Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Systems and methods using computer vision and machine learning for detection of malicious actions
WP Bowditch, RG Calvo - US Patent 11,310,268, 2022 - Google Patents
The present disclosure provides systems and methods for classifying or determined whether
a request for a user's information is malicious or safe/legitimate. Request infor mation related …
a request for a user's information is malicious or safe/legitimate. Request infor mation related …
Systems and methods for threat discovery across distinct organizations
L McLean, J Ramsey, N Borges - US Patent 11,044,263, 2021 - Google Patents
The present disclosure provides systems and methods for organizations to use security date
to generate a risk scores associated with potential compromise based on clustering and/or …
to generate a risk scores associated with potential compromise based on clustering and/or …
Seamless service updates for cloud-based security services
RY Chou, GW Bannister - US Patent 10,530,815, 2020 - Google Patents
The disclosed embodiments disclose techniques for seam lessly updating a cloud-based
security service. A dispatcher virtual machine (VM) executing in a cloud data center receives …
security service. A dispatcher virtual machine (VM) executing in a cloud data center receives …
Systems and methods for secure propagation of statistical models within threat intelligence communities
L McLean - US Patent 10,594,713, 2020 - Google Patents
Int. Cl. G06F 12/14(2006.01) H04L 29/06(2006.01) G06F 11/30(2006.01)(52) US CI.???
H04L 63/1425 (2013.01); H04L 63/1416 (2013.01); H04L 63/1433 (2013.01); H04L 63/0442 …
H04L 63/1425 (2013.01); H04L 63/1416 (2013.01); H04L 63/1433 (2013.01); H04L 63/0442 …
Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics
T Vidas, J Ramsey, A Hackworth, R Danford… - US Patent …, 2020 - Google Patents
Methods and systems for develo** and distributing appli cations and data for building
security applications can be provided. A plurality of data policies can be set for access …
security applications can be provided. A plurality of data policies can be set for access …
Systems and methods for threat discovery across distinct organizations
L McLean, J Ramsey, N Borges - US Patent 10,785,238, 2020 - Google Patents
The present disclosure provides systems and methods for organizations to use forensic to
generate a risk scores associated with potential compromise based on clustering and/or …
generate a risk scores associated with potential compromise based on clustering and/or …
Systems and methods for enabling a global aggregated search, while allowing configurable client anonymity
L McLean, P Stansell - US Patent 11,003,718, 2021 - Google Patents
(57) ABSTRACT A system can enable a global search of security data of a client base. The
system can include a processor operable to record anonymity values set by clients of the …
system can include a processor operable to record anonymity values set by clients of the …
Providing scalable cloud-based security services
RY Chou, GW Bannister - US Patent 10,419,394, 2019 - Google Patents
The disclosed embodiments disclose techniques for provid ing a cloud-based security
service. During operation, a dispatcher virtual machine (VM) executing in a cloud data …
service. During operation, a dispatcher virtual machine (VM) executing in a cloud data …
Computer implemented system and method, and computer program product for reversibly remediating a security risk
RR Kinder, W Urbanski, RJ Leavengood… - US Patent …, 2020 - Google Patents
Systems and methods for reversibly remediating security risks, which monitor a network or
system for security risks, and upon detection of one or more of risks, apply a remedial action …
system for security risks, and upon detection of one or more of risks, apply a remedial action …
Execution of an application within a scope of user-granted permission
B Murdoch, DJ Buchner, A Patel - US Patent 11,381,567, 2022 - Google Patents
Executing an application within a scope of user-granted permission in a decentralized
network that implements a distributed edger. First, receiving a request from an entity for …
network that implements a distributed edger. First, receiving a request from an entity for …