{"id":291,"date":"2020-04-16T09:56:43","date_gmt":"2020-04-16T09:56:43","guid":{"rendered":"https:\/\/sktperfectdemo.com\/themepack\/cybersecurity\/?page_id=291"},"modified":"2024-05-22T17:42:56","modified_gmt":"2024-05-22T21:42:56","slug":"services","status":"publish","type":"page","link":"https:\/\/cryptic-research.com\/?page_id=291","title":{"rendered":"Research"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"291\" class=\"elementor elementor-291\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0e9ff83 home-sec4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0e9ff83\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f56e972\" data-id=\"f56e972\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b4ee8c9 elementor-widget elementor-widget-text-editor\" data-id=\"b4ee8c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>\u00a0<\/h4><h1 style=\"color: lightblue;\">Research Portfolio<\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-947d83a elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"947d83a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c5501fc\" data-id=\"c5501fc\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06cebea elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"06cebea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"545\" height=\"296\" src=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/rfid.png\" class=\"attachment-large size-large wp-image-620\" alt=\"\" srcset=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/rfid.png 545w, https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/rfid-300x163.png 300w\" sizes=\"(max-width: 545px) 100vw, 545px\" \/><\/figure><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5325772 elementor-widget elementor-widget-text-editor\" data-id=\"5325772\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Field Acquisition &amp; Radio Frequency Capture for RFID Technology <br \/><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0(FARFETCH)<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-20b8c9a\" data-id=\"20b8c9a\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66b268b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"66b268b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"476\" height=\"437\" src=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/wasp.png\" class=\"attachment-full size-full wp-image-639\" alt=\"\" srcset=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/wasp.png 476w, https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/wasp-300x275.png 300w\" sizes=\"(max-width: 476px) 100vw, 476px\" \/><\/figure><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6214fc elementor-widget elementor-widget-text-editor\" data-id=\"a6214fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Wireless Adaptive Security Perimeter<strong> (WASP)<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-197ccbb\" data-id=\"197ccbb\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d09750 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3d09750\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"740\" height=\"770\" src=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/hive.png\" class=\"attachment-full size-full wp-image-641\" alt=\"\" srcset=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/hive.png 740w, https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/hive-288x300.png 288w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/><\/figure><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57f880e elementor-widget elementor-widget-text-editor\" data-id=\"57f880e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHybrid Integrated Network Detection, Evaluation, and Response<BR><STRONG>(HINDER)<\/STRONG)\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ab4f318 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"ab4f318\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7042311\" data-id=\"7042311\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cc3de42 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"cc3de42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/2020\/04\/optimize-resource.png\" class=\"attachment-full size-full wp-image-342\" alt=\"\" \/><\/figure><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a4c4e4 elementor-widget elementor-widget-text-editor\" data-id=\"9a4c4e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Real-time Integrated Network Security Engine <br \/><strong>(RINSE)<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-cdadb81\" data-id=\"cdadb81\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7228f9b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7228f9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/2020\/04\/smartscan-security.png\" class=\"attachment-full size-full wp-image-344\" alt=\"\" \/><\/figure><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65746fb elementor-widget elementor-widget-text-editor\" data-id=\"65746fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBio Entropic Algorithmic Model<br><strong>(BEAM)<\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a2f4116\" data-id=\"a2f4116\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0347af8 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0347af8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"324\" src=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/uavd.png\" class=\"attachment-full size-full wp-image-672\" alt=\"\" srcset=\"https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/uavd.png 320w, https:\/\/cryptic-research.com\/wp-content\/uploads\/2024\/03\/uavd-296x300.png 296w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08732b5 elementor-widget elementor-widget-text-editor\" data-id=\"08732b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAutonomous Wireless Attack Node<br><strong>(AWAN)<\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c0d604b elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"c0d604b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-de5aedb\" data-id=\"de5aedb\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-72fd015 elementor-widget elementor-widget-text-editor\" data-id=\"72fd015\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>We are always on the lookout for new innovative ideas. If you are interested in learning more about our research and development please <a href=\"https:\/\/cryptic-research.com\/?page_id=303\">contact us<\/a>. If you are an investor, with a desire for for advancing the future of Cyber Security and\u00a0<span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">Artificial Intelligence<\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">\u00a0we encourage you to <a href=\"https:\/\/cryptic-research.com\/?page_id=303\">inquire<\/a> how your potential contributions would be allocated and you can make a difference in the ever evolving Cyber Landscape.<\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0 Research Portfolio Field Acquisition &amp; Radio Frequency Capture for RFID Technology \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0(FARFETCH) Wireless Adaptive Security Perimeter (WASP) Hybrid Integrated Network Detection, Evaluation, and Response(HINDER)<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/page-builder.php","meta":{"footnotes":""},"class_list":["post-291","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/pages\/291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptic-research.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=291"}],"version-history":[{"count":77,"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/pages\/291\/revisions"}],"predecessor-version":[{"id":813,"href":"https:\/\/cryptic-research.com\/index.php?rest_route=\/wp\/v2\/pages\/291\/revisions\/813"}],"wp:attachment":[{"href":"https:\/\/cryptic-research.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}