intrusion detection system to detect evolving threats- uses hardware signatures that are innate in network traffic to detect unauthorized devices that are inserted into the network

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations