The HIPAA privacy and security regulation, the never ending series of operating system updates, the threat of intrusions and viruses from the outside as well as inside, and the requirement for remote access by service providers require a robust security framework for the PACS systems. The problems with the current deployments are: few guidelines to establish this framework, lack of tools, and the tools that are available are not well documented and/or adapted to this specific domain.

In a computer network, network security is accomplished using elements like firewalls, hosts, servers, routers, intrusion detection systems, and honey pots. These network elements need to know the nature or anomaly of the worm in priori to detect the attack. Modern day viruses like Code red, Sapphire and Nimda spread very fast. Therefore it is impractical if not impossible for human mediated responses to these modern day fast spreading viruses. Several epidemic studies show that automatic tracking of resource usage and control is an effective method in containing the damage.

Voice over IP (VoIP) technology has been aggressively deployed for the last one year in several enterprises and it is estimated that by 2006, the deployment of IP phones is going to exceed the PSTN phones. This high level of interest is based on reduced long distance cost and ease of management. But, there are substantial issues in the Quality of Service (QoS) and security of the IP telephony. IP phone threat levels, user behavior and experiences are different from data-specific applications like email.

Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN architectures to packet-based networks. The problem of spam in VoIP networks has to be solved in real time compared to e-mail systems. Many of the techniques devised for e-mail spam detection rely upon content analysis and in the case of VoIP it is too late to analyze the media after picking up the receiver. So we need to stop the spam calls before the telephone rings.

Vehicle manufacturers are adding advanced driver assistance systems (ADAS), such as lane departure warnings, to many of their vehicles. However, vehicles with these newer systems are more expensive, and older vehicles cannot take advantage of these systems. 

We have developed smartphone applications that can be used to monitor driver behavior in any car. 

The Internet is growing on a daily basis and just like any other transport network, any body can use it. But on a daily basis more and more people are annoyed by unwanted emails known as Spam. In general, spammers can use email address on ones web site could send junk mail forever. For years people have been researching the way spam is produced. Different methods have come about to do away with unwanted emails, but to this day we have not found anything that has a long-term effect.

Indoor localization, or identifying where one is within a building, is a significant challenge. Global Positioning System (GPS) signals usually do not work inside buildings. Not all buildings have Wi-Fi access points, and adding enough access points to be usable for indoor localization is expensive. 

We have developed smartphone applications that can detect changes in magnetic fields caused by doors, walls, and other things inside buildings. The smartphone applications can then use these changes to determine a person's location within a building. 

Mobile phones are one of the essential parts of modern life. Making a phone call is not the main purpose of a smart phone anymore, but merely one of many other features. Online social networking, chatting, short messaging, web browsing, navigating, and photography are some of the other features users enjoy in modern smartphones, most of which are provided by mobile apps.

Emergency Medical Dispatch Protocols are guidelines that a 9-1-1 dispatcher uses to evaluate the nature of emergency, resources to send and the nature of help provided to the 9-1-1 caller. The current Dispatch Protocols are based on voice only calls.

However, the Next Generation 9-1-1 (NG9-1-1) architecture will allow multimedia emergency calls.

People often need help from others to perform tasks. In today's connected world, this help could come from anyone located almost anywhere in the world. However, verifying that the potential helpers are who they say they are can be challenging. Determining how qualified they are to help with the tasks at hand can be challenging as well. Existing physical identity documents and certificates come in several different formats. Each department, organization, or level of government will often have its own format or list of formats.