| 11847481 |
Security in a computing environment by automatically defining the scope and services of components within the computing environment |
Bin Zan, Zhen Mo, Vijay Ganti |
2023-12-19 |
| 11741236 |
Feature selection using term frequency-inverse document frequency (TF-IDF) model |
Bin Zan, Zhen Mo, Vijay Ganti |
2023-08-29 |
| 11645339 |
Creating a clustering model for evaluating a command line interface (CLI) of a process |
Barak Raz |
2023-05-09 |
| 11645539 |
Machine learning-based techniques for representing computing processes as vectors |
Bin Zan, Zhen Mo, Vijay Ganti |
2023-05-09 |
| 11620180 |
Holo-entropy adaptive boosting based anomaly detection |
Zhen Mo, Bin Zan, Vijay Ganti, HengJun Tian |
2023-04-04 |
| 11295011 |
Event-triggered behavior analysis |
Ruimin Sun, Vijay Ganti, Zhen Mo, Bin Zan |
2022-04-05 |
| 10387667 |
Method and system for anonymizing activity records |
Rajan Peng Kiat Koo, Russell Alan Bruechert, Roderick Duncan Stamp, Arun Narasimha Swami |
2019-08-20 |
| 9953176 |
Method and system for anonymizing activity records |
Rajan Peng Kiat Koo, Russell Alan Bruechert, Roderick Duncan Stamp, Arun Narasimha Swami |
2018-04-24 |