# of Displayed Technologies: 6 / 6

Applied Category Filter (Click To Remove): Security/Cybersecurity


Categories

A Cybersecurity Vulnerability Prioritization System Including Identifying "Super-Critical" Vulnerabilities, predicting "Dark Host" Vulnerabilities, and Addressing Economic Costs
TS-066063 — Our cybersecurity vulnerability maintenance system stands as a pillar of modern security strategy, transforming reactive security measures into a preemptive defense mechanism. This integration of technology and economics ensures that your most critical assets are protected efficiently and effectively, making it an invaluable tool for any organization serious about security.
In today’s hyper-connected world, the escalation in cyber threats poses significant risks to organizational data and systems. Vulnerabilities within network infrastructures can lead to massive security breaches, as demonstrated by incidents like the 2017 Equifax hack. Effective vulnerability…
  • College: College of Engineering (COE)
  • Inventors: Allen, Theodore; Liu, Enhao
  • Licensing Officer: Zinn, Ryan

Counterattacking Smart Contract Exploits: An Active Defense Approach
TS-063027 — The Need Smart contracts have revolutionized the way transactions are conducted, but their unique nature makes them susceptible to exploitation. Despite extensive efforts in vulnerability identification, exploitable vulnerabilities persist, resulting in substantial financial losses. To mitigate thi…
  • College: College of Engineering (COE)
  • Inventors: Lin, Zhiqiang; Morales, Marcelo
  • Licensing Officer: Mess, David

Learning Optimal Empirical Reward iNtelligence (LOERN) with Cyber Maintenance Applications
TS-040341 — A software solution designed to optimize cyber security decision making and reduce maintenance costs.
As the world becomes more and more connected, our systems become more and more vulnerable. If cyber security can become more automated, risk-based decisions can be made more quickly and rationally. Organizations can then leverage this decision-making to improve their security without increasing co…
  • College: College of Engineering (COE)
  • Inventors: Allen, Theodore; Hou, Chengjun
  • Licensing Officer: Zinn, Ryan

DIAMOND
TS-037930 — Data-Driven Inspection, Alerts, Maintenance, Observable Network Decision Control System with Cyber Action Taker to Address Less Inspected Hosts Including Cell Phones
Cyber security is an important facet of many major corporations and government entities. The implementation of effective cyber security protocols is an arduous process because the most targeted individuals, C-suite and boardroom level personnel, understand the protocols the least. A lack of adhere…
  • College: College of Engineering (COE)
  • Inventors: Allen, Theodore; RoyChowdhury, Sayak
  • Licensing Officer: Zinn, Ryan

Turf Whisperer: Location Selective Data Delivery via Low-Power Acoustic Transmissions
TS-037839 — A way to use audio systems to send information to select locations and people, without the public hearing it.
With the advent of digital communications platforms such as mobile devices, information is able is to be disseminated almost instantly, to anywhere in the world. However, some aspects of modern infrastructure have not caught up to the information age, with facilities such as supermarkets and airpo…
  • College: College of Engineering (COE)
  • Inventors: Koksal, C. Emre; Indukuri, Harihara Varma
  • Licensing Officer: Mess, David

Stretchable and Flexible E-Fiber Wire Antennas
TS-014971 — A new process to fabricate stretchable and flexible wire antennas with conductive fibers (E-fibers)
Current processes to manufacture flexible, mechanically durable antennas on E-fibers yield non-stretchable prototypes and lack fine print details. The geometric accuracy of printed antennas is less than 1 mm, and the devices are prone to failure due to fatigue and wear from deformation. The antenn…
  • College: College of Engineering (COE)
  • Inventors: Volakis, John; Kiourti, Asimina
  • Licensing Officer: Randhawa, Davinder

Loading icon