Hmmmm....wonder if legit cybersecurity and if so, whose neuromorphic they using
Neuromorphic Computing
www.crypttech.com
Neuromorphic Computing
Deep Convolutional Neural Networks (CNNs) boosted the artificial intelligence revolution, especially after 2015. Although CNNs provide impressive performance for classification and relational reasoning on data patterns, they also require application-oriented structural optimization.This motivates the developers and researchers to work on morphologically adaptive CNNs where the network topology is evolved as processed data and experience of the system increase. On the other hand, this also increases the level of time and space complexity. In other words, GPU/CPU processing power and memory requirement exponentially raise.
Neuromorphic computing intends to provide novel solutions for efficient utilization of hardware resources against increasing complexity for implementation of morphologically adaptive machine learning systems. For this reason, neuromorphic computing has become a forthcoming milestone as the next generation of AI after the development of deep convolutional networks. An important target of the neuromorphic systems is high-level cognitive functions that mimic human intelligence and provides situational awareness. In order to reduce power consumption with efficient information coding, one way of neuromorphic computing implementation is using dedicated hardware that depends on parallelism instead of sequential logical processing solutions.
Computation based on conventional digital computer architectures and materials is approaching to physical limitations. Due to the development of AI applications and their rising economic impact, nature-inspired emulation of cognitive functions has become a major target within new computational paradigms. Neuromorphic computing, also known as, Neuromorphic engineering is a concept describing the use of integrated systems containing morphologically adaptive analog, analog & digital hybrid circuits or equivalent circuit simulations to mimic neuro-biological architectures present in the nervous system.
Situational awareness and context awareness are becoming key factors in cybersecurity because of exponentially increasing amount of threats both in terms of variety and their complexity. Monitoring, diagnostics, defense, and recovery requires a high level of cognition in order to sustain security in cyberspace.
For this reason, CRYPTTECH AI team works on the development of high level of cognition depending on situational awareness on morphologically adaptive platforms for cybersecurity. We work on state of the art implementation of morphologically adaptive data coding and machine learning solutions on conventional computational systems as well as neuromorphic computing with dedicated hardware for high-performance cybersecurity systems.
CYBERDROID
Today, the diversity of malware and threats exponentially increases. The increase in malware and threat types is estimated to exceed 8 million annually. CYBERDROIDs have significant operational potentials, especially in the maintenance of cyber security and information systems. In cyber security infrastructures against threats and malware, the development process started from the installation of devices and security software at different levels on the network to the establishment of the security operations center (SOC).
However, determination of the best strategies to identify the threats and their content variability for different situations are still carried out with intensive cyber security expertise. As artificial intelligence technology advances, the possibility of computers to provide autonomous services including intensive cognitive functions increases.
CYBERDROIDs have emerged as an important tool in spite of increasing diverse threat and malware with high cognitive functions. In addition to mobile devices, we are in a period of widespread Internet of Things (IoT) applications. The number of devices connected to the Internet has exceeded 20 billion in the world and continues to increase rapidly. Research has shown that the growing need is actually higher than predicted and this leads to a number of undiagnosed problems, the effects of information security to system operating defects can be partially comprehensible at further stages. The use of CYBERDROIDs for cyber security is a strategic move in meeting the evolving need of human-like cognitive functions. CRYPTTECH is the first cyber security company in the world that demonstrates the use of
CYBERDROID with humanoid cognitive functions. The use of CYBERDROID in the future cyber defense systems is considered to be inevitable.
Unlike traditional methods of machine learning, CYBERDROIDs have four main features that bring them closer to humanoid behavior and abilities. There are cortical networks between their sensor and perception just like human beings. These networks provide efficient coding of data-to-information conversion and inferring their differentiating properties by coding based on neuromorphic calculation as in humans.
Another important feature is the state awareness by fusion to the coded information passing through different sensor cortices. This is a very important stage in the acquisition of humanoid behavior skills into machines. Sequential coding of the sensor cortices with contextual cortical networks provides state awareness.
CYBERDROIDs can be adapted to fixed network security devices in a discrete box structure in the future or can be used in mobile critical infrastructure such as transportation systems, autonomous vehicles. They will also provide high energy efficiency in cyber security with the development of neuromorphic computing. The first examples of neuromorphic processors have been successfully implemented by DARPA, which established the first internet network, in target tracking application in combat aircraft. Machine learning, especially developed with artificial neural networks, gained momentum with convolutional neural networks after 2010 and increased the commercialization rate after 2015. In this development process,
CYBERDROIDs have a significant advantage especially in cyber security and cyber defense by its ability to making decisions to inferences with context awareness. CYBERDROIDs will continue to increase their superiority in services & applications in the road map of artificial intelligence on low power consumption structures parallel to neuromorphism.