Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A firewall policy anomaly detection framework for reliable network security
One of the key challenges in computer networks is network security. For securing the
network, various solutions have been proposed, including network security protocols and …
network, various solutions have been proposed, including network security protocols and …
Security policy recommendation generation
S Krishna, K Kumar, R Mordani, R Popuri… - US Patent …, 2022 - Google Patents
Some embodiments provide a novel method for collecting and reporting attributes of data
flows associated with machines executing on a plurality of host computers to an analysis …
flows associated with machines executing on a plurality of host computers to an analysis …
[HTML][HTML] Características de la conectividad a internet en el cantón Pasaje
KG Pincay Romero - Revista Universidad y Sociedad, 2021 - scielo.sld.cu
Con el objetivo de caracterizar la conectividad a Internet en el Cantón Pasaje se desarrolló
una investigación de tipo descriptivo con enfoque cuantitativo fundamentada en los …
una investigación de tipo descriptivo con enfoque cuantitativo fundamentada en los …
Presenting data regarding grouped flows
R Mordani, S Vilayannur, S Nagar, A Patel… - US Patent …, 2023 - Google Patents
Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL
TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL …
TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL …
Recommendation generation based on selection of selectable elements of visual representation
S Krishna, K Kumar, R Mordani, A Shendure… - US Patent …, 2022 - Google Patents
Some embodiments provide a novel method for collecting and reporting attributes of data
flows associated with machines executing on a plurality of host computers to an analysis …
flows associated with machines executing on a plurality of host computers to an analysis …
A systematic study of network firewall and its implementation
This is an era of technology and with the rapid growth of the Internet, networks are
continuously growing. Companies are shifting from simple to more complex networks. Since …
continuously growing. Companies are shifting from simple to more complex networks. Since …
Ipsec/firewall security policy analysis: A survey
As the technology reliance increases, computer networks are getting bigger and larger and
so are threats and attacks. Therefore Network security becomes a major concern during this …
so are threats and attacks. Therefore Network security becomes a major concern during this …
Offloading anomaly detection from server to host
J Jayant, LU Russell, R Lund, AS Tiagi… - US Patent …, 2022 - Google Patents
Some embodiments provide a novel method for collecting and analyzing attributes of data
flows associated with machines executing on a plurality of host computers to detect …
flows associated with machines executing on a plurality of host computers to detect …
Host-based flow aggregation
J Jayant, LU Russell, L Loi, R Lund… - US Patent 11,398,987, 2022 - Google Patents
Some embodiments provide a novel method for collecting and reporting attributes of data
flows associated with machines executing on a plurality of host computers to an analysis …
flows associated with machines executing on a plurality of host computers to an analysis …
Dynamically providing keys to host for flow aggregation
J Jayant, LU Russell, L Loi, R Lund, A Poon - US Patent 11,288,256, 2022 - Google Patents
Some embodiments provide a novel method for collecting and reporting attributes of data
flows associated with machines executing on a plurality of host computers to an analysis …
flows associated with machines executing on a plurality of host computers to an analysis …