UTSA Professor wins grant to protect wearable tech and mobile devices

Assistant Professor Dr. Murtuza Jadliwala of the Computer Science (CS) Department has been awarded the National Science Foundation’s (NSF) Faculty Early Career Development or CAREER grant. This most prestigious $499,512, 5-year award for early career faculty funds Jadliwala’s research on…

ACM SIGWEB to sponsor and organize leading international web conference series

ACM, the Association for Computing Machinery, and the International World Wide Web Conference Committee (IW3C2) today announced an agreement to transfer full legal and financial sponsorship of The Web Conference series of conferences from IW3C2 to ACM’s Special Interest Group…

New silicon chip ‘fingerprint’ for stronger hardware security at low cost

Novel PUF silicon fingerprinting technique achieves long-term stability using machine learning, eliminates conventional attack points via physical hiding, and reduces cost of chip design and testing drastically

New silicon chip ‘fingerprint’ for stronger hardware security at low cost

Novel PUF silicon fingerprinting technique achieves long-term stability using machine learning, eliminates conventional attack points via physical hiding, and reduces cost of chip design and testing drastically

Future quantum computers may pose threat to today’s most-secure communications

Quantum computers that are exponentially faster than any of our current classical computers and are capable of code-breaking applications could be available in 12 to 15 years, posing major risks to the security of current communications systems, according to a…

Army researchers measure reliability, confidence for next-gen AI

ADELPHI, Md. (March 30, 2020) – A team of Army and industry researchers have developed a metric for neural networks–computing systems modeled loosely after the human brain–that could assess the reliability and confidence of the next generation of artificial intelligence…

Sandia initiatives to protect US energy grid and nuclear weapons systems

ALBUQUERQUE, N.M. — To deter attempts to disable U.S. electrical utilities and to defend U.S. nuclear weapon systems from evolving technological threats, Sandia National Laboratories has begun two multiyear initiatives to strengthen U.S. responses. Power Grid One is focused on…

Cross-technology communication in the Internet of Things significantly simplified

Whether networked vehicles that warn of traffic jams in real time, household appliances that can be operated remotely, “wearables” that monitor physical activity, or industrial plants that detect possible production errors in time and notify technical support, the number of…

Cross-technology communication in the Internet of Things significantly simplified

Whether networked vehicles that warn of traffic jams in real time, household appliances that can be operated remotely, “wearables” that monitor physical activity, or industrial plants that detect possible production errors in time and notify technical support, the number of…

IT startup develops novel blockchain-based approach for secure linking of databases

In order to bring this Software, called “ChainifyDB” to market, the Federal Ministry of Education and Research is supporting the Saarbrücken researchers’ start-up, which is currently being founded, with 840,000 euros. “Our software resembles keyhole surgery. With a barely noticeable…

IT startup develops novel blockchain-based approach for secure linking of databases

In order to bring this Software, called “ChainifyDB” to market, the Federal Ministry of Education and Research is supporting the Saarbrücken researchers’ start-up, which is currently being founded, with 840,000 euros. “Our software resembles keyhole surgery. With a barely noticeable…

Researchers identify novel cybersecurity approach to protect Army systems

ADELPHI, Md. — Researchers at the Army’s corporate laboratory in collaboration with the University of California, Riverside have identified an approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies. Networked…

Researchers identify novel cybersecurity approach to protect Army systems

ADELPHI, Md. — Researchers at the Army’s corporate laboratory in collaboration with the University of California, Riverside have identified an approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies. Networked…

Cyber toolkit a ‘complete package’ for detectives, companies

WEST LAFAYETTE, Ind. – A growing number of law enforcement agencies from across the world want to use Purdue University technology to help them track down cybercriminals with a toolkit that also can help companies stop insider threats and technology-facilitated…

Bennett, Brassard and Shor win the Frontiers of Knowledge Award in Basic Sciences

The BBVA Foundation Frontiers of Knowledge Award in Basic Sciences has gone in this twelfth edition to Charles Bennett, Gilles Brassard and Peter Shor for their ‘outstanding contributions to the field of quantum computation and communication’

To predict an epidemic, evolution can’t be ignored

When scientists try to predict the spread of something across populations–anything from a coronavirus to misinformation–they use complex mathematical models to do so. Typically, they’ll study the first few steps in which the subject spreads, and use that rate to…

To predict an epidemic, evolution can’t be ignored

When scientists try to predict the spread of something across populations–anything from a coronavirus to misinformation–they use complex mathematical models to do so. Typically, they’ll study the first few steps in which the subject spreads, and use that rate to…

Tracking communication networks and the diffusion of information

At the APS March Meeting in Denver, scientists will present their research on the ways people use networks to share information — beginning with communication

Engage with the world’s most talented mathematicians and computer scientists in Heidelberg

The Heidelberg Laureate Forum enables selected young researchers to profoundly network with the laureates of mathematics and computer science