System and method for data loss prevention across heterogeneous communications platforms
M Brisebois, C Johnstone - US Patent 9,578,060, 2017 - Google Patents
In one embodiment, a method includes activating a cross platform DLP policy for
enforcement against a plurality of users on each of a plurality of heterogeneous communica …
enforcement against a plurality of users on each of a plurality of heterogeneous communica …
Proactive detection of distributed denial of service attacks using mib traffic variables-a feasibility study
We propose a methodology for utilizing network management systems for the early detection
of distributed denial of service (DDoS) attacks. Although there are quite a large number of …
of distributed denial of service (DDoS) attacks. Although there are quite a large number of …
Method and Apparatus for predicting and preventing attacks in communications networks
In one embodiment of a method and apparatus for predicting and preventing network
attacks, data is collected from net work devices during an attack. The collected data is …
attacks, data is collected from net work devices during an attack. The collected data is …
Explainable AI-based innovative hybrid ensemble model for intrusion detection
Cybersecurity threats have become more worldly, demanding advanced detection
mechanisms with the exponential growth in digital data and network services. Intrusion …
mechanisms with the exponential growth in digital data and network services. Intrusion …
Multi-agent systems for protecting critical infrastructures: A survey
ZA Baig - Journal of Network and Computer Applications, 2012 - Elsevier
Multi-agent systems have emerged as a very significant platform in provisioning distributed
and collaborative services to critical applications. Such applications require ubiquitous …
and collaborative services to critical applications. Such applications require ubiquitous …
Systems and methods of patternizing logged user-initiated events for scheduling functions
MA Brisebois, AN Polikarpov… - US Patent 10,417,613, 2019 - Google Patents
In one embodiment, a method includes selecting a set of logged user-initiated events of a
user. The method further includes determining timing information, device-identification …
user. The method further includes determining timing information, device-identification …
A survey on multi-agent based collaborative intrusion detection systems
Abstract Multi-Agent Systems (MAS) have been widely used in many areas like modeling
and simulation of complex phenomena, and distributed problem solving. Likewise, MAS …
and simulation of complex phenomena, and distributed problem solving. Likewise, MAS …
Design and management of collaborative intrusion detection networks
Traditional intrusion detection systems (IDSs) work in isolation and are not effective to detect
unknown threats. An intrusion detection network (IDN) is a collaborative IDS network …
unknown threats. An intrusion detection network (IDN) is a collaborative IDS network …
Proactive intrusion detection and distributed denial of service attacks—a case study in security management
Little or no integration exists today between Intrusion Detection Systems (IDSs) and SNMP-
based Network Management Systems (NMSs), in spite of the extensive monitoring and …
based Network Management Systems (NMSs), in spite of the extensive monitoring and …
[PDF][PDF] A dynamic authentication scheme for mobile transactions
Most of the existing authentication schemes for mobile communication are static in nature,
and principally dependent on strength of authenticating identifiers for users identity. The …
and principally dependent on strength of authenticating identifiers for users identity. The …