Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Method and system for employing graph analysis for detecting malicious activity in time evolving networks
US11146578B2 - Method and system for employing graph analysis for detecting malicious
activity in time evolving networks - Google Patents US11146578B2 - Method and system for …
activity in time evolving networks - Google Patents US11146578B2 - Method and system for …
Forensic analysis of computing activity
B Ladnai, MD Harris, AJ Thomas, AGP Smith… - US Patent …, 2018 - Google Patents
US9967267B2 - Forensic analysis of computing activity - Google Patents US9967267B2 -
Forensic analysis of computing activity - Google Patents Forensic analysis of computing activity …
Forensic analysis of computing activity - Google Patents Forensic analysis of computing activity …
Pre-cognitive security information and event management
SKJ DURAIRAJ, A Singla - US Patent 10,789,367, 2020 - Google Patents
According to an example, pre-cognitive SIEM may include using trained classifiers to detect
an anomaly in input events, and generating a predictive attack graph based on the detected …
an anomaly in input events, and generating a predictive attack graph based on the detected …
Endpoint malware detection using an event graph
B Ladnai, MD Harris, AJ Thomas, AGP Smith… - US Patent …, 2018 - Google Patents
(57) ABSTRACT A data recorder stores endpoint activity on an ongoing basis as sequences
of events that causally relate computer objects such as processes and files, and patterns …
of events that causally relate computer objects such as processes and files, and patterns …
Verification and enhancement using detection systems located at the network periphery and endpoint devices
A Aziz, OA Ismael - US Patent 10,893,059, 2021 - Google Patents
(74) Attorney, Agent, or Firm-Rutan & Tucker, LLP (57) ABSTRACT Computerized
techniques to determine and verify malicious ness of an object are described. A malware …
techniques to determine and verify malicious ness of an object are described. A malware …
Learning maliciousness in cybersecurity graphs
C Walsh, E Maida - US Patent 10,785,239, 2020 - Google Patents
US10785239B2 - Learning maliciousness in cybersecurity graphs - Google Patents
US10785239B2 - Learning maliciousness in cybersecurity graphs - Google Patents Learning …
US10785239B2 - Learning maliciousness in cybersecurity graphs - Google Patents Learning …
Graph based framework for detecting malicious or compromised accounts
Y **e, F Yu - US Patent 10,009,358, 2018 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on computer
storage media, for detecting malicious attacks. One of the methods includes generating a …
storage media, for detecting malicious attacks. One of the methods includes generating a …
Behavior-based ransomware detection
MW Patton, AL Ituiño - US Patent 9,734,337, 2017 - Google Patents
An anti-malware application detects, stops, and quarantines ransomware. The anti-malware
application monitors threads executing on a computing device and detects behaviors that …
application monitors threads executing on a computing device and detects behaviors that …
Security evaluation system, security evaluation method, and program
Y Yamada, Y Ohta, M Inokuchi - US Patent 11,729,199, 2023 - Google Patents
US11729199B2 - Security evaluation system, security evaluation method, and program -
Google Patents US11729199B2 - Security evaluation system, security evaluation method …
Google Patents US11729199B2 - Security evaluation system, security evaluation method …
Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
OA Ismael, A Aziz - US Patent 10,826,933, 2020 - Google Patents
Action dated Nov. 29, 2018. Primary Examiner David Garcia Cervetti (74) Attorney, Agent, or
Firm-Rutan & Tucker, LLP (57) ABSTRACT A technique verifies a determination of an exploit …
Firm-Rutan & Tucker, LLP (57) ABSTRACT A technique verifies a determination of an exploit …