CISPA researcher Sarath Sivaprasad, together with Hui-Po Wang and Mario Fritz from CISPA and other colleagues from HIPS, has ...
Doug Bonderud is an award-winning writer capable of bridging the gap between complex and conversational across technology, innovation and the human condition. By defining a set of normal user and ...
The civilian GPS signals are vulnerable to spoofing attacks in UAV system. A new on-board algorithm named MSSTP-OAD enables low-cost drones to detect counterfeit GPS positions in real time using only ...
Anomaly detection is one of the more difficult and underserved operational areas in the asset-servicing sector of financial institutions. Broadly speaking, a true anomaly is one that deviates from the ...
Anomaly detection can be powerful in spotting cyber incidents, but experts say CISOs should balance traditional signature-based detection with more bespoke methods that can identify malicious activity ...
Anju Kambadur, Bloomberg’s Head of AI Engineering, helped organize today’s 2nd KDD Workshop on Anomaly Detection in Finance, which is taking place during the 25th ACM SIGKDD Conference on Knowledge ...
Environmental Technology Co., Ltd. applied for a patent titled "A Machine Learning Method and System" in August 2025, with publication number CN120663336A. This patent focuses on the field of data ...
In today's threat landscape, early threat detection is just as critical as response and recovery; spotting malicious activity ...
Customs and Border Protection is continuing to work on developing algorithmic systems to conduct automated inspections of vehicles at the border, with the providers of these systems still in the ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results