CA2938580C - Application execution control utilizing ensemble machine learning for discernment - Google Patents

Application execution control utilizing ensemble machine learning for discernment Download PDF

Info

Publication number
CA2938580C
CA2938580C CA2938580A CA2938580A CA2938580C CA 2938580 C CA2938580 C CA 2938580C CA 2938580 A CA2938580 A CA 2938580A CA 2938580 A CA2938580 A CA 2938580A CA 2938580 C CA2938580 C CA 2938580C
Authority
CA
Canada
Prior art keywords
program
execute
features
executing
preventing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA2938580A
Other languages
English (en)
French (fr)
Other versions
CA2938580A1 (en
Inventor
Ryan PERMEH
Derek A. Soeder
Glenn Chisholm
Braden RUSSELL
Gary Golomb
Matthew Wolff
Stuart MCCLURE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cylance Inc
Original Assignee
Cylance Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cylance Inc filed Critical Cylance Inc
Publication of CA2938580A1 publication Critical patent/CA2938580A1/en
Application granted granted Critical
Publication of CA2938580C publication Critical patent/CA2938580C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Mathematical Physics (AREA)
  • Debugging And Monitoring (AREA)
  • Stored Programmes (AREA)
  • User Interface Of Digital Computer (AREA)
CA2938580A 2014-02-07 2015-02-06 Application execution control utilizing ensemble machine learning for discernment Active CA2938580C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201461937379P 2014-02-07 2014-02-07
US61/937,379 2014-02-07
PCT/US2015/014769 WO2015120243A1 (en) 2014-02-07 2015-02-06 Application execution control utilizing ensemble machine learning for discernment

Publications (2)

Publication Number Publication Date
CA2938580A1 CA2938580A1 (en) 2015-08-13
CA2938580C true CA2938580C (en) 2022-08-16

Family

ID=52633591

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2938580A Active CA2938580C (en) 2014-02-07 2015-02-06 Application execution control utilizing ensemble machine learning for discernment

Country Status (6)

Country Link
US (2) US10235518B2 (enExample)
EP (1) EP3103070B1 (enExample)
JP (1) JP6662782B2 (enExample)
AU (1) AU2015213797B2 (enExample)
CA (1) CA2938580C (enExample)
WO (1) WO2015120243A1 (enExample)

