Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Multi-point causality tracking in cyber incident reasoning
This disclosure provides an automatic causality tracking system that meets real-time
analysis needs. It solves cau sality tracking for cybersecurity, preferably as three sub tasks …
analysis needs. It solves cau sality tracking for cybersecurity, preferably as three sub tasks …
Endpoint inter-process activity extraction and pattern matching
An automated method for cyberattack detection and preven tion in an endpoint. The
technique monitors and protects the endpoint by recording inter-process events, creating an …
technique monitors and protects the endpoint by recording inter-process events, creating an …
Techniques for improving output-packet-similarity between primary and secondary virtual machines
Y Zu Dong, Y Jiang - US Patent 11,023,265, 2021 - Google Patents
Examples may include intercepting packets outputted from a primary virtual machine (PVM)
hosted by a first server and converting one or more fields of protocol headers for each …
hosted by a first server and converting one or more fields of protocol headers for each …
Iterative constraint solving in abstract graph matching for cyber incident reasoning
A technique for storage-efficient cyber incident reasoning by graph matching. The method
begins with a graph pattern that comprises a set of elements with constraints and …
begins with a graph pattern that comprises a set of elements with constraints and …
Detecting user behavior activities of interest in a network
M Kopp, L Machlica - US Patent 10,601,847, 2020 - Google Patents
(57) ABSTRACT A user behavior activity detection method is provided in which network
traffic relating to user behavior activities in a network is monitored. Data is stored …
traffic relating to user behavior activities in a network is monitored. Data is stored …
Distributed digital security system
DF Diehl, JR Plush, TJ Berger - US Patent 11,645,397, 2023 - Google Patents
Security threats come in many forms, including computer viruses, worms, trojan horses,
spyware, keystroke loggers, adware, and rootkits. Such security threats may be delivered in …
spyware, keystroke loggers, adware, and rootkits. Such security threats may be delivered in …
Distributed digital security system
DF Diehl, ME Lusignan, TJ Essebier - US Patent 11,616,790, 2023 - Google Patents
G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY
ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR …
ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR …
Distributed digital security system
DF Diehl, NL Sandler, ME Noonan, CR Gwinn… - US Patent …, 2023 - Google Patents
(57) ABSTRACT A distributed security system can include instances of a compute engine
that can execute either locally in security agents on client devices or as cloud instances in a …
that can execute either locally in security agents on client devices or as cloud instances in a …
Distributed digital security system
DF Diehl, TJ Essebier - US Patent 11,711,379, 2023 - Google Patents
Security threats come in many forms, including computer viruses, worms, trojan horses,
spyware, keystroke loggers, adware, and rootkits. Such security threats may be delivered in …
spyware, keystroke loggers, adware, and rootkits. Such security threats may be delivered in …
Apparatus and method for detecting abnormal connection behavior based on analysis of network data
JH Lee, IK Kim - US Patent App. 15/004,412, 2017 - Google Patents
An apparatus and method for detecting abnormal connection behavior are disclosed. The
apparatus for detecting abnor mal connection behavior includes a data extraction unit, a …
apparatus for detecting abnor mal connection behavior includes a data extraction unit, a …