Electrical, Electronics, and Avionics

Cybersecurity

Stories

116
1903
0
0
30
Briefs: Information Technology
A research team led by Rice University’s Edward Knightly has uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street. Read on to learn more.
Feature Image
Briefs: Information Technology
The team, led by Data Scientist Sumit Purohit, is trying to create a tool that sorts and prioritizes cyber threats on the fly. The idea is to give grid operators a clear blueprint to identify and address the biggest threats first and to protect against them without a mad scramble for resources down the road.
Feature Image
Briefs: Electronics & Computers
Equipment and test system designers need Ethernet devices that outperform consumer-grade components, while remaining easy to use.
Feature Image
Articles: Electronics & Computers
Some of the hardest to detect cyber-attacks are wireless, including man-in-the-middle attacks and rogue access points.
Feature Image
Articles: Electronics & Computers
Billions of connected devices have been adopted within our personal eco-systems, rising two-fold during the pandemic. This means there are even more devices in our lives which can be attacked.
Feature Image
Facility Focus: Design
From artificial intelligence, cybersecurity, and manufacturing to health sciences, robotics, and more, the Virginia Tech College of Engineering offers an advanced engineering curriculum.
Feature Image
Briefs: Communications
High-Speed Communication Vouchsafed by the Laws of Quantum Physics
Security in encrypted communication is a top priority because of our highly connected and mobile society’s increasing reliance on the internet. Engineers at Department of Electrical Engineering and Computer Science and the Research Laboratory of Electronics, MIT, have developed a...
Articles: Manufacturing & Prototyping
One major concern for manufacturers is how safe and secure it is to open the OT network’s doors to the internet.
Feature Image
Briefs: Connectivity
The system guarantees the security of virtual machines in the cloud.
Feature Image
Articles: Sensors/Data Acquisition
The biggest challenge in the provisioning process: ensuring that a device and the connection to the network and server are secure.
Feature Image
Articles: Test & Measurement
Automation can crumble, even when only one cog is loose, says Brad Walters from Monnit.
Feature Image
Application Briefs: Sensors/Data Acquisition
The grid’s growing size and complexity increases vulnerability to cyberattacks.
Feature Image
Briefs: Software
The technology is aimed at protecting physical targets, such as utilities and infrastructure.
Feature Image
Articles: Manufacturing & Prototyping
Four industry experts explore the future outlook for smart sensors and IIoT.
Feature Image
Briefs: Sensors/Data Acquisition
Modern PLCs now include IT-capable software and communications protocols, empowering users to easily access edge-sourced data and integrate it with the enterprise.
Feature Image
Technology Leaders: Mechanical & Fluid Systems
Sensors play a pivotal role in solving critical business challenges.
Feature Image
Briefs: Electronics & Computers
This built-in security measure would prevent hackers from getting enough information about the circuit to reverse-engineer it.
Feature Image
Articles: Sensors/Data Acquisition
Tech Briefs asks industry experts about cybersecurity, the cloud, wireless devices, and securing a remote workforce.
Feature Image
Articles: Sensors/Data Acquisition
With PrintIC technology, sensors, actuators, energy supplies, and ICs can be printed on the same substrate, avoiding assembly cost.
Feature Image
Briefs: Electronics & Computers
Algorithm Defends Against Side-Channel Attacks on Hardware
The algorithm provides an extra layer of safety and security against hackers of electronic devices.
Briefs: Data Acquisition
Algorithm Protects Networks by Detecting Adversarial Actions
A higher-order network could be built that looks for subtle changes in data that point to suspicious activity.
Application Briefs: Energy
Smart sensors for hazardous areas monitor essential assets, such as motors and pumps.
Feature Image
Technology Leaders: Sensors/Data Acquisition
How can the automotive industry protect itself and its customers against digital attacks?
Feature Image
Facility Focus: Electronics & Computers
The Georgia Tech Research Institute (GTRI) is the nonprofit applied research division of the Georgia Institute of Technology (Georgia Tech) in Atlanta, GA. Founded in 1934 as the Engineering...
Feature Image
Briefs: Semiconductors & ICs
Researchers have created technology that is 10 times more reliable than current methods of producing unclonable digital fingerprints that can be used to...
Feature Image
Q&A: Electronics & Computers
Aydin Aysu, Ph.D., is Assistant Professor in the Electrical & Computer Engineering Department at North Carolina State University in Raleigh, where he helped develop a technique for...
Feature Image
Articles: Lighting
Bluetooth technology is focused on short-range wireless connectivity. Most of us know the Bluetooth standard as the way we connect a phone to our car or a headset for hands-free operation. But Bluetooth...
Feature Image
Articles: Sensors/Data Acquisition
WCX™ World Congress Experience 2019 — presented by SAE International — is for forward-thinking engineers, executives, OEMs, suppliers, decision-makers, disruptors, and the entire spectrum of...
Feature Image
Briefs: Software
Outsourcing machine learning is a rising trend in industry. Major tech firms have launched cloud platforms that conduct computation-heavy tasks, such as running data through a convolutional...
Feature Image

Videos