Abstract: A system may be configured to prepare and use prediction models for predicting existence of fingerprints among encrypted traffic. Some embodiments may: obtain a machine learner configured to identify statistical differences between pseudo-randomness associated with encrypted user data and higher-entropy randomness associated with a set of other data; determine at least a portion of a path traversed by the encrypted user data in the network based on the identification; and secure the network based on the determination.
Abstract: The present disclosure pertains to a system configured to generate output data from a series of configurable cloud-computing processing operations. Some embodiments may; obtain, from a first database, data in a first format; process, in a first stage, the obtained data such that the obtained data is normalized; process, in a second stage, data in a second format different from the first format using a first set of cloud-computing devices; and detect, via a user interface, a first selection of at least two processing operations, the first selection being made from among a plurality of available processing operations. Each of the processing stages may include input data, a processing operation, and output data.
Abstract: A system to capture data regarding conditions in a sealed metal shipping container having: a sensor unit mountable inside the container and adapted to sense a condition inside of the container; an impulse radio transmitter receiving data from the sensor regarding the condition and transmitting an impulse radio wireless signal inside of the container; an impulse radio receiver external to the container and proximate the container, wherein the receiver is adapted to receive the impulse radio wireless signal propagating through the sealed metal shipping container, and a data device in communication with the receiver to capture the data from the sensor unit regarding the condition inside of the container.