- Ryan Kerekes
- Sally Ghanem
- Samudra Dasgupta
- Scott Smith
- Srikanth Yoginath
- Steven Guzorek
- Sudarsanam Babu
- Sunil Subedi
- Sydney Murray III
- Theodore Visscher
- T Oesch
- Varisara Tansakul
- Vasilis Tzoganis
- Vladislav N Sedov
- Yacouba Diawara
- Yaosuo Xue
- Yonghao Gui
- Yun Liu

The disclosure relates to cyber security systems and more specifically to the use of game theory. Information security analysis can be performed using game theory implemented in dynamic simulations of Agent-Based Models (ABMs).

Almost every major computer network is defended by signature-based Intrusion Detection Systems (IDSs) that are designed to alert whenever a pattern that indicates a known exploit is detected.

The invention relates to RFID tags and more specifically to a protocol that provides both location and device authentication.

The invention relates to remote monitoring and more specifically to a system for acquiring sensor data on a global scale. This communication device allows a user to remotely activate a system and obtain status updates regarding that system.

The invention relates to remote monitoring and more specifically to a system for acquiring sensor data on a global scale.

With this technology, we propose a systematic method for constructing a potentially very large number of complementary anomaly detectors from a single probabilistic model of the data.


In Scenario Driven Data Modeling a Semantic Model is created.

In current, graph based reliability models, modeling the effects of stimulus to the system is efficient, but representing component failure beyond simultaneous double-point failure has been computationally difficult.

The Functional Randomness in Security Tokens method and system improves the security of two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data.