Families Citing this family (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015120243A1 (en) 2014-02-07 2015-08-13 Cylance Inc. Application execution control utilizing ensemble machine learning for discernment
EP3256998A1 (en) 2015-02-11 2017-12-20 British Telecommunications Public Limited Company Validating computer resource usage
US9465940B1 (en) 2015-03-30 2016-10-11 Cylance Inc. Wavelet decomposition of software entropy to identify malware
US9495633B2 (en) 2015-04-16 2016-11-15 Cylance, Inc. Recurrent neural networks for malware analysis
US10956614B2 (en) 2015-07-31 2021-03-23 British Telecommunications Public Limited Company Expendable access control
EP3329440A1 (en) 2015-07-31 2018-06-06 British Telecommunications public limited company Controlled resource provisioning in distributed computing environments
EP3329409A1 (en) 2015-07-31 2018-06-06 British Telecommunications public limited company Access control
KR101625660B1 (ko) * 2015-11-20 2016-05-31 한국지질자원연구원 지구통계기법에서의 관측자료를 이용한 2차자료 생성 방법
US9602531B1 (en) 2016-02-16 2017-03-21 Cylance, Inc. Endpoint-based man in the middle attack detection
US10423787B2 (en) 2016-02-23 2019-09-24 Carbon Black, Inc. Cybersecurity systems and techniques
WO2017147441A1 (en) * 2016-02-26 2017-08-31 Cylance Inc. Sub-execution environment controller
US9928363B2 (en) * 2016-02-26 2018-03-27 Cylance Inc. Isolating data for analysis to avoid malicious attacks
US11153091B2 (en) 2016-03-30 2021-10-19 British Telecommunications Public Limited Company Untrusted code distribution
EP3437290B1 (en) 2016-03-30 2020-08-26 British Telecommunications public limited company Detecting computer security threats
US11159549B2 (en) 2016-03-30 2021-10-26 British Telecommunications Public Limited Company Network traffic threat identification
WO2017167547A1 (en) 2016-03-30 2017-10-05 British Telecommunications Public Limited Company Cryptocurrencies malware based detection
WO2017167548A1 (en) 2016-03-30 2017-10-05 British Telecommunications Public Limited Company Assured application services
US10681059B2 (en) 2016-05-25 2020-06-09 CyberOwl Limited Relating to the monitoring of network security
CN105975861A (zh) * 2016-05-27 2016-09-28 百度在线网络技术(北京)有限公司 应用检测方法和装置
US10586171B2 (en) 2016-05-31 2020-03-10 International Business Machines Corporation Parallel ensemble of support vector machines
EP3469777B1 (en) * 2016-06-08 2022-08-03 Cylance Inc. Deployment of machine learning models for discernment of threats
WO2018039792A1 (en) 2016-08-31 2018-03-08 Wedge Networks Inc. Apparatus and methods for network-based line-rate detection of unknown malware
KR102896234B1 (ko) * 2016-12-16 2025-12-08 삼성전자주식회사 인식 방법 및 인식 장치
CN110249304B (zh) 2017-01-19 2023-05-23 三星电子株式会社 电子设备的视觉智能管理
US10909371B2 (en) * 2017-01-19 2021-02-02 Samsung Electronics Co., Ltd. System and method for contextual driven intelligence
EP3382591B1 (en) 2017-03-30 2020-03-25 British Telecommunications public limited company Hierarchical temporal memory for expendable access control
EP3602369B1 (en) 2017-03-30 2022-03-30 British Telecommunications public limited company Anomaly detection for computer systems
US11586751B2 (en) 2017-03-30 2023-02-21 British Telecommunications Public Limited Company Hierarchical temporal memory for access control
US20180308008A1 (en) * 2017-04-25 2018-10-25 Xaxis, Inc. Double Blind Machine Learning Insight Interface Apparatuses, Methods and Systems
EP3622447A1 (en) 2017-05-08 2020-03-18 British Telecommunications Public Limited Company Interoperation of machine learning algorithms
WO2018206408A1 (en) 2017-05-08 2018-11-15 British Telecommunications Public Limited Company Management of interoperating machine leaning algorithms
WO2018206406A1 (en) 2017-05-08 2018-11-15 British Telecommunications Public Limited Company Adaptation of machine learning algorithms
US11698818B2 (en) 2017-05-08 2023-07-11 British Telecommunications Public Limited Company Load balancing of machine learning algorithms
US10958422B2 (en) * 2017-06-01 2021-03-23 Cotiviti, Inc. Methods for disseminating reasoning supporting insights without disclosing uniquely identifiable data, and systems for the same
US10592666B2 (en) * 2017-08-31 2020-03-17 Micro Focus Llc Detecting anomalous entities
CN107944259A (zh) * 2017-11-21 2018-04-20 广东欧珀移动通信有限公司 应用启动的管控方法、装置及存储介质和移动终端
US10360482B1 (en) * 2017-12-04 2019-07-23 Amazon Technologies, Inc. Crowd-sourced artificial intelligence image processing services
KR102456579B1 (ko) 2017-12-07 2022-10-20 삼성전자주식회사 암호화 관련 취약점 공격에 강인한 전자 장치 및 그 방법
US11164086B2 (en) 2018-07-09 2021-11-02 International Business Machines Corporation Real time ensemble scoring optimization
CN109167882A (zh) * 2018-09-27 2019-01-08 努比亚技术有限公司 一种应用关联启动控制方法、终端及计算机可读存储介质
KR102277172B1 (ko) * 2018-10-01 2021-07-14 주식회사 한글과컴퓨터 인공 신경망 선택 장치 및 방법
US11321611B2 (en) 2018-10-03 2022-05-03 International Business Machines Corporation Deployment verification of authenticity of machine learning results
US10880328B2 (en) * 2018-11-16 2020-12-29 Accenture Global Solutions Limited Malware detection
US12126618B1 (en) * 2018-12-04 2024-10-22 Arista Networks, Inc. System and method for identifying an application initiating a communication in a computing environment
BR112021019429A2 (pt) * 2019-04-02 2021-11-30 Trinomial Global Ltd Gerenciamento remoto de um dispositivo de usuário
US11144735B2 (en) 2019-04-09 2021-10-12 International Business Machines Corporation Semantic concept scorer based on an ensemble of language translation models for question answer system
CN110362995B (zh) * 2019-05-31 2022-12-02 电子科技大学成都学院 一种基于逆向与机器学习的恶意软件检测及分析系统
US11620207B2 (en) 2020-01-08 2023-04-04 International Business Machines Corporation Power efficient machine learning in cloud-backed mobile systems
KR102330081B1 (ko) * 2020-11-20 2021-11-23 부산대학교 산학협력단 블록체인 기반 안드로이드 악성 앱 탐지 앙상블 모델의 운영 방법 및 장치
EP4256488A4 (en) * 2020-12-02 2024-11-13 Deep Forest Sciences, Inc. Differentiable machines for physical systems
KR20230089966A (ko) * 2021-12-14 2023-06-21 주식회사 엔젤게임즈 인공 지능 로봇의 학습 및 인공 지능 로봇을 학습시키는 인공 지능 모델의 거래를 제어하는 방법 및 시스템
KR102396237B1 (ko) * 2022-02-09 2022-05-10 주식회사 샌즈랩 사이버 위협 정보 처리 장치, 사이버 위협 정보 처리 방법 및 사이버 위협 정보 처리하는 프로그램을 저장하는 저장매체
US12066908B2 (en) * 2022-07-29 2024-08-20 Dell Products Lp System and method for predicting and avoiding hardware failures using classification supervised machine learning
AR130508A1 (es) * 2022-09-16 2024-12-11 Traive Inc Arquitectura compuesta de aprendizaje automático para la inferencia basada en múltiples modelos subsidiarios

