Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Big data in cybersecurity: a survey of applications and future trends
MM Alani - Journal of Reliable Intelligent Environments, 2021 - Springer
With over 4.57 billion people using the Internet in 2020, the amount of data being generated
has exceeded 2.5 quintillion bytes per day. This rapid increase in the generation of data has …
has exceeded 2.5 quintillion bytes per day. This rapid increase in the generation of data has …
Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for …
PD Ray, ABR Kumar, C Reed, AP Agarwal - US Patent 8,856,936, 2014 - Google Patents
Real time security, integrity, and reliability postures of opera tional (OT), information (IT), and
security (ST) systems, as well as slower changing security and operational blueprint …
security (ST) systems, as well as slower changing security and operational blueprint …
Detecting DNS fast-flux anomalies
S Ranjan - US Patent 8,260,914, 2012 - Google Patents
In general, in one aspect, the invention relates to a method for detecting automatically
generated malicious domain names in a network. The method includes identifying a plu …
generated malicious domain names in a network. The method includes identifying a plu …
Network anomaly detection
MJ Lefebvre, M Carver, E Ellett, W Negm… - US Patent …, 2016 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on computer
storage media, for determining network related anomaly scores. One of the methods …
storage media, for determining network related anomaly scores. One of the methods …
Multivariate network structure anomaly detector
J Stockdale, S Casey, A Preston - US Patent 10,986,121, 2021 - Google Patents
Primary Examiner Morshed Mehedi (74) Attorney, Agent, or Firm-Rutan & Tucker, LLP (57)
ABSTRACT A multivariate anomaly detector can detect a cyber-attack using incremental …
ABSTRACT A multivariate anomaly detector can detect a cyber-attack using incremental …
Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for …
PD Ray, ABR Kumar, C Reed, AP Agarwal - US Patent 9,628,501, 2017 - Google Patents
Real time security, integrity, and reliability postures of operational (OT), information (IT), and
security (ST) sys tems, as well as slower changing security and operational blueprint …
security (ST) sys tems, as well as slower changing security and operational blueprint …
Cybersecurity system
RL Grossman, JE Heath, RD Richardson… - US Patent …, 2016 - Google Patents
(57) ABSTRACT A cybersecurity system for processing events to produce scores, alerts, and
mitigation actions. The system includes sensors for receiving and processing data to form …
mitigation actions. The system includes sensors for receiving and processing data to form …
Machine learning based botnet detection with dynamic adaptation
S Ranjan, F Chen - US Patent 8,402,543, 2013 - Google Patents
Embodiments of the invention address the problem of detect ing bots in network traf? c
based on a classi? cation model learned during a training phase using machine learning …
based on a classi? cation model learned during a training phase using machine learning …
Heuristic botnet detection
X Wang, H **e - US Patent 8,555,388, 2013 - Google Patents
In some embodiments, heuristic botnet detection is provided. In some embodiments,
heuristic botnet detection includes monitoring network tra? ic to identify suspicious network …
heuristic botnet detection includes monitoring network tra? ic to identify suspicious network …
Identification of malware sites using unknown URL sites and newly registered DNS addresses
N Zuk, R Lazzarato, H **e - US Patent 9,473,528, 2016 - Google Patents
In some embodiments, identification of malware sites using unknown URL sites and newly
registered DNS addresses includes performing a heuristic analysis for information …
registered DNS addresses includes performing a heuristic analysis for information …