Quantum
Intelligence
Optimization
Networking
Radios
Cybersecurity
beyond norms
Innovation Science and Engineering Research
As digital systems need to be service-efficient and at the same time cybersecure, we have focused on approaching these two requirements in joint and equal terms.
Particularly, in our latest research efforts, we introduced closed-form utility functions capable to describe the attack surface of a given system, and correlate its cybersecurity dynamics with potential computational resource requirements, energy consumption, and monetary costs thresholds imbued by organizational policies.
Our utilities provide the necessary degrees of freedom to formulate and establish next-generation cybersecurity optimizations based on analytical problems and mathematically precise solutions, which have yet been approached previously, especially in such a detailed manner.
In addition, we answer the question of how to automate the cybersecurity protection over time, in respect to potential risks detected at the software and the firmware of heterogeneous IoT, Edge, and Cloud devices that co-exist in the given system.
Thereby, we have developed, so-called, feature-based models to reach up the dynamicity levels for safeguarding such automation, accompanied by sophisticated (duality-free) solution methods to resolve the overall cybersecurity optimization problem with the minimum possible implementation complexity.
These solutions are delivered as virtual machines (Docker containers or micro-containers) such that they can be applied and tested over virtualized systems.
Customers can inquire more details here.
© 2024 axon logic. All Rights Reserved
Offices: 1 Thriamvou, 141 22, Athens, Greece
Labs: 21 M. Timotheou, 142 31, Athens, Greece
Reg. No.: 326575 (Chamber of Commerce & Industry Athens)
+30 210 2833 116 || + 30 6944 6962 21 ||