Abstract:
In one or more embodiments, a disclosed method involves transmitting a first transmit signal(s) having a first signal strength and/or a first field of view (FOV), thereby establishing a first radiation region. The method further involves receiving a first receive signal(s) radiated from an EMID tag(s). Also, the method involves transmitting a second transmit signal(s) having a second signal strength and/or a second field of view (FOV), thereby establishing a second radiation region. In addition, the method involves receiving a second receive signal(s) radiated from an EMID tag(s). Additionally, the method involves subtracting the second radiation region from the first radiation region to determine a difference region. Also, the method involves determining which of the EMID tags are located within the difference region by using the first receive signal(s) and the second receive signal(s). Further, the method involves determining a location of the EMID tag(s) located within the difference region.
Abstract:
In one or more embodiments, a disclosed method involves transmitting a first transmit signal(s) having a first signal strength and/or a first field of view (FOV), thereby establishing a first radiation region. The method further involves receiving a first receive signal(s) radiated from an EMID tag(s). Also, the method involves transmitting a second transmit signal(s) having a second signal strength and/or a second field of view (FOV), thereby establishing a second radiation region. In addition, the method involves receiving a second receive signal(s) radiated from an EMID tag(s). Additionally, the method involves subtracting the second radiation region from the first radiation region to determine a difference region. Also, the method involves determining which of the EMID tags are located within the difference region by using the first receive signal(s) and the second receive signal(s). Further, the method involves determining a location of the EMID tag(s) located within the difference region.
Abstract:
A radio-frequency identification (RFID) reader is provided. The RFID reader includes a transmitter/receiver module configured to transmit a radio signal at a plurality of different power levels, and a control module coupled to the transmitter/receiver module and configured to control the power level at which the radio signal is transmitted based on a number of RFID tags detected when transmitting the radio signal at an initial power level.
Abstract:
A radio-frequency identification (RFID) reader is provided The RFID reader includes a transmitter/receiver module configured to transmit a radio signal at a plurality of different power levels, and a control module coupled to the transmitter/receiver module and configured to control the power level at which the radio signal is transmitted based on a number of RFID tags detected when transmitting the radio signal at an initial power level.
Abstract:
Methods and systems for use in in analyzing cyber-security threats for an aircraft are described herein. One example method includes generating an interconnection graph for a plurality of interconnected aircraft systems. The interconnection graph includes a plurality of nodes and a plurality of links. The method also includes defining a cost function for a cyber-security threat to traverse each link and defining a requirements function for a cyber-security threat to exploit each node. The method further includes generating a set of threat traversal graphs for each cyber-security threat of a plurality of cyber-security threats.
Abstract:
Disclosed herein is a method for executing unprotected mode services in a protected mode computing environment includes initiating a protected mode service that is configured to execute in a protected mode. Further, the method includes verifying an integrity of one or more unprotected mode services configured to execute in an unprotected mode. The one or more unprotected mode services is registered with the protected mode service. The method also includes initiating an unprotected mode service of the one or more unprotected mode services in response to the integrity of the unprotected mode service being verified.
Abstract:
Systems and methods for real time control system management in networked environments are disclosed. In one embodiment, a computer-based system for real time embedded control system behavior monitoring and anomaly detection comprises a processor and logic instructions stored in a tangible computer-readable medium coupled to the processor which, when executed by the processor, configure the processor to generate a behavior training set for the embedded control system, wherein the behavior training set correlates inputs to the embedded control system with outputs from the embedded control system during a training process to define behavior fingerprints for the embedded control system monitor inputs to the embedded control system and outputs from the embedded control system in real time during operation of the embedded control system, and generate an alert when one or more of the inputs into the embedded control system or the outputs collected from the embedded control system in real time operation represent an anomaly.
Abstract:
Disclosed herein is a method for executing unprotected mode services in a protected mode computing environment includes initiating a protected mode service that is configured to execute in a protected mode. Further, the method includes verifying an integrity of one or more unprotected mode services configured to execute in an unprotected mode. The one or more unprotected mode services is registered with the protected mode service. The method also includes initiating an unprotected mode service of the one or more unprotected mode services in response to the integrity of the unprotected mode service being verified.
Abstract:
Methods and systems for use in in analyzing cyber-security threats for an aircraft are described herein. One example method includes generating an interconnection graph for a plurality of interconnected aircraft systems. The interconnection graph includes a plurality of nodes and a plurality of links. The method also includes defining a cost function for a cyber-security threat to traverse each link and defining a requirements function for a cyber-security threat to exploit each node. The method further includes generating a set of threat traversal graphs for each cyber-security threat of a plurality of cyber-security threats.