Filter Results
Researcher
- Corson Cramer
- Steve Bullock
- Brian Post
- Chad Steed
- Erdem Asa
- Greg Larsen
- Jim Tobin
- Junghoon Chae
- Mike Zach
- Nicholas Peters
- Omer Onar
- Sam Hollifield
- Travis Humble
- Trevor Aguirre
- Vivek Sujan
- Vlastimil Kunc
- Aaron Myers
- Adam Stevens
- Alexander Enders
- Alexandra Moy
- Alexandre Sorokine
- Ali Passian
- Andrew F May
- Annetta Burger
- Ben Garrison
- Brad Johnson
- Brian Weber
- Brian Williams
- Bruce Hannan
- Carter Christopher
- Chance C Brown
- Christopher S Blessinger
- Chris Tyler
- Clinton Stipek
- Dan Coughlin
- Daniel Adams
- David J Mitchell
- David Olvera Trejo
- Debraj De
- Dustin Gilmer
- Gabriel Veith
- Gautam Malviya Thakur
- Harper Jordan
- Hsin Wang
- Hsuan-Hao Lu
- Isabelle Snyder
- J.R. R Matheson
- James Gaboardi
- James Klett
- Jason Jarnagin
- Jesse McGaha
- Jessica Moehl
- Joel Asiamah
- Joel Dawson
- John Holliman II
- Jordan Wright
- Joseph Lukens
- Josh Crabtree
- Junghyun Bae
- Justin Cazares
- Justin Griswold
- Justin West
- Kevin Spakes
- Kevin Sparks
- Kim Sitzlar
- Lilian V Swann
- Liz McBride
- Loren L Funk
- Louise G Evans
- Luke Chapman
- Luke Koch
- Mark Provo II
- Mary A Adkisson
- Matt Larson
- Mengdawn Cheng
- Mingyan Li
- Muneer Alshowkan
- Nance Ericson
- Nedim Cinbiz
- Pablo Moriano Salazar
- Padhraic L Mulligan
- Paula Cable-Dunlap
- Philipe Ambrozio Dias
- Polad Shikhaliev
- Raymond Borges Hink
- Richard L. Reed
- Robert Stewart
- Rob Root
- Ryan Kerekes
- Sally Ghanem
- Samudra Dasgupta
- Scott Smith
- Srikanth Yoginath
- Steven Guzorek
- Sudarsanam Babu
- Sunil Subedi
- Sydney Murray III
- Taylor Hauser
- Theodore Visscher
- Todd Thomas
- T Oesch
- Varisara Tansakul
- Vasilis Tzoganis
- Viswadeep Lebakula
- Vladislav N Sedov
- Xiuling Nie
- Yacouba Diawara
- Yaosuo Xue
- Yonghao Gui
- Yun Liu

In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server).

The invention relates to network security and more specifically to Pass-the-Hash and Pass-the-Ticket credential theft attacks. Our invention is a way to centrally trigger the removal of all previously issued authentication credentials for a user on particular client comp

The invention relates to cyber security and more specifically to methods for detecting attacks. This invention supports detection of cyber attacks by generating a signal on the target machine that is disrupted by malware and intrusion events.

The invention relates to anomaly detection and more specifically to a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints.

The invention relates to cyber security and more specifically to systems, methods and software for securing a motor vehicle against malicious cyber-attacks. This invention addresses the recent vehicle attacks that have made the news, and it enforces geographic

The invention relates to standoff detection of compounds and more specifically to machines and methods for detecting analytes on target surfaces by providing the spectral signature of hazardous compounds such as biological and chemical contaminants on surfaces of vehicles, bui

The invention relates to network security and more specifically to methods and machines for determining which records meet the criteria for storage.

The present invention is an enhancement of the invisible-fluorescent identification tagging system that was recently invented and developed at ORNL.

The invention relates to security methods and systems and more specifically to iris recognition. The invention simultaneously solves several pertinent issues with current iris recognition.

The invention relates to optics and more particularly to an apparatuses and methods of measuring Refractive Index. Multispectral refractometers typically measure refractive index (RI) at discrete monochromatic wavelengths via a serial process.