| 11847240 |
System and method for matching, grouping and recommending computer security rules |
Debessay Fesehaye Kassa, Patrick Charles Upatham |
2023-12-19 |
| 11847481 |
Security in a computing environment by automatically defining the scope and services of components within the computing environment |
Bin Zan, Vijay Ganti, Vamsi Krishna Akkineni |
2023-12-19 |
| 11741236 |
Feature selection using term frequency-inverse document frequency (TF-IDF) model |
Bin Zan, Vijay Ganti, Vamsi Krishna Akkineni |
2023-08-29 |
| 11729207 |
Hierarchical novelty detection using intended states for network security |
Vijay Ganti, Debessay Fesehaye Kassa, Barak Raz, Honglei Li |
2023-08-15 |
| 11689545 |
Performing cybersecurity operations based on impact scores of computing events over a rolling time interval |
Ereli Eran, Barak Raz, Vijay Ganti |
2023-06-27 |
| 11645539 |
Machine learning-based techniques for representing computing processes as vectors |
Bin Zan, Vamsi Krishna Akkineni, Vijay Ganti |
2023-05-09 |
| 11620180 |
Holo-entropy adaptive boosting based anomaly detection |
Bin Zan, Vijay Ganti, Vamsi Krishna Akkineni, HengJun Tian |
2023-04-04 |
| 11620395 |
Replication of account security configurations |
Suraj P. Acharya, Damien Carru, Vikas Jain, Frantisek Rolinek |
2023-04-04 |
| 11494500 |
Account security configuration replication |
Suraj P. Acharya, Damien Carru, Vikas Jain, Frantisek Rolinek |
2022-11-08 |
| 11314875 |
Replication of account security features in multiple deployment database |
Suraj P. Acharya, Damien Carru, Vikas Jain, Frantisek Rolinek |
2022-04-26 |
| 11295011 |
Event-triggered behavior analysis |
Ruimin Sun, Vijay Ganti, Bin Zan, Vamsi Krishna Akkineni |
2022-04-05 |
| 11258655 |
Holo-entropy based alarm scoring approach |
Dexiang Wang, Bin Zan, Vijay Ganti, Amit Chopra, Ruimin Sun |
2022-02-22 |
| 11122065 |
Adaptive anomaly detection for computer systems |
Bin Zan, Dexiang Wang, Vijay Ganti |
2021-09-14 |
| 10860712 |
Entropy based security detection system |
Dexiang Wang, Bin Zan, Vijay Ganti, Amit Chopra |
2020-12-08 |
| 10659440 |
Optimizing utilization of security parameter index (SPI) space |
Dexiang Wang, Fang-Ying Peng, Bo Hu, Helen Liu |
2020-05-19 |