Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Mitigating communication risk by detecting similarity to a trusted message contact
BM Jakobsson, TC Loder, JR Rideout… - US Patent …, 2019 - Google Patents
(57) ABSTRACT A measure of similarity between an identifier of a sender of the message
and each identifier of one or more identifiers of each trusted contact of a plurality of trusted …
and each identifier of one or more identifiers of each trusted contact of a plurality of trusted …
Using a measure of influence of sender in determining a security risk associated with an electronic message
BM Jakobsson, S McNamara, PR Peterson… - US Patent …, 2021 - Google Patents
(57) ABSTRACT A measure of influence of a sender entity is determined for a message
receiving entity based at least in part on an analysis of previous electronic messages sent by …
receiving entity based at least in part on an analysis of previous electronic messages sent by …
Systems and methods for threat identification and remediation
S Kumar, D Pollutro - US Patent 9,092,616, 2015 - Google Patents
Instrumented networks and platforms having target Subjects (devices, transactions, services,
users, organizations) are dis closed. A security orchestration service generates runtime …
users, organizations) are dis closed. A security orchestration service generates runtime …
Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
S Kumar, D Pollutro - US Patent 8,776,180, 2014 - Google Patents
7,797.544 7,882,221 7,979,696 7,984,304 8,010,469 8, 108,536 8,214,497 8,429.454
2005/0033987 2005/O132O31 2005, 01322O2 2005, 0138384 2005/0204404 …
2005/0033987 2005/O132O31 2005, 01322O2 2005, 0138384 2005/0204404 …
Systems and methods for orchestrating runtime operational integrity
S Kumar, D Pollutro - US Patent 8,990,948, 2015 - Google Patents
Instrumented networks and platforms having target Subjects (devices, transactions, services,
users, organizations) are dis closed. A security orchestration service generates runtime …
users, organizations) are dis closed. A security orchestration service generates runtime …
System and method for determining and using local reputations of users and hosts to protect information in a network environment
GH Cooper, DF Diehl, MW Green, R Ma - US Patent 8,931,043, 2015 - Google Patents
5.255. 642 A 8, 1993 Wobber et al. 2002/0051575 A1 5/2002 Myers et al. 5,239.466 A
8/1993 Morgan et al. 2002fOO59454 A1 5, 2002 Barrett et al. 5,247,661 A 9/1993 Hager et …
8/1993 Morgan et al. 2002fOO59454 A1 5, 2002 Barrett et al. 5,247,661 A 9/1993 Hager et …
Prioritizing network traffic
US PATENT DOCUMENTS 4,289.930 A 9/1981 Connolly et al. 4,384.325 A 5, 1983 Slechta
et al. 4,386,416 A 5, 1983 Giltner et al. 4,532.588 A 7, 1985 Foster 4,713,780 A 12/1987 …
et al. 4,386,416 A 5, 1983 Giltner et al. 4,532.588 A 7, 1985 Foster 4,713,780 A 12/1987 …
Detecting computer security risk based on previously observed communications
BM Jakobsson - US Patent 10,715,543, 2020 - Google Patents
Information about an electronic message that is from a sender for an intended recipient is
received. It is determined whether an electronic message account of the sender of the …
received. It is determined whether an electronic message account of the sender of the …
Systems and methods for providing mobile security based on dynamic attestation
S Kumar, D Pollutro - US Patent 8,850,588, 2014 - Google Patents
Instrumented networks, machines and platforms having tar get Subjects (devices,
transactions, services, users, organiza tions) are disclosed. A security orchestration service …
transactions, services, users, organiza tions) are disclosed. A security orchestration service …
System and method for malware and network reputation correlation
D Alperovitch, S Krasser - US Patent 9,122,877, 2015 - Google Patents
(57) ABSTRACT A method is provided in one example embodiment and includes receiving
a reputation value based on a hash of a file making a network connection and on a network …
a reputation value based on a hash of a file making a network connection and on a network …