TRAPS seeks to detect and localize anomalies in power grid cyber-physical systems
Cyber Security
Return to the Timeline of innovation.
Handwriting recognition, signature verification and pen-input computing
How they know your online you is really you.
Risks forum
The single most comprehensive anthology of computer-related mishaps.
Computer security theory of noninterference
SRI researchers develop one of the most influential theoretical approaches to the study of computer security.
Network intrusion detection
Fewer cyber attacks for a safer internet.
Virtual private networks
VPNs let people connect to work from home. Sorry it’s been so successful.