Keyword: Cybersecurity

Briefs: Semiconductors & ICs
This built-in security measure would prevent hackers from getting enough information about the circuit to reverse-engineer it.
Articles: Internet of Things
Tech Briefs asks industry experts about cybersecurity, the cloud, wireless devices, and securing a remote workforce.
Articles: Sensors/Data Acquisition
With PrintIC technology, sensors, actuators, energy supplies, and ICs can be printed on the same substrate, avoiding assembly cost.
Briefs: Data Acquisition
A higher-order network could be built that looks for subtle changes in data that point to suspicious activity.
Briefs: Electronics & Computers
The algorithm provides an extra layer of safety and security against hackers of electronic devices.
Application Briefs: Sensors/Data Acquisition
Smart sensors for hazardous areas monitor essential assets, such as motors and pumps.
Technology Leaders: Automotive
How can the automotive industry protect itself and its customers against digital attacks?
Facility Focus: Test & Measurement

The Georgia Tech Research Institute (GTRI) is the nonprofit applied research division of the Georgia Institute of Technology (Georgia Tech) in Atlanta, GA. Founded in 1934 as the Engineering...

Briefs: Electronics & Computers

Researchers have created technology that is 10 times more reliable than current methods of producing unclonable digital fingerprints that can be used to...

Q&A: Electronics & Computers

Aydin Aysu, Ph.D., is Assistant Professor in the Electrical & Computer Engineering Department at North Carolina State University in Raleigh, where he helped develop a technique for...

Articles: Lighting

Bluetooth technology is focused on short-range wireless connectivity. Most of us know the Bluetooth standard as the way we connect a phone to our car or a headset for hands-free operation. But...

Articles: Design

WCX™ World Congress Experience 2019 — presented by SAE International — is for forward-thinking engineers, executives, OEMs, suppliers, decision-makers, disruptors, and the entire spectrum of...

Briefs: Medical

Outsourcing machine learning is a rising trend in industry. Major tech firms have launched cloud platforms that conduct computation-heavy tasks, such as running data through a convolutional...

Briefs: Sensors/Data Acquisition
Faster Photons Could Make Data Totally Secure

Transferring data using light passed along fiber optic cables has become increasingly common over the past decades, but each pulse currently contains millions of photons. That means that in principle, a portion of these could be intercepted without detection. Secure data is already encrypted, but if...

Briefs: Sensors/Data Acquisition

Today, more than 8 billion devices are connected around the world, including medical devices, wearables, vehicles, and smart household and city technologies. Those devices are vulnerable to...

Articles: Sensors/Data Acquisition

This column presents technologies that have applications in commercial areas, possibly creating the products of tomorrow. To learn more about each technology, see the contact information provided for that...

Briefs: Software
Detecting Unauthorized Device Access by Comparing Multiple Independent Spatial-Time Data Sets from Other Devices

NASA’s Goddard Space Flight Center has developed a method to collect suspicious data and analyze them without extensive costs. A common challenge in complex computer systems is the identification of unauthorized use, which can be...

Briefs: Software
Integrated Genomic and Proteomic Information Security Protocol

The evolving nature of the Internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain...

Briefs: Information Technology
A Robust, Real-Time Collaboration Technology for Decision Support using Common Operating Picture (COP) Environments

StormCenter Communications, Inc. software takes advantage of cloud computing solutions to solve the growing need for real-time collaboration when accessing a Common Operating Picture (COP) from any device without having to give up...

Application Briefs: Software

GrammaTech, a software developer specializing in software assurance tools and cybersecurity technology, received an award from NASA to prototype a specification editing and discovery tool (SPEEDY) for C/C++...

Articles: Sensors/Data Acquisition
Power Fingerprinting Monitor: Protecting Critical Infrastructure from Cyber Attack Carlos R. Aguayo Gonzalez, Jeffrey H. Reed, and Steven Chen
Power Fingerprinting,...
Briefs: Information Technology

Windowed revocation is a technique for the revocation of the digital certificates that provide assurance of the auth- enticity and integrity of public encryption keys and associated...

Trending Stories

NASA Spinoff: Mechanical & Fluid Systems

Nanotechnology Repairs Engine Damage in Cars

Articles: Mechanical & Fluid Systems

Executive Roundtable: Cloud Software

Articles: Motion Control

Reduce Compressed Air Costs with Proper Air Cylinder Sizing

Articles: Motion Control

Pneumatics for Mechanical Motion

Articles: Electronics & Computers

Bipolar and Unipolar Drives for Stepper Motors: A Comparison

Articles: Mechanical & Fluid Systems

Basic Pneumatic Circuits