Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Systems and methods for threat identification and remediation
S Kumar, D Pollutro - US Patent 9,092,616, 2015 - Google Patents
Instrumented networks and platforms having target Subjects (devices, transactions, services,
users, organizations) are dis closed. A security orchestration service generates runtime …
users, organizations) are dis closed. A security orchestration service generates runtime …
Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
S Kumar, D Pollutro - US Patent 8,776,180, 2014 - Google Patents
7,797.544 7,882,221 7,979,696 7,984,304 8,010,469 8, 108,536 8,214,497 8,429.454
2005/0033987 2005/O132O31 2005, 01322O2 2005, 0138384 2005/0204404 …
2005/0033987 2005/O132O31 2005, 01322O2 2005, 0138384 2005/0204404 …
Malicious advertisement detection and remediation
A Ranadive, S Rizvi, NM Daswani - US Patent 8,516,590, 2013 - Google Patents
Sites that source JavaScript from external websites are vulnerable to malware infections.
Attackers often infect 3rd party widgets and JavaScript code hosted at other sites. If this …
Attackers often infect 3rd party widgets and JavaScript code hosted at other sites. If this …
Systems and methods for orchestrating runtime operational integrity
S Kumar, D Pollutro - US Patent 8,990,948, 2015 - Google Patents
Instrumented networks and platforms having target Subjects (devices, transactions, services,
users, organizations) are dis closed. A security orchestration service generates runtime …
users, organizations) are dis closed. A security orchestration service generates runtime …
Encrypted memory
AF Glew, DA Gerrity, CT Tegreene - US Patent 8,930,714, 2015 - Google Patents
(63) Continuation-in-part of application No. 13, 136,024, for an Incompletely Trusted
Environment”; 5'Symposium on Oper filed on Jul. 19, 2011, and a continuation-in-part of …
Environment”; 5'Symposium on Oper filed on Jul. 19, 2011, and a continuation-in-part of …
Security perimeter
AF Glew, DA Gerrity, CT Tegreene - US Patent 9,575,903, 2017 - Google Patents
See application file for complete search history. nicated with a processor, and a logic
operable to create at least one cryptographic security perimeter enclosing at least one …
operable to create at least one cryptographic security perimeter enclosing at least one …
Mitigating malware
NM Daswani, A Ranadive, S Rizvi - US Patent 8,370,938, 2013 - Google Patents
One way computers have traditionally been protected from unauthorized (and frequently
malicious) programs/modifica tions (hereinafter collectively “malware') is through the use of …
malicious) programs/modifica tions (hereinafter collectively “malware') is through the use of …
Adaptive scanning
T Demir, A Ranadive, S Rizvi, NM Daswani - US Patent 8,555,391, 2013 - Google Patents
Sites that scice JavaScript fron exteria websites are weable to aware infections. tackers often
infect 3rd party widgets and JavaScript code hosted at other sites. if this occurs with any of …
infect 3rd party widgets and JavaScript code hosted at other sites. if this occurs with any of …
Systems and methods for providing mobile security based on dynamic attestation
S Kumar, D Pollutro - US Patent 8,850,588, 2014 - Google Patents
Instrumented networks, machines and platforms having tar get Subjects (devices,
transactions, services, users, organiza tions) are disclosed. A security orchestration service …
transactions, services, users, organiza tions) are disclosed. A security orchestration service …
Fine-grained security in federated data sets
AF Glew, DA Gerrity, CT Tegreene - US Patent 8,943,313, 2015 - Google Patents
(57) ABSTRACT A data processing system, a server Such as a federated server, a computer
system, and like devices, and associated operating methods can be configured to Support …
system, and like devices, and associated operating methods can be configured to Support …