Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Technique for implementing memory views using a layered virtualization architecture
U Steinberg, OA Ismael - US Patent 10,191,861, 2019 - Google Patents
ABSTRACT A technique implements memory views using a virtualiza tion layer of a
virtualization architecture executing on a node of a network environment. The virtualization …
virtualization architecture executing on a node of a network environment. The virtualization …
System and method for protecting memory pages associated with a process using a virtualization layer
U Steinberg - US Patent 10,216,927, 2019 - Google Patents
(Continued) Primary Examiner—Tuan V Thai (74) Attorney, Agent, or Firm—Rutan & Tucker,
LLP (57) ABSTRACT A computerized method is provided for protecting processes operating …
LLP (57) ABSTRACT A computerized method is provided for protecting processes operating …
System and method of threat detection under hypervisor control
A Kabra, J Stecklina, H Rathor, U Steinberg - US Patent 10,033,759, 2018 - Google Patents
(Continued) Primary Examiner—Lisa C Lewis (74) Attorney, Agent, or Firm—Rutan &
Tucker, LLP ABSTRACT A computing device is described that comprises one or more …
Tucker, LLP ABSTRACT A computing device is described that comprises one or more …
Late load technique for deploying a virtualization layer underneath a running operating system
U Steinberg, NS Kulkarni - US Patent 10,108,446, 2018 - Google Patents
A late load technique deploys a virtualization layer under neath an operating system
executing on a node of a network environment to enable the virtualization layer to control the …
executing on a node of a network environment to enable the virtualization layer to control the …
Exploit detection system with threat-aware microvisor
OA Ismael, A Aziz - US Patent 9,507,935, 2016 - Google Patents
An exploit detection system deploys a threat-aware micro visor to facilitate real-time security
analysis, including exploit detection and threat intelligence, of an operating system process …
analysis, including exploit detection and threat intelligence, of an operating system process …
Systems and methods for detecting data drift for data used in machine learning models
(57) ABSTRACT A system and method for detecting data drift is disclosed. The system may
be configured to perform a method, the method including receiving model training data and …
be configured to perform a method, the method including receiving model training data and …
Fully automated machine learning system which generates and optimizes solutions given a dataset and a desired outcome
Automated systems and methods for optimizing a model are disclosed. For example, in an
embodiment, a method for optimizing a model may comprise receiving a data input that …
embodiment, a method for optimizing a model may comprise receiving a data input that …
Technique for establishing secure communication between host and guest processes of a virtualization architecture
U Steinberg - US Patent 10,846,117, 2020 - Google Patents
Secure communication is established between a hyper process of the virtualization layer
(eg, host) and an agent process in the guest operating system (eg, guest) using a virtual …
(eg, host) and an agent process in the guest operating system (eg, guest) using a virtual …
Technique for protecting guest processes using a layered virtualization architecture
U Steinberg - US Patent 10,447,728, 2019 - Google Patents
US10447728B1 - Technique for protecting guest processes using a layered virtualization
architecture - Google Patents US10447728B1 - Technique for protecting guest processes …
architecture - Google Patents US10447728B1 - Technique for protecting guest processes …
System and method for protecting a software component running in virtual machine using a virtualization layer
U Steinberg - US Patent 10,642,753, 2020 - Google Patents
(57) ABSTRACT A computing device features one or more hardware proces sors and a
memory that is coupled to the one or more processors. The memory comprises software that …
memory that is coupled to the one or more processors. The memory comprises software that …