| 10805308 |
Jointly discovering user roles and data clusters using both access and side information |
Taesung Lee, Ian M. Molloy, Suresh N. Chari, Benjamin J. Edwards |
2020-10-13 |
| 10733286 |
Composite propensity profile detector |
Anni R. Coden, Keith Coleman Houck, Ching-Yung Lin, Wanyi Lin, Peter K. Malkin +2 more |
2020-08-04 |
| 10686830 |
Corroborating threat assertions by consolidating security and threat intelligence with kinetics data |
Jiyong Jang, Dhilung Hang Kirat, Marc Philippe Stoecklin |
2020-06-16 |
| 10609017 |
Two-level sequence learning for analyzing, metering, generating, and cracking passwords |
Suresh N. Chari, Taesung Lee, Ian M. Molloy |
2020-03-31 |
| 10599837 |
Detecting malicious user activity |
Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Josyula R. Rao, Wilfried Teiken |
2020-03-24 |
| 10542015 |
Cognitive offense analysis using contextual data and knowledge graphs |
William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Josyula R. Rao +1 more |
2020-01-21 |
| 10540490 |
Deep learning for targeted password generation with cognitive user information understanding |
Suresh N. Chari, Benjamin J. Edwards, Taesung Lee, Ian M. Molloy |
2020-01-21 |
| 10536472 |
Cognitive analysis of security data with signal flow-based graph exploration |
Jiyong Jang, Dhilung Hang Kirat, Marc Philippe Stoecklin |
2020-01-14 |