# of Displayed Technologies: 2 / 2

Applied Category Filter (Click To Remove): Security/Cybersecurity


Categories

A Cybersecurity Vulnerability Prioritization System Including Identifying "Super-Critical" Vulnerabilities, predicting "Dark Host" Vulnerabilities, and Addressing Economic Costs
TS-066063 — Our cybersecurity vulnerability maintenance system stands as a pillar of modern security strategy, transforming reactive security measures into a preemptive defense mechanism. This integration of technology and economics ensures that your most critical assets are protected efficiently and effectively, making it an invaluable tool for any organization serious about security.
In today’s hyper-connected world, the escalation in cyber threats poses significant risks to organizational data and systems. Vulnerabilities within network infrastructures can lead to massive security breaches, as demonstrated by incidents like the 2017 Equifax hack. Effective vulnerability…
  • College: College of Engineering (COE)
  • Inventors: Allen, Theodore "Ted"; Liu, Enhao
  • Licensing Officer: Giles, David

Secure Your Digital Fortress: Revolutionizing Cybersecurity with Next-Gen PUF Technology
TS-065412 — The Need: In contemporary cybersecurity landscapes, the conventional methods of employing Physically Unclonable Functions (PUFs) necessitate maintaining a secure challenge-response database. However, this practice poses significant security risks as access to this database could lead to the comprom…
  • College: College of Arts & Sciences
  • Inventors: Gauthier, Daniel
  • Licensing Officer: Dahlman, Jason "Jay"

Loading icon