889 patents
Page 3 of 45
Utility
Infection risk prediction
5 Dec 23
An infection risk prediction system may receive a query associated with an infection risk assessment for a geographic location for an infectious disease and obtain associated infectious disease data.
Robi Fazio, Christian Souche, Alexandre Naressi
Filed: 12 Apr 21
Utility
Resource-efficient generation of analytical attack graphs
5 Dec 23
Implementations include evaluating a first sub-set of rules based on a first sub-set of facts to provide a first set of impacts, evaluating including applying the first sub-set of facts to each rule using a hash join operation to determine whether a rule results in an impact, indexes of arguments of facts being used in a probe phase of the hash join operation, evaluating a second sub-set of rules using impacts of the first set of impacts to provide a second set of impacts, determining whether each goal in a set of goals has been achieved using the first set of impacts and the second set of impacts, each goal being provided as an impact, in response to determining that each goal in the set of goals has been achieved, removing paths of the AAG, each of the paths resulting in an impact that is not a goal.
Alexander Basovskiy, Dmitry Kravchenko, Avraham Dayan, Moshe Hadad
Filed: 1 Jul 22
Utility
Generating attack graphs in agile security platforms
5 Dec 23
Implementations of the present disclosure include providing graph data defining a graph that is representative of an enterprise network, the graph including nodes and edges between nodes, each node representing an asset within the enterprise network, and each edge representing one or more lateral attack paths between assets in the enterprise network, determining, for each node, an incoming value based on attributes of a set of incoming edges and an outgoing value based on attributes of a set of outgoing edges, the attributes including a number of edges and semantic types of the edges, at least one cardinality value of each node being determined based on one or more of the incoming value and the outgoing value of the node, receiving input representative of filter parameters, generating a sub-graph based on attributes of the nodes and the filter parameters, and displaying, by the visualization platform, the sub-graph in a display.
Eitan Hadar, Amin Hassanzadeh, Lisa O'Connor
Filed: 20 Oct 21
Utility
Artificial intelligence (AI)-based malware detection
5 Dec 23
Implementations include receiving flow data representative of communication traffic of the network, determining that at least one blacklisted Internet protocol (IP) address is present in the flow data, and in response: providing a set of high-dimensional flow representations of network traffic by processing historical flow data through a deep learning (DL) model, providing a set of low-dimensional flow representations of the network traffic based on the set of high-dimensional flow representations, and labeling at least a portion of the set of low-dimensional flow representations to provide a sub-set of labeled low-dimensional flow representations and a sub-set of unlabeled low-dimensional flow representations, and identifying a host associated with an unlabeled low-dimensional flow representation as a potentially malicious host, and in response, automatically executing a remedial action with respect to the potentially malicious host.
Vicknesh Manoselvam, Boon Siew Seah, Kamal Mannar
Filed: 26 Jul 19
Utility
Utilizing machine learning models to process resource usage data and to determine anomalous usage of resources
5 Dec 23
A device receives historical data associated with multiple cloud computing environments, trains one or more machine learning models, with the historical data, to generate trained machine learning models that generate outputs, and trains a model with the outputs to generate a trained model.
Kun Qiu, Vijay Desai, Laser Seymour Kaplan, Durga Kalyan Ganjapu, Daniel Marcus Lombardo
Filed: 26 Aug 19
Utility
Utilizing a neural network model to generate a reference image based on a combination of images
5 Dec 23
A device may receive complex data from a user device and may provide multiple images to the user device based on receiving the complex data.
Christian Souche, Edouard Mathon, Ji Tang
Filed: 23 Mar 21
Utility
Slip-to-slip connection time on oil rigs with computer vision
5 Dec 23
Aspects of the present disclosure provide systems, methods, and computer-readable storage media that support activity recognition using image or video processing (e.g., computer vision) and machine learning.
Adriano De Araújo Abreu Mourão, Hugo Zanini Gomes, Rogerio Cosendey Labanca, Rafael Soares Mendonça, Paulo Henrique Barchi, Renato Mintz
Filed: 22 Nov 21
Utility
Systems and Methods for Generating Digital Twins
30 Nov 23
Aspects of the present disclosure provide systems, methods, and computer-readable storage media that support ontology driven processes to generate digital twins having extended capabilities.
Zaid Tashman, Matthew Kujawinski, Sanjoy Paul, Neda Abolhassani
Filed: 30 May 22
Utility
System for Modelling a Distributed Computer System of an Enterprise As a Monolithic Entity Using a Digital Twin
30 Nov 23
Aspects of the present disclosure provide systems, methods, apparatus, and computer-readable storage media that support creating and leveraging digital twins to model multiple physical systems of an enterprise as a monolithic computer system.
Debashish Roy, Cory King, Brent Shaffer
Filed: 26 May 22
Utility
On-site Artificial Intelligence Application Programming Interfaces for Routing and Adapting Traffic
30 Nov 23
In some implementations, an application programming interfaces (API) manager may receive, at a set of artificial intelligence (AI) APIs, a set of inputs from a set of on-site devices.
Rajul AGARWAL, Teresa Sheausan TUNG, Bepeta MALLIKARJUN, Venkata Narasimhan KODUVAYUR RAGHURAM
Filed: 26 May 22
Utility
Heuristics-based processing of electronic document contents
28 Nov 23
A computer-implemented method for obtaining content of a document is provided.
Ameet Sunil Chaubal, Paulina Sperling, Ruth Anne Sullivan, Abhishek Kumar, Bradley Roy Hardwick, Jr.
Filed: 16 Sep 22
Utility
Sustainable resources exchange method and system
28 Nov 23
A system to facilitate the exchange and re-use of industrial waste and byproduct materials that have a reuse possibility is disclosed.
Sahil Raj, Mithilesh Kumar, Saumya Tiwari
Filed: 25 Aug 21
Utility
Process risk calculation based on hardness of attack paths
28 Nov 23
Implementations are directed to receiving analytical attack graph (AAG) data representative of one or more AAGs, each AAG representing one or more lateral paths between configuration items within an enterprise network, calculating, for each configuration item in a set of configuration items, a process risk value for each impact in a set of impacts achievable within the configuration item, for a first impact, a first process risk value being calculated based on a multi-path formula in response to determining that multiple paths in the AAG lead to the first impact, and, for a second impact, a second process risk value being calculated based on a single-path formula in response to determining that a single path in the AAG leads to the second impact, and determining that at least one process risk value exceeds a threshold process risk value, and in response, adjusting one or more security controls within the enterprise network.
Amin Hassanzadeh, Anup Nayak, MD Sharif Ullah
Filed: 26 Oct 20
Utility
Analytical Attack Graph Abstraction for Resource-efficiencies
23 Nov 23
Implementations include methods, systems, computer-readable storage medium for mitigating cyber security risk of an enterprise network.
Nimrod Busany, Dan Klein, Rafi Shalom
Filed: 16 May 23
Utility
Energy Usage Determination for Machine Learning
23 Nov 23
In some implementations, a device may receive a configuration associated with a machine learning model.
Vibhu Saujanya SHARMA, Vikrant S. KAULGUD, Jhilam BERA, Samarth SIKAND, Adam Patten BURDEN
Filed: 17 May 22
Utility
Model control platform
21 Nov 23
The present disclosure relates to a system and a method for model control platform stack.
Jean-Luc Chatelain, Louis Gerald Farfan, Teresa Sheausan Tung, Fabio Bucci
Filed: 9 Jun 20
Utility
Method and system for detection of misinformation
21 Nov 23
A system and method for automatically detecting misinformation is disclosed.
Shubhashis Sengupta, Milind Savagaonkar, Nidhi, Tanmoy Chakraborty, William Scott Paka, Rachit Bansal
Filed: 14 Oct 21
Utility
Generating attack graphs in agile security platforms
21 Nov 23
Implementations of the present disclosure include providing, by a security platform, graph data defining a graph that is representative of an enterprise network, the graph including nodes and edges between nodes, a set of nodes representing respective assets within the enterprise network, and a node representing a process executed within a system of the enterprise, each edge representing at least a portion of one or more lateral paths between assets in the enterprise network, determining, for each asset, a contribution value indicating a contribution of a respective asset to operation of the process, determining, for each asset, an impact value based on a total value of the process and a respective contribution value of the asset, and implementing one or more remediations based on a set of impact values determined for the assets, each remediation mitigating a cyber-security risk within the enterprise network.
Eitan Hadar, Amin Hassanzadeh, Dani Grabois, Gil Fidel, Avraham Dayan
Filed: 7 Mar 22
Utility
Early pattern detection in data for improved enterprise operations
21 Nov 23
Implementations of the present disclosure include receiving a goal, providing a problem-specific knowledge graph that is responsive to at least a portion of the goal, determining a set of events from the problem-specific knowledge graph, processing data representative of events in the set of events through a first machine learning (ML) model to provide a set of event scores, each event score in the set of event scores being associated with a respective event in the set of events, determining a sub-set of events based on the set of event scores, for each event in the sub-set of events, determining at least one action by processing a sequence of actions through a second ML model, and outputting the sub-set of events and a set of actions for execution of at least one action in the set of actions.
Lan Guan, Guanglei Xiong, Wenxian Zhang, Sukryool Kang, Anwitha Paruchuri, Jing Su Brewer, Ivan A. Wong, Christopher Yen-Chu Chan, Danielle Moffat, Jayashree Subrahmonia, Louise Noreen Barrere
Filed: 8 Jul 21
Utility
Intelligent communication manager and summarizer
21 Nov 23
Examples of a system for intelligent communication management for content summarization are provided.
Coline Doebelin, Christian Souche, Victor Chevalier
Filed: 26 Mar 20