Family Cites Families (85)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5841947A (en) * 1996-07-12 1998-11-24 Nordin; Peter Computer implemented machine learning method and system
US6430590B1 (en) 1999-01-29 2002-08-06 International Business Machines Corporation Method and apparatus for processing executable program modules having multiple dependencies
US6546551B1 (en) 1999-09-28 2003-04-08 International Business Machines Corporation Method for accurately extracting library-based object-oriented applications
US7181768B1 (en) 1999-10-28 2007-02-20 Cigital Computer intrusion detection system and method based on application monitoring
US20110238855A1 (en) * 2000-09-25 2011-09-29 Yevgeny Korsunsky Processing data flows with a data flow processor
US6898737B2 (en) * 2001-05-24 2005-05-24 Microsoft Corporation Automatic classification of event data
US7065764B1 (en) 2001-07-20 2006-06-20 Netrendered, Inc. Dynamically allocated cluster system
AU2003259797A1 (en) 2002-08-05 2004-02-23 Fish, Robert System and method of parallel pattern matching
CN1839391A (zh) 2003-06-25 2006-09-27 美国西门子医疗解决公司 用于乳房成像的自动诊断和决策支持的系统和方法
JP2005044330A (ja) * 2003-07-24 2005-02-17 Univ Of California San Diego 弱仮説生成装置及び方法、学習装置及び方法、検出装置及び方法、表情学習装置及び方法、表情認識装置及び方法、並びにロボット装置
US8301584B2 (en) * 2003-12-16 2012-10-30 International Business Machines Corporation System and method for adaptive pruning
JP4482796B2 (ja) 2004-03-26 2010-06-16 ソニー株式会社 情報処理装置および方法、記録媒体、並びにプログラム
US20060047807A1 (en) 2004-08-25 2006-03-02 Fujitsu Limited Method and system for detecting a network anomaly in a network
US20060112388A1 (en) 2004-11-22 2006-05-25 Masaaki Taniguchi Method for dynamic scheduling in a distributed environment
US20090282070A1 (en) * 2004-12-01 2009-11-12 Nec Corporation Application contention management system method thereof, and information processing terminal using the same
JP4654776B2 (ja) 2005-06-03 2011-03-23 富士ゼロックス株式会社 質問応答システム、およびデータ検索方法、並びにコンピュータ・プログラム
US7716645B2 (en) 2005-06-10 2010-05-11 International Business Machines Corporation Using atomic sets of memory locations
US7945902B1 (en) 2005-07-13 2011-05-17 Oracle America, Inc. Detection of non-standard application programming interface usage via analysis of executable code
US7912698B2 (en) * 2005-08-26 2011-03-22 Alexander Statnikov Method and system for automated supervised data analysis
US20080134326A2 (en) 2005-09-13 2008-06-05 Cloudmark, Inc. Signature for Executable Code
US7536373B2 (en) * 2006-02-14 2009-05-19 International Business Machines Corporation Resource allocation using relational fuzzy modeling
JP2007280031A (ja) * 2006-04-06 2007-10-25 Sony Corp 情報処理装置および方法、並びにプログラム
WO2007135723A1 (ja) * 2006-05-22 2007-11-29 Fujitsu Limited ニューラルネットワーク学習装置、方法、及びプログラム
WO2008055156A2 (en) * 2006-10-30 2008-05-08 The Trustees Of Columbia University In The City Of New York Methods, media, and systems for detecting an anomalous sequence of function calls
JP2008129714A (ja) * 2006-11-17 2008-06-05 Univ Of Tsukuba 異常検知方法、異常検知装置及び異常検知用プログラム並びに学習モデル生成方法
US8370818B2 (en) 2006-12-02 2013-02-05 Time Warner Cable Inc. Methods and apparatus for analyzing software interface usage
US20080133571A1 (en) 2006-12-05 2008-06-05 International Business Machines Corporation Modifying Behavior in Messaging Systems According to Organizational Hierarchy
US9009649B2 (en) 2007-05-16 2015-04-14 Accenture Global Services Limited Application search tool for rapid prototyping and development of new applications
KR100942795B1 (ko) 2007-11-21 2010-02-18 한국전자통신연구원 악성프로그램 탐지장치 및 그 방법
US7958068B2 (en) * 2007-12-12 2011-06-07 International Business Machines Corporation Method and apparatus for model-shared subspace boosting for multi-label classification
US8364528B2 (en) * 2008-05-06 2013-01-29 Richrelevance, Inc. System and process for improving product recommendations for use in providing personalized advertisements to retail customers
US8347272B2 (en) 2008-07-23 2013-01-01 International Business Machines Corporation Call graph dependency extraction by static source code analysis
US8108325B2 (en) * 2008-09-15 2012-01-31 Mitsubishi Electric Research Laboratories, Inc. Method and system for classifying data in system with limited memory
US8504504B2 (en) 2008-09-26 2013-08-06 Oracle America, Inc. System and method for distributed denial of service identification and prevention
US20100082400A1 (en) * 2008-09-29 2010-04-01 Yahoo! Inc.. Scoring clicks for click fraud prevention
US20100107245A1 (en) * 2008-10-29 2010-04-29 Microsoft Corporation Tamper-tolerant programs
US8505015B2 (en) 2008-10-29 2013-08-06 Teradata Us, Inc. Placing a group work item into every prioritized work queue of multiple parallel processing units based on preferred placement of the work queues
US9239740B2 (en) 2009-06-16 2016-01-19 Microsoft Technology Licensing, Llc Program partitioning across client and cloud
US8726254B2 (en) 2009-06-20 2014-05-13 Microsoft Corporation Embedded annotation and program analysis
US8370613B1 (en) * 2009-06-30 2013-02-05 Symantec Corporation Method and apparatus for automatically optimizing a startup sequence to improve system boot time
US8560465B2 (en) * 2009-07-02 2013-10-15 Samsung Electronics Co., Ltd Execution allocation cost assessment for computing systems and environments including elastic computing systems and environments
US8429097B1 (en) * 2009-08-12 2013-04-23 Amazon Technologies, Inc. Resource isolation using reinforcement learning and domain-specific constraints
US9081958B2 (en) 2009-08-13 2015-07-14 Symantec Corporation Using confidence about user intent in a reputation system
US8516452B2 (en) 2009-12-08 2013-08-20 International Business Machines Corporation Feedback-directed call graph expansion
US8818923B1 (en) 2011-06-27 2014-08-26 Hrl Laboratories, Llc Neural network device with engineered delays for pattern storage and matching
US8887163B2 (en) 2010-06-25 2014-11-11 Ebay Inc. Task scheduling based on dependencies and resources
US8856545B2 (en) * 2010-07-15 2014-10-07 Stopthehacker Inc. Security level determination of websites
US8359223B2 (en) * 2010-07-20 2013-01-22 Nec Laboratories America, Inc. Intelligent management of virtualized resources for cloud database systems
US9262228B2 (en) 2010-09-23 2016-02-16 Microsoft Technology Licensing, Llc Distributed workflow in loosely coupled computing
US9349006B2 (en) 2010-11-29 2016-05-24 Beijing Qihoo Technology Company Limited Method and device for program identification based on machine learning
AU2011336466C1 (en) * 2010-12-01 2017-01-19 Cisco Technology, Inc. Detecting malicious software through contextual convictions, generic signatures and machine learning techniques
US8549647B1 (en) 2011-01-14 2013-10-01 The United States Of America As Represented By The Secretary Of The Air Force Classifying portable executable files as malware or whiteware
US9398033B2 (en) 2011-02-25 2016-07-19 Cavium, Inc. Regular expression processing automaton
WO2012117420A1 (en) * 2011-02-28 2012-09-07 Flytxt Technology Pvt. Ltd. System and method for user classification and statistics in telecommunication network
US8990149B2 (en) * 2011-03-15 2015-03-24 International Business Machines Corporation Generating a predictive model from multiple data sources
US9286182B2 (en) * 2011-06-17 2016-03-15 Microsoft Technology Licensing, Llc Virtual machine snapshotting and analysis
US8631395B2 (en) 2011-09-02 2014-01-14 Microsoft Corporation Inter-procedural dead catch handler optimizations
US9329887B2 (en) 2011-10-19 2016-05-03 Hob Gmbh & Co. Kg System and method for controlling multiple computer peripheral devices using a generic driver
US20130152200A1 (en) 2011-12-09 2013-06-13 Christoph Alme Predictive Heap Overflow Protection
CN103186406B (zh) 2011-12-30 2016-08-17 国际商业机器公司 用于控制流分析的方法和装置
US8713684B2 (en) 2012-02-24 2014-04-29 Appthority, Inc. Quantifying the risks of applications for mobile devices
US8627291B2 (en) 2012-04-02 2014-01-07 International Business Machines Corporation Identification of localizable function calls
US20150113539A1 (en) * 2012-05-25 2015-04-23 Nec Europe Ltd. Method for executing processes on a worker machine of a distributed computing system and a distributed computing system
US9292688B2 (en) 2012-09-26 2016-03-22 Northrop Grumman Systems Corporation System and method for automated machine-learning, zero-day malware detection
US9069916B2 (en) * 2012-11-13 2015-06-30 Chevron U.S.A. Inc. Model selection from a large ensemble of models
US20140180738A1 (en) * 2012-12-21 2014-06-26 Cloudvu, Inc. Machine learning for systems management
US8880446B2 (en) * 2012-11-15 2014-11-04 Purepredictive, Inc. Predictive analytics factory
US20140189703A1 (en) * 2012-12-28 2014-07-03 General Electric Company System and method for distributed computing using automated provisoning of heterogeneous computing resources
US20140188768A1 (en) * 2012-12-28 2014-07-03 General Electric Company System and Method For Creating Customized Model Ensembles On Demand
US9104525B2 (en) 2013-01-22 2015-08-11 Microsoft Technology Licensing, Llc API usage pattern mining
US9015685B2 (en) 2013-03-01 2015-04-21 International Business Machines Corporation Code analysis for simulation efficiency improvement
US20140358828A1 (en) * 2013-05-29 2014-12-04 Purepredictive, Inc. Machine learning generated action plan
US9218574B2 (en) * 2013-05-29 2015-12-22 Purepredictive, Inc. User interface for machine learning
US20140372513A1 (en) * 2013-06-12 2014-12-18 Cloudvu, Inc. Multi-tenant enabling a single-tenant computer program product
HK1224402A1 (zh) 2013-06-24 2017-08-18 Cylance Inc. 用於使用机器学习的生成式多模型多级分类和相似性分析的自动化系统
US9286573B2 (en) * 2013-07-17 2016-03-15 Xerox Corporation Cost-aware non-stationary online learning
EP2833594A1 (en) 2013-07-31 2015-02-04 Siemens Aktiengesellschaft Feature based three stage neural networks intrusion detection method and system
US9798751B2 (en) 2013-10-16 2017-10-24 University Of Tennessee Research Foundation Method and apparatus for constructing a neuroscience-inspired artificial neural network
US9262296B1 (en) 2014-01-31 2016-02-16 Cylance Inc. Static feature extraction from structured files
US8930916B1 (en) 2014-01-31 2015-01-06 Cylance Inc. Generation of API call graphs from static disassembly
WO2015120243A1 (en) 2014-02-07 2015-08-13 Cylance Inc. Application execution control utilizing ensemble machine learning for discernment
US9171154B2 (en) 2014-02-12 2015-10-27 Symantec Corporation Systems and methods for scanning packed programs in response to detecting suspicious behaviors
EP3238611B1 (en) * 2016-04-29 2021-11-17 Stichting IMEC Nederland A method and device for estimating a condition of a person
EP3255573A1 (en) * 2016-06-10 2017-12-13 Electronics and Telecommunications Research Institute Clinical decision supporting ensemble system and clinical decison supporting method using the same
US20190378210A1 (en) * 2018-06-08 2019-12-12 Zestfinance, Inc. Systems and methods for decomposition of non-differentiable and differentiable models

Also Published As

Publication number Publication date
AU2015213797A1 (en) 2016-09-08
EP3103070A1 (en) 2016-12-14
HK1232326A1 (en) 2018-01-05
JP6662782B2 (ja) 2020-03-11
JP2017508210A (ja) 2017-03-23
WO2015120243A1 (en) 2015-08-13
AU2015213797B2 (en) 2019-09-26
WO2015120243A8 (en) 2016-09-09
US10235518B2 (en) 2019-03-19
CA2938580A1 (en) 2015-08-13
US10817599B2 (en) 2020-10-27
US20150227741A1 (en) 2015-08-13
US20190188375A1 (en) 2019-06-20
EP3103070B1 (en) 2023-09-13

Similar Documents

Publication Publication Date Title
US10817599B2 (en) Application execution control utilizing ensemble machine learning for discernment
US11334671B2 (en) Adding adversarial robustness to trained machine learning models
Ponmalar et al. An intrusion detection approach using ensemble support vector machine based chaos game optimization algorithm in big data platform
US20220121995A1 (en) Automatic generation of training data for anomaly detection using other user's data samples
US11461295B2 (en) Data migration system
US9928363B2 (en) Isolating data for analysis to avoid malicious attacks
US20210124628A1 (en) Utilizing a neural network model to determine risk associated with an application programming interface of a web application
US20220004904A1 (en) Deepfake detection models utilizing subject-specific libraries
US12197945B2 (en) Quantum computer performance enhancement
KR102878575B1 (ko) 애플리케이션의 스토리지 로드를 결정하는 방법 및 장치
US12367403B2 (en) Computer-automated processing with rule-supplemented machine learning
US20250045395A1 (en) Matching commands to attack patterns
US11113579B2 (en) Machine learning model score obfuscation using step function, position-dependent noise
Sagaama et al. Automatic parameter tuning for big data pipelines with deep reinforcement learning
HK1232326B (en) Application execution control utilizing ensemble machine learning for discernment
US20240311881A1 (en) Promoting APIs Based on Usage
US20240176871A1 (en) Systems and methods for software execution environment management
EP3963489B1 (en) Machine learning model score obfuscation using step-function, position-dependent noise
Lopes et al. Predicting the Impact of Android Malicious Samples Via Machine Learning
EC-Sabery et al. Malware Classification in Cloud Computing Using Transfer Learning
Brown Automated Machine Learning for Malware Detection with Deep Learning
Meryem et al. Computing Using Transfer Learning
Wang et al. RaNetMalDozer: A Novel NN-Based Model for Android Malware Detection Over Task Kernel Structures

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20200204

EEER Examination request

Effective date: 20200204