-
A method for preparing the automated production of an electronic component, in which an SMD component and/or a conductor track are arranged on a substrate, for production by 3D printing....
-
An emitter arrangement (11) is provided within the scope of a method for producing a solid layer. A base (1) is rotationally positioned relative to the emitter arrangement about an axis of...
-
Disclosed are methods and apparatuses for fabrication of polymer scaffolds and biological tissues in the multi-well plates in a rapid, high-throughput, controllable and reproducible manner by...
-
In one embodiment, a processor accesses sensor input data received from one or more sensors. The sensor input data represents one or more gestures. The processor determines, based on the sensor...
-
A modular inspection vehicle having at least first and second motion modules is provided. The first and second motion modules are connected to a chassis. The first motion module includes a first...
-
Systems and methods for the management of cybersecurity risks for medical devices are disclosed. A system may streamline and automate the process of generating a cybersecurity bill of materials...
-
The present disclosure describes a self-learning system, method, and computer program for detecting cybersecurity threats in a computer network based on anomalous user behavior and multi-domain...
-
A technique for providing cyber resilience by integrating autonomous adversary and defender agents, deep learning, and graph thinking. An automated competitive environment of autonomous adversary...
-
Information for a knowledge graph is accessed. The knowledge graph has nodes and edges of a network and has information about security incident(s) in the network. Related entities from the...
-
A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having a digital certificate reputation system. At least one embodiment is directed to a...
-
A cybersecurity solution for monitoring and assessing an overall cybersecurity posture level of an operation technology environment to increase the level when it is determined to be below a...
-
A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a...
-
A satellite is disclosed, including a body and a communication device attached to the body. The body has an additively manufactured external wall structure at least partially forming an enclosed...
-
A logic circuitry package includes an interface to communicate with a print apparatus logic circuit and at least one logic circuit including at least one heater and a temperature sensor. The at...
-
Methods, processes, systems, devices and apparatus are provided for additive manufacture resulting in the 3D printing of ceramic materials and components with a thickness greater than three...
-
An example operation may include one or more of receiving data from a plurality of sources associated with an entity, clustering the data into security-related topics, determining, via one or more...
-
According to one or more embodiments, a system for detecting defects in a printed construct includes one or more processors, one or more image sensors, and one or more memory modules. The one or...
-
A system and method for self-adjusting cybersecurity analysis and score generation, wherein a reconnaissance engine gathers data about a client's computer network from the client, from devices and...
-
Example apparatus disclosed herein to perform a cybersecurity investigation include a graph generator to iteratively generate an information graph based on investigative data in response to...
-
Churn-aware training of a classifier which reduces the difference between predictions of two different models, such as a prior generation of a classification model and a subsequent generation. A...
-
The invention relates to a computer-implemented system and method for automatic collection, analysis and reporting of data relating to a cybersecurity threat. The method may comprise the steps of:...