Security

Latest Innovations

Live Computer Capture and Triage Tool (CCTT)

 

 

A system for executing a cyber investigation by a non-expert user, including a computer having a processor, a memory, and a display; a computer-readable...

A Symmetric Digital Chaotic Cryptosystem: The Alpcan Chaotic Cipher (ACC)

 

 

A symmetric cryptosystem uses cascaded chaotic maps to encrypt plaintext and decrypt ciphertext. Received plaintext is encrypted using the cascaded chaotic...

QuickStop –The Quickest Misinformation Detection Algorithm

Dr. Xiaohan Kang from the University of IL, in collaboration with inventors from Arizona State University and Carnege Mellon University, has developed QuickStop, an...

ωLog: Transparent Interpretation and Integration of Layered Software Architecture Event Streams

Prof. Bates at the University of Illinois has developed ωLog, a software application which collects application context through analysis of event logs, and integrates that...

Improved Modeling for the Economic Impact of Shipping Port Operations and Disruptions 

Dr. Gabriel Weaver and collaborators have developed a cyber/physical disruption model for shipping port operations that allows port authorities to anticipate, prepare and...

Improved Modeling for the Economic Impact of Shipping Port Operations and Disruptions 

Dr. Gabriel Weaver and Dr. Lavanya Marla have developed a cyber/physical disruption model for shipping port operations that allows port authorities to anticipate, prepare...

Improved Ransomware Protection with the Ransomware-aware Solid-State Drive

Dr. Huang has developed RSSD, a ransomware-aware solid-state drive. This solid-state drive has been meticulously designed and tested to withstand 3 new types of ransomware...

Helping Stakeholders Assess Risks in Changing Environments in the Electrical Power Grid Industr

 

Dr. Gabriel Weaver, Dr. Yardley, and Dr. Emmerich have developed a cyber and physical disruption model for electrical power grid operations that allows stakeholders in the...