Filter Results
Related Organization
Researcher
- Hsuan-Hao Lu
- Joseph Lukens
- Nicholas Peters
- Joseph Chapman
- Muneer Alshowkan
- Anees Alnajjar
- Chad Steed
- Chris Tyler
- Jaydeep Karandikar
- Junghoon Chae
- Kyle Kelley
- Mingyan Li
- Travis Humble
- Aaron Myers
- Akash Jag Prasad
- Alex Miloshevsky
- Bogdan Dryzhakov
- Brian Williams
- Burak Ozpineci
- Calen Kimmell
- Corey Cooke
- Craig A Bridges
- Gui-Jia Su
- Isaac Sikkema
- Jian Chen
- Joseph Olatt
- Justin Cazares
- Kunal Mondal
- Liam Collins
- Mahim Mathur
- Mariam Kiran
- Marti Checa Nualart
- Matt Larson
- Nageswara Rao
- Neus Domingo Marimon
- Oscar Martinez
- Pablo Moriano Salazar
- Pedro Ribeiro
- Rama K Vasudevan
- Sam Hollifield
- Samudra Dasgupta
- Sheng Dai
- Stephen Jesse
- Steven Randolph
- Subho Mukherjee
- Vandana Rallabandi
- Vasiliy Morozov
- Vladimir Orlyanchik
- Zhili Feng

This generalized framework leverages recent technological advances in artificial intelligence, large scale distributed computing, a large repository of both overhead and ground based imagery databases to propose a GIScience based object detection and counting platform.

By exploiting the latest high-performance computing technique and advances in deep learning, we propose a state-of-the-art building mapping method based on convolutional neural network.

The invention relates to cyber security and more specifically to methods for detecting malicious traffic injection attacks on a vehicle's CAN bus.

In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server).

Our Scalable Mutual Information to Register Keypoints accurately computes multiple Normalized Mutual Information (NMI) coefficients to perform a two steps process to achieve coarse and fine registration.

The invention relates to network security and more specifically to Pass-the-Hash and Pass-the-Ticket credential theft attacks. Our invention is a way to centrally trigger the removal of all previously issued authentication credentials for a user on particular client comp

The invention relates to cyber security and more specifically to methods for detecting attacks. This invention supports detection of cyber attacks by generating a signal on the target machine that is disrupted by malware and intrusion events.

The invention relates to anomaly detection and more specifically to a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints.

This invention relates to networks and more specifically to infrastructure networks (road, rail, water, energy etc.) are critical to sustaining day-to-day commodity flows (food, power, fuel, machinery, etc.) of economic and national security concern.

The invention relates to cyber security and more specifically to systems, methods and software for securing a motor vehicle against malicious cyber-attacks. This invention addresses the recent vehicle attacks that have made the news, and it enforces geographic