Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Insider threat detection utilizing user group to data object and/or resource group access analysis
Techniques for detecting suspicious data object access requests indicative of potential
insider threats are described. A suspicious access detection module (SADM) determines …
insider threats are described. A suspicious access detection module (SADM) determines …
Insider threat detection utilizing user group data object access analysis
Techniques for detecting suspicious file access requests indicative of potential insider
threats are described. A sus picious access detection module (SADM) determines, based on …
threats are described. A sus picious access detection module (SADM) determines, based on …
Insider threat detection utilizing user group to data object and/or resource group access analysis
US11750627B2 - Insider threat detection utilizing user group to data object and/or resource group
access analysis - Google Patents US11750627B2 - Insider threat detection utilizing user group …
access analysis - Google Patents US11750627B2 - Insider threat detection utilizing user group …
Method and system for privacy-preserving targeted substructure discovery on multiplex networks
Described is a system for network threat detection. The system identifies a targeted sub-
network representing a threat within a multi-layer network having members. The targeted …
network representing a threat within a multi-layer network having members. The targeted …
Document tracking through version hash linked graphs
RE Maguire, RP Krishnaswamy - US Patent 12,210,822, 2025 - Google Patents
Embodiments of the invention provide the ability to track document versioning. Before
executing an open operation on a first document version, a first before-hash is generated …
executing an open operation on a first document version, a first before-hash is generated …
Encrypted knowledge graph
TU Scheideler, AU Raghavendra… - US Patent 12,182,296, 2024 - Google Patents
A computer-implemented method for managing access rights to a knowledge graph is
provided. The method comprises splitting, for each user system, its respective portion of the …
provided. The method comprises splitting, for each user system, its respective portion of the …
Method and system for data usage analysis
B Deepak, J Hargrave, NN Dany - US Patent 11,620,297, 2023 - Google Patents
US11620297B2 - Method and system for data usage analysis - Google Patents
US11620297B2 - Method and system for data usage analysis - Google Patents Method and …
US11620297B2 - Method and system for data usage analysis - Google Patents Method and …
Using a security analytics map to trace entity interaction
A Mortensen, A Almaz, D Coffey, O Arkin - US Patent 11,902,296, 2024 - Google Patents
A system, method, and computer-readable medium are disclosed for performing a security
operation. The security operation includes monitoring a plurality of electronically-observable …
operation. The security operation includes monitoring a plurality of electronically-observable …