IN2014DN10274A - - Google Patents
Info
- Publication number
- IN2014DN10274A IN2014DN10274A IN10274DEN2014A IN2014DN10274A IN 2014DN10274 A IN2014DN10274 A IN 2014DN10274A IN 10274DEN2014 A IN10274DEN2014 A IN 10274DEN2014A IN 2014DN10274 A IN2014DN10274 A IN 2014DN10274A
- Authority
- IN
- India
- Prior art keywords
- group
- client entities
- client
- forming
- security
- Prior art date
Links
- 230000007246 mechanism Effects 0.000 abstract 1
- 230000008520 organization Effects 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/538,439 US9292881B2 (en) | 2012-06-29 | 2012-06-29 | Social sharing of security information in a group |
PCT/US2013/040428 WO2014003900A1 (fr) | 2012-06-29 | 2013-05-09 | Partage social d'informations de sécurité dans un groupe |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014DN10274A true IN2014DN10274A (fr) | 2015-08-07 |
Family
ID=49779740
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN10274DEN2014 IN2014DN10274A (fr) | 2012-06-29 | 2013-05-09 |
Country Status (10)
Country | Link |
---|---|
US (2) | US9292881B2 (fr) |
EP (1) | EP2867810B1 (fr) |
JP (1) | JP2015524585A (fr) |
AU (1) | AU2013281175A1 (fr) |
BR (1) | BR112014032528A2 (fr) |
CA (1) | CA2874320A1 (fr) |
IL (1) | IL236390B (fr) |
IN (1) | IN2014DN10274A (fr) |
SG (1) | SG11201408279QA (fr) |
WO (1) | WO2014003900A1 (fr) |
Families Citing this family (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9043903B2 (en) | 2012-06-08 | 2015-05-26 | Crowdstrike, Inc. | Kernel-level security agent |
US9292881B2 (en) | 2012-06-29 | 2016-03-22 | Crowdstrike, Inc. | Social sharing of security information in a group |
US10409980B2 (en) | 2012-12-27 | 2019-09-10 | Crowdstrike, Inc. | Real-time representation of security-relevant system state |
CN104581854B (zh) * | 2013-10-16 | 2019-07-12 | 中兴通讯股份有限公司 | 一种无线连接方法和装置 |
US20150222646A1 (en) | 2014-01-31 | 2015-08-06 | Crowdstrike, Inc. | Tagging Security-Relevant System Objects |
US10289405B2 (en) | 2014-03-20 | 2019-05-14 | Crowdstrike, Inc. | Integrity assurance and rebootless updating during runtime |
EP3132569A4 (fr) * | 2014-04-18 | 2017-12-06 | EntIT Software LLC | Évaluation d'un émetteur de menace |
US9798882B2 (en) | 2014-06-06 | 2017-10-24 | Crowdstrike, Inc. | Real-time model of states of monitored devices |
EP3172689A4 (fr) * | 2014-07-22 | 2018-03-21 | Hewlett-Packard Development Company, L.P. | Détermination d'accès d'indicateur de sécurité |
US10395049B2 (en) | 2014-07-22 | 2019-08-27 | Entit Software Llc | Conditional security indicator sharing |
US10506065B2 (en) * | 2014-12-27 | 2019-12-10 | Intel Corporation | Technologies for managing social relationships of a computing device social group |
US10050990B2 (en) | 2014-12-29 | 2018-08-14 | Guidewire Software, Inc. | Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information |
US9521160B2 (en) * | 2014-12-29 | 2016-12-13 | Cyence Inc. | Inferential analysis using feedback for extracting and combining cyber risk information |
US11855768B2 (en) | 2014-12-29 | 2023-12-26 | Guidewire Software, Inc. | Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information |
WO2017078986A1 (fr) | 2014-12-29 | 2017-05-11 | Cyence Inc. | Analyse de diversité comprenant des méthodologies de rétroaction utilisables |
US10341376B2 (en) | 2014-12-29 | 2019-07-02 | Guidewire Software, Inc. | Diversity analysis with actionable feedback methodologies |
US11863590B2 (en) | 2014-12-29 | 2024-01-02 | Guidewire Software, Inc. | Inferential analysis using feedback for extracting and combining cyber risk information |
US10050989B2 (en) | 2014-12-29 | 2018-08-14 | Guidewire Software, Inc. | Inferential analysis using feedback for extracting and combining cyber risk information including proxy connection analyses |
US9699209B2 (en) | 2014-12-29 | 2017-07-04 | Cyence Inc. | Cyber vulnerability scan analyses with actionable feedback |
US10404748B2 (en) | 2015-03-31 | 2019-09-03 | Guidewire Software, Inc. | Cyber risk analysis and remediation using network monitored sensors and methods of use |
US10339316B2 (en) | 2015-07-28 | 2019-07-02 | Crowdstrike, Inc. | Integrity assurance through early loading in the boot phase |
CN106470115B (zh) * | 2015-08-20 | 2021-01-29 | 斑马智行网络(香港)有限公司 | 一种安全配置方法、相关装置和系统 |
US10764329B2 (en) * | 2015-09-25 | 2020-09-01 | Micro Focus Llc | Associations among data records in a security information sharing platform |
WO2017062039A1 (fr) * | 2015-10-09 | 2017-04-13 | Hewlett Packard Enterprise Development Lp | Badges biographiques |
US10812508B2 (en) * | 2015-10-09 | 2020-10-20 | Micro Focus, LLC | Performance tracking in a security information sharing platform |
WO2017062038A1 (fr) | 2015-10-09 | 2017-04-13 | Hewlett Packard Enterprise Development Lp | Protection de la confidentialité |
WO2017131788A1 (fr) * | 2016-01-29 | 2017-08-03 | Hewlett Packard Enterprise Development Lp | Chiffrement d'informations de sécurité de communauté au moyen de clés cryptographiques temporaires |
WO2017138957A1 (fr) * | 2016-02-12 | 2017-08-17 | Entit Software Llc | Visualisation d'associations entre des enregistrements de données dans une plateforme de partage d'informations de sécurité |
US11962609B2 (en) * | 2016-02-12 | 2024-04-16 | Micro Focus Llc | Source entities of security indicators |
US11356484B2 (en) * | 2016-02-12 | 2022-06-07 | Micro Focus Llc | Strength of associations among data records in a security information sharing platform |
CA3018368A1 (fr) | 2016-03-24 | 2017-09-28 | Carbon Black, Inc. | Systemes et techniques pour guider une reponse a un incident de cybersecurite |
US10681059B2 (en) | 2016-05-25 | 2020-06-09 | CyberOwl Limited | Relating to the monitoring of network security |
TWI725109B (zh) * | 2017-01-19 | 2021-04-21 | 香港商斑馬智行網絡(香港)有限公司 | 安全配置方法、相關裝置和系統 |
US10387228B2 (en) | 2017-02-21 | 2019-08-20 | Crowdstrike, Inc. | Symmetric bridge component for communications between kernel mode and user mode |
CN108512822B (zh) * | 2017-02-28 | 2021-07-09 | 阿里巴巴集团控股有限公司 | 一种数据处理事件的风险识别方法和装置 |
KR101964592B1 (ko) * | 2018-04-25 | 2019-04-02 | 한국전자통신연구원 | 보안위협 정보 공유 장치 및 방법 |
US11283841B2 (en) * | 2019-01-25 | 2022-03-22 | EMC IP Holding Company LLC | Community-based anomaly detection policy sharing among organizations |
US20220141041A1 (en) * | 2019-04-01 | 2022-05-05 | Intel Corporation | Privacy protected autonomous attestation |
US11966870B2 (en) * | 2019-04-18 | 2024-04-23 | Oracle International Corporation | System and method for determination of recommendations and alerts in an analytics environment |
US11665174B2 (en) | 2021-01-29 | 2023-05-30 | Raytheon Company | Method and system for multi-tiered, multi-compartmented DevOps |
Family Cites Families (102)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5355498A (en) | 1992-02-25 | 1994-10-11 | Sun Microsystems, Inc. | Method and apparatus for booting a computer system without loading a device driver into memory |
US5410703A (en) | 1992-07-01 | 1995-04-25 | Telefonaktiebolaget L M Ericsson | System for changing software during computer operation |
US6052723A (en) | 1996-07-25 | 2000-04-18 | Stockmaster.Com, Inc. | Method for aggregate control on an electronic network |
US6009274A (en) | 1996-12-13 | 1999-12-28 | 3Com Corporation | Method and apparatus for automatically updating software components on end systems over a network |
US6088804A (en) | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
DE19810814B4 (de) | 1998-03-12 | 2004-10-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Rechnersystem und Zustandskopierverfahren zur skalierbaren Software-Aktualisierung |
US7418504B2 (en) * | 1998-10-30 | 2008-08-26 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US20010044904A1 (en) | 1999-09-29 | 2001-11-22 | Berg Ryan J. | Secure remote kernel communication |
US7281268B2 (en) | 1999-11-14 | 2007-10-09 | Mcafee, Inc. | System, method and computer program product for detection of unwanted processes |
US7076647B2 (en) | 2000-06-09 | 2006-07-11 | Hewlett-Packard Development Company, L.P. | Dynamic kernel tunables |
US20030112781A1 (en) * | 2001-12-17 | 2003-06-19 | Kermode Roger George | Communications unit for secure communications |
US7512810B1 (en) * | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
US7784044B2 (en) | 2002-12-02 | 2010-08-24 | Microsoft Corporation | Patching of in-use functions on a running computer system |
US7093116B2 (en) | 2003-04-28 | 2006-08-15 | Intel Corporation | Methods and apparatus to operate in multiple phases of a basic input/output system (BIOS) |
WO2005058018A2 (fr) * | 2003-12-16 | 2005-06-30 | Aerulean Plant Identification Systems, Inc. | Systeme et procede d'identification de plantes |
US8010459B2 (en) * | 2004-01-21 | 2011-08-30 | Google Inc. | Methods and systems for rating associated members in a social network |
US7490356B2 (en) | 2004-07-20 | 2009-02-10 | Reflectent Software, Inc. | End user risk management |
US7571448B1 (en) | 2004-07-28 | 2009-08-04 | Symantec Corporation | Lightweight hooking mechanism for kernel level operations |
JP4624181B2 (ja) | 2004-07-28 | 2011-02-02 | 株式会社エヌ・ティ・ティ・データ | 不正アクセス対策制御装置および不正アクセス対策制御プログラム |
US20060070089A1 (en) | 2004-08-20 | 2006-03-30 | Shahid Shoaib | Method and apparatus for dynamic replacement of device drivers in the operating system (OS) kernel |
KR101201118B1 (ko) | 2004-11-08 | 2012-11-13 | 마이크로소프트 코포레이션 | 바이러스 방지 소프트웨어 어플리케이션들의 지식 베이스를모으는 시스템 및 방법 |
US7478237B2 (en) | 2004-11-08 | 2009-01-13 | Microsoft Corporation | System and method of allowing user mode applications with access to file data |
US7765410B2 (en) | 2004-11-08 | 2010-07-27 | Microsoft Corporation | System and method of aggregating the knowledge base of antivirus software applications |
US7765400B2 (en) | 2004-11-08 | 2010-07-27 | Microsoft Corporation | Aggregation of the knowledge base of antivirus software |
WO2006101549A2 (fr) | 2004-12-03 | 2006-09-28 | Whitecell Software, Inc. | Systeme securise permettant l'execution d'un code programme informatique autorise |
US7366891B2 (en) | 2004-12-30 | 2008-04-29 | Intel Corporation | Methods and apparatus to provide dual-mode drivers in processor systems |
US7979889B2 (en) | 2005-01-07 | 2011-07-12 | Cisco Technology, Inc. | Methods and apparatus providing security to computer systems and networks |
US8365293B2 (en) * | 2005-01-25 | 2013-01-29 | Redphone Security, Inc. | Securing computer network interactions between entities with authorization assurances |
US10454890B2 (en) | 2005-01-31 | 2019-10-22 | Unisys Corporation | Negotiation of security protocols and protocol attributes in secure communications environment |
US8572733B1 (en) | 2005-07-06 | 2013-10-29 | Raytheon Company | System and method for active data collection in a network security system |
US7874001B2 (en) | 2005-07-15 | 2011-01-18 | Microsoft Corporation | Detecting user-mode rootkits |
US20070094496A1 (en) | 2005-10-25 | 2007-04-26 | Michael Burtscher | System and method for kernel-level pestware management |
US7882560B2 (en) | 2005-12-16 | 2011-02-01 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing |
US8239947B1 (en) | 2006-02-06 | 2012-08-07 | Symantec Corporation | Method using kernel mode assistance for the detection and removal of threats which are actively preventing detection and removal from a running system |
US8201243B2 (en) | 2006-04-20 | 2012-06-12 | Webroot Inc. | Backwards researching activity indicative of pestware |
US7441113B2 (en) | 2006-07-10 | 2008-10-21 | Devicevm, Inc. | Method and apparatus for virtualization of appliances |
CA2655151C (fr) | 2006-07-18 | 2016-06-21 | Certicom Corp. | Systeme et procede pour authentifier un dispositif de jeu |
US8190868B2 (en) | 2006-08-07 | 2012-05-29 | Webroot Inc. | Malware management through kernel detection |
US9111088B2 (en) | 2006-08-14 | 2015-08-18 | Quantum Security, Inc. | Policy-based physical security system for restricting access to computer resources and data flow through network equipment |
US8321677B2 (en) * | 2006-09-21 | 2012-11-27 | Google Inc. | Pre-binding and tight binding of an on-line identity to a digital signature |
US7765374B2 (en) | 2007-01-25 | 2010-07-27 | Microsoft Corporation | Protecting operating-system resources |
US8181264B2 (en) | 2007-02-07 | 2012-05-15 | Apple Inc. | Method and apparatus for deferred security analysis |
US8578477B1 (en) | 2007-03-28 | 2013-11-05 | Trend Micro Incorporated | Secure computer system integrity check |
US8565799B2 (en) | 2007-04-04 | 2013-10-22 | Qualcomm Incorporated | Methods and apparatus for flow data acquisition in a multi-frequency network |
US7908656B1 (en) | 2007-04-23 | 2011-03-15 | Network Appliance, Inc. | Customized data generating data storage system filter for data security |
US8918717B2 (en) | 2007-05-07 | 2014-12-23 | International Business Machines Corporation | Method and sytem for providing collaborative tag sets to assist in the use and navigation of a folksonomy |
US20080301669A1 (en) | 2007-05-30 | 2008-12-04 | Google Inc. | Dynamically Self-Updating by a Software Application on a Device |
WO2008151321A2 (fr) | 2007-06-08 | 2008-12-11 | The Trustees Of Columbia University In The City Of New York | Systèmes, procédés, et supports pour la mise en œuvre d'une règle de sécurité dans un réseau comportant une pluralité de composants |
US8099740B1 (en) | 2007-08-17 | 2012-01-17 | Mcafee, Inc. | System, method, and computer program product for terminating a hidden kernel process |
US8065728B2 (en) | 2007-09-10 | 2011-11-22 | Wisconsin Alumni Research Foundation | Malware prevention system monitoring kernel events |
US20090094039A1 (en) * | 2007-10-04 | 2009-04-09 | Zhura Corporation | Collaborative production of rich media content |
US8255926B2 (en) | 2007-11-06 | 2012-08-28 | International Business Machines Corporation | Virus notification based on social groups |
CA2625274C (fr) | 2007-12-13 | 2018-11-20 | Kevin Gerard Boyce | Methode et systeme de protection d'un systeme informatique a l'amorcage |
US8407698B2 (en) | 2008-01-25 | 2013-03-26 | Citrix Systems, Inc. | Driver installation and diskless booting of virtual and physical machines based on machine characteristic |
JP5159899B2 (ja) | 2008-02-11 | 2013-03-13 | ドルビー ラボラトリーズ ライセンシング コーポレイション | プライベートネットワークのダイナミックdnsシステム |
US20090216806A1 (en) * | 2008-02-24 | 2009-08-27 | Allofme Ltd. | Digital assets internet timeline aggregation and sharing platform |
JP2009238153A (ja) | 2008-03-28 | 2009-10-15 | Nec Corp | マルウェア対処システム、方法及びプログラム |
US7890664B1 (en) | 2008-03-31 | 2011-02-15 | Emc Corporation | Methods and apparatus for non-disruptive upgrade by redirecting I/O operations |
US8413261B2 (en) * | 2008-05-30 | 2013-04-02 | Red Hat, Inc. | Sharing private data publicly and anonymously |
US20090307140A1 (en) * | 2008-06-06 | 2009-12-10 | Upendra Mardikar | Mobile device over-the-air (ota) registration and point-of-sale (pos) payment |
US8631488B2 (en) | 2008-08-04 | 2014-01-14 | Cupp Computing As | Systems and methods for providing security services during power management mode |
GB0815587D0 (en) | 2008-08-27 | 2008-10-01 | Applied Neural Technologies Ltd | Computer/network security application |
US8401195B2 (en) | 2008-09-22 | 2013-03-19 | Motorola Solutions, Inc. | Method of automatically populating a list of managed secure communications group members |
US8789202B2 (en) | 2008-11-19 | 2014-07-22 | Cupp Computing As | Systems and methods for providing real time access monitoring of a removable media device |
US8234693B2 (en) * | 2008-12-05 | 2012-07-31 | Raytheon Company | Secure document management |
KR20100078081A (ko) | 2008-12-30 | 2010-07-08 | (주) 세인트 시큐리티 | 커널 기반 시스템 행위 분석을 통한 알려지지 않은 악성코드 탐지 시스템 및 방법 |
KR101021708B1 (ko) | 2009-01-20 | 2011-03-15 | 성균관대학교산학협력단 | 그룹키 분배 방법 및 이를 위한 서버 및 클라이언트 |
JP2010182019A (ja) | 2009-02-04 | 2010-08-19 | Kddi Corp | 異常検知装置およびプログラム |
WