Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Systems for network risk assessment including processing of user access rights associated with a network of devices
M Seiver, S Cohen - US Patent 9,648,036, 2017 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on computer
storage media, for network risk assessment. One of the methods includes obtaining infor …
storage media, for network risk assessment. One of the methods includes obtaining infor …
System and methods for automated detection, reasoning and recommendations for resilient cyber systems
(57) ABSTRACT A method for securing an IT (information technology) system using a set of
methods for knowledge extraction, event detection, risk estimation and explanation for …
methods for knowledge extraction, event detection, risk estimation and explanation for …
Long click display of a context menu
J Goldenberg - US Patent 9,335,897, 2016 - Google Patents
5,978.475 A 11/1999 Schneier et al. 7962, 848 B2 6, 2011 Nene al 6,057,757 A 5, 2000
Arrowsmith et al. 7.970340 B1 6, 2011 Chao et all 6,091,956 A 7/2000 Hollenberg-W s …
Arrowsmith et al. 7.970340 B1 6, 2011 Chao et all 6,091,956 A 7/2000 Hollenberg-W s …
System and method for detecting confidential information emails
N White - US Patent 10,356,032, 2019 - Google Patents
Systems and methods are disclosed for detecting confiden tial information emails. In
accordance with one implemen tation, a method is provided for detecting confidential infor …
accordance with one implemen tation, a method is provided for detecting confidential infor …
Resource-centric network cyber attack warning system
C Zorlular, B Brown, XR Tang, A Serenhov… - US Patent …, 2020 - Google Patents
(57) ABSTRACT A computer system may generate alerts related to a potential cyber attack
an resource of an organization. The computer system may receive activity information …
an resource of an organization. The computer system may receive activity information …
Systems for computer network security risk assessment including user compromise analysis associated with a network of devices
S Jones, J Staehle, L Cheng - US Patent 10,044,745, 2018 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on computer
storage media, for computer network security risk assessment. One of the methods includes …
storage media, for computer network security risk assessment. One of the methods includes …
Anomalous network monitoring, user behavior detection and database system
S Jones, T Yousaf, D Dennison, V Lakshmanan… - US Patent …, 2017 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on computer
storage media, for network monitoring, user account compromise determination, and user …
storage media, for network monitoring, user account compromise determination, and user …
Network anomaly detection
M Kesin, S Jones - US Patent 9,407,652, 2016 - Google Patents
9,021,260 B1 9,100,428 B1 2002/0112157 A1 2004/O1534. 18 A1 2004/025O124 A1
2005/0229256 A2 2006, OO699. 12 A1 2006/0218637 A1 2006/0265747 A1 2007.0143851 …
2005/0229256 A2 2006, OO699. 12 A1 2006/0218637 A1 2006/0265747 A1 2007.0143851 …
Network anomaly detection
M Kesin, S Jones - US Patent 10,075,464, 2018 - Google Patents
US10075464B2 - Network anomaly detection - Google Patents US10075464B2 - Network
anomaly detection - Google Patents Network anomaly detection Download PDF Info Publication …
anomaly detection - Google Patents Network anomaly detection Download PDF Info Publication …
Recommendation system based approach in reducing false positives in anomaly detection
A Kondaveeti, D Lin, H Emir-Farinas - US Patent 9,727,723, 2017 - Google Patents
Techniques to reduce false positives in detecting anomalous use of resources are disclosed.
In various embodiments, resource access data indicating for each resource in a set of …
In various embodiments, resource access data indicating for each resource in a set of …