455 patents
Page 6 of 23
Utility
Systems and Methods for Detecting Insider Attacks on a Communication Network
23 Feb 23
Systems, methods, devices, and apparatus are discussed for detecting relatively rare attacks in a communication network, and in some cases for detecting insider attacks on a communication network.
Sameer Khanna
Filed: 16 Aug 22
Utility
Systems and Methods for Enabling Detection of Threats Based Upon Color
23 Feb 23
Systems, devices, and methods are disclosed for encoding behavioral information into an image format to facilitate image based behavioral identification.
Sameer Khanna
Filed: 2 Jun 22
Utility
Systems and Methods for Generating Synthetic Data Representing Insider Attacks
23 Feb 23
Systems, methods, devices, and apparatus are discussed for generating data that appears to be an insider attack.
Sameer Khanna
Filed: 16 Aug 22
Utility
Systems and Methods for Quantifying File Access Risk Exposure by an Endpoint In a Network Environment
23 Feb 23
Systems, devices, and methods are discussed for identifying possible improper file accesses by an endpoint device.
Sameer T. Khanna
Filed: 1 Sep 21
Utility
Systems and Methods for Training an Insider Attack Model Using Images Having Both Region Specificity and Spatial Relationships
23 Feb 23
Systems, devices, and methods are disclosed that may be used for identifying potential insider attacks on a computer network.
Sameer Khanna
Filed: 16 Aug 22
Utility
Systems and Methods for Encoding Behavioral Information into an Image Domain for Processing
23 Feb 23
Systems, devices, and methods are disclosed for encoding behavioral information into an image format to facilitate image based behavioral identification.
Sameer Khanna
Filed: 2 Jun 22
Utility
Systems and Methods for Using Vector Model Normal Exclusion In Natural Language Processing to Characterize a Category of Messages
23 Feb 23
Systems, devices, and methods are disclosed in relation to a vector space model that may be used to characterize a category of messages.
Sameer Khanna
Filed: 6 Jan 22
Utility
Detecting access points located within proximity of a computing device for troubleshooting of a network
21 Feb 23
Systems and methods for detecting access points proximate to a mobile computing device to facilitate wireless network troubleshooting and management of the access points are provided.
Jordan E. Thompson, Andrea Gottardo
Filed: 19 Mar 20
Utility
Leveraging user-behavior analytics for improved security event classification
21 Feb 23
Systems and methods for improving security event classification by leveraging user-behavior analytics are provided.
Udi Yavo, Roy Katmor, Ido Kelson
Filed: 10 Dec 19
Utility
Systems and Methods for Hierarchical Facial Image Clustering
16 Feb 23
Various systems and methods for for clustering facial images in, for example, surveillance systems.
Xihua Dong
Filed: 3 Nov 22
Utility
Systems and Methods for Posture Checking Across Local Network Zone Ztna Control
9 Feb 23
Systems, devices, and methods are discussed for providing ZTNA control across multiple related, but independently provisioned networks.
Robert A. May
Filed: 9 Aug 21
Utility
Malware identification using multiple artificial neural networks
7 Feb 23
Systems and methods for malware detection using multiple neural networks are provided.
Xu Yang
Filed: 2 Aug 18
Utility
Cloud-based Orchestration of Incident Response Using Multi-feed Security Event Classifications
2 Feb 23
Systems and methods for performing multi-feed classification of security events to facilitate automated IR orchestration are provided.
Udi Yavo, Roy Katmor, Ido Kelson
Filed: 3 Oct 22
Utility
Machine Learning Systems and Methods for API Discovery and Protection by URL Clustering With Schema Awareness
2 Feb 23
Various embodiments provide systems and methods for discovering APIs for use in relation to network application security.
Xihua Dong
Filed: 13 Jul 21
Utility
Performing threat detection by synergistically combining results of static file analysis and behavior analysis
24 Jan 23
Systems and methods are described for synergistically combining static file based detection and behavioral analysis to improve both threat detection time and accuracy.
Udi Yavo, Roy Katmor, Ido Kelson
Filed: 31 Dec 19
Utility
Machine-learning based approach for dynamically generating incident-specific playbooks for a security orchestration, automation and response (SOAR) platform
24 Jan 23
Systems and methods for a machine-learning based approach for dynamically generating incident-specific playbooks for a security orchestration and automated response (SOAR) platform are provided.
Abhishek Narula, Christopher Carsey, Amit Jain, Pooja Singh
Filed: 24 Mar 20
Utility
Cooperative adaptive network security protection
10 Jan 23
Systems and methods for improving the catch rate of attacks/malware by a cooperating group of network security devices are provided.
Aldo Di Mattia
Filed: 10 Jun 19
Utility
Machine Learning Capable Mac Filtering for Enforcing Edge Security Over Mac Randomization In Wlan Networks
5 Jan 23
Specific connection request is refused responsive to a match on the MAC ban list.
Srinivasa Subbarao Neeli
Filed: 30 Jun 21
Utility
Automatic Link Aggregation for Incompatible Data Ports on a Computer Network
5 Jan 23
An aggregate port selection is received from user to bundle at least two individual data ports of the network device for single channel data transfer.
Sekhar Sumanth Gorajala Chandra
Filed: 30 Jun 21
Utility
Enforcing Javascript for Mitb Detection
5 Jan 23
A request for a confidential web page, and in response, can transmit an HTML code snippet to a browser running on a network device coupled to the data communication network to determine whether JavaScript is enabled locally at the network device.
Radhesh Ramakant Walwadkar
Filed: 30 Jun 21