Technologies Found (5)
Array ( [cache_time] => 0 [counts_time] => 0 [query_time] => [category_counts_time] => 0 [total_time] => 0 )
Technology NameBriefcaseLead Researcher
Category Computer science and Engineering    Keywords Cyber Security, Legacy Systems Current stage TRL2 Technology Concept Formulated; Looking for industrial design partners. Application Cyber-attacks on industrial control systems and ...
More
Gavish Matan
Application Social network technologies (SNT) and online Social Network Sites (SNS) are immensely popular and have become an integral part of people's everyday functioning and social lives worldwide, and especially among adolescents. The ...
More
Schwarz Baruch (Education)
Searchable symmetric encryption with practical big-data performance and strong security Outsourcing data storage to remote servers offers invaluable benefits while introducing many concerns when dealing with sensitive data.  In the presence of ...
More
Segev Gil
Fast Online Deep Packet Inspection (DPI) Network security requires the inspection of data packets for protocol non-compliance, viruses, spam, intrusions, or other predefined security-linked criteria. Usually carried out by a network device ...
More
Hay David
Our Innovation System uses pictures, pseudo words, or artificial grammar to establish a secret between the user and the computer.  By testing user’s knowledge of the shared secret, program accepts the user only after the chance of imposture ...
More
Weinshall Daphna