Technology Name | Briefcase | Lead Researcher |
---|---|---|
Fast Online Deep Packet Inspection (DPI)
Network security requires the inspection of data packets for protocol non-compliance, viruses, spam, intrusions, or other predefined security-linked criteria.
Usually carried out by a network device ... More | Hay David | |
Our Innovation
System uses pictures, pseudo words, or artificial grammar to establish a secret between the user and the computer. By testing user’s knowledge of the shared secret, program accepts the user only after the chance of imposture ... More | Weinshall Daphna | |
Application
Social network technologies (SNT) and online Social Network Sites (SNS) are immensely popular and have become an integral part of people's everyday functioning and social lives worldwide, and especially among adolescents.
The ... More | Schwarz Baruch (Education) | |
Category
Computer science and Engineering
Keywords
Cyber Security, Legacy Systems
Current stage
TRL2 Technology Concept Formulated; Looking for industrial design partners.
Application
Cyber-attacks on industrial control systems and ... More | Gavish Matan | |
Application
Middleboxes play a major role in Software Defined Networks (SDN) as forwarding compressed packets is not enough to meet operators demands in terms of security, QoS/QoE provisioning and load balancing. In current systems, Deep Packet ... More | Hay David | |
Application
Competitive applications processes are widely implemented across academic and nonacademic organizations. Managing the application processes is highly sensitive for both sides.
Application processes like scholarships, tenure track ... More | Kramer Diego |