Keyword: Cybersecurity

Briefs: Communications
High-Speed Communication Vouchsafed by the Laws of Quantum Physics

Security in encrypted communication is a top priority because of our highly connected and mobile society’s increasing reliance on the internet. Engineers at Department of Electrical Engineering and Computer Science and the Research Laboratory of Electronics, MIT, have developed...

Articles: Data Acquisition
The biggest challenge in the provisioning process: ensuring that a device and the connection to the network and server are secure.
Articles: Manufacturing & Prototyping
Automation can crumble, even when only one cog is loose, says Brad Walters from Monnit.
Application Briefs: Connectivity
The grid’s growing size and complexity increases vulnerability to cyberattacks.
Briefs: Software
The technology is aimed at protecting physical targets, such as utilities and infrastructure.
Articles: Sensors/Data Acquisition
Four industry experts explore the future outlook for smart sensors and IIoT.
Briefs: Manufacturing & Prototyping
Modern PLCs now include IT-capable software and communications protocols, empowering users to easily access edge-sourced data and integrate it with the enterprise.
Technology Leaders: Connectivity
Sensors play a pivotal role in solving critical business challenges.
Briefs: Semiconductors & ICs
This built-in security measure would prevent hackers from getting enough information about the circuit to reverse-engineer it.
Articles: Mechanical & Fluid Systems
Tech Briefs asks industry experts about cybersecurity, the cloud, wireless devices, and securing a remote workforce.
Articles: Semiconductors & ICs
With PrintIC technology, sensors, actuators, energy supplies, and ICs can be printed on the same substrate, avoiding assembly cost.
Briefs: Electronics & Computers
The algorithm provides an extra layer of safety and security against hackers of electronic devices.
Briefs: Software
A higher-order network could be built that looks for subtle changes in data that point to suspicious activity.
Application Briefs: Test & Measurement
Smart sensors for hazardous areas monitor essential assets, such as motors and pumps.
Technology Leaders: Transportation
How can the automotive industry protect itself and its customers against digital attacks?
Facility Focus: Software

The Georgia Tech Research Institute (GTRI) is the nonprofit applied research division of the Georgia Institute of Technology (Georgia Tech) in Atlanta, GA. Founded in 1934 as the Engineering...

Briefs: Energy

Researchers have created technology that is 10 times more reliable than current methods of producing unclonable digital fingerprints that can be used to...

Q&A: Nanotechnology

Aydin Aysu, Ph.D., is Assistant Professor in the Electrical & Computer Engineering Department at North Carolina State University in Raleigh, where he helped develop a technique for...

Articles: Sensors/Data Acquisition

Bluetooth technology is focused on short-range wireless connectivity. Most of us know the Bluetooth standard as the way we connect a phone to our car or a headset for hands-free operation. But...

Articles: Propulsion

WCX™ World Congress Experience 2019 — presented by SAE International — is for forward-thinking engineers, executives, OEMs, suppliers, decision-makers, disruptors, and the entire spectrum of...

Briefs: Sensors/Data Acquisition

Outsourcing machine learning is a rising trend in industry. Major tech firms have launched cloud platforms that conduct computation-heavy tasks, such as running data through a convolutional...

Briefs: Photonics/Optics
Faster Photons Could Make Data Totally Secure

Transferring data using light passed along fiber optic cables has become increasingly common over the past decades, but each pulse currently contains millions of photons. That means that in principle, a portion of these could be intercepted without detection. Secure data is already encrypted, but if...

Briefs: RF & Microwave Electronics

Today, more than 8 billion devices are connected around the world, including medical devices, wearables, vehicles, and smart household and city technologies. Those devices are vulnerable to...

Articles: Test & Measurement

This column presents technologies that have applications in commercial areas, possibly creating the products of tomorrow. To learn more about each technology, see the contact information provided for that innovation.

Briefs: Data Acquisition
Detecting Unauthorized Device Access by Comparing Multiple Independent Spatial-Time Data Sets from Other Devices

NASA’s Goddard Space Flight Center has developed a method to collect suspicious data and analyze them without extensive costs. A common challenge in complex computer systems is the identification of unauthorized use, which can be...

Briefs: Software
Integrated Genomic and Proteomic Information Security Protocol

The evolving nature of the Internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain...

Briefs: Information Technology
A Robust, Real-Time Collaboration Technology for Decision Support using Common Operating Picture (COP) Environments

StormCenter Communications, Inc. software takes advantage of cloud computing solutions to solve the growing need for real-time collaboration when accessing a Common Operating Picture (COP) from any device without having to give up...

Application Briefs: Software

GrammaTech, a software developer specializing in software assurance tools and cybersecurity technology, received an award from NASA to prototype a specification editing and discovery tool (SPEEDY) for C/C++...

Articles: Sensors/Data Acquisition
Power Fingerprinting Monitor: Protecting Critical Infrastructure from Cyber Attack Carlos R. Aguayo Gonzalez, Jeffrey H. Reed, and Steven Chen
Power Fingerprinting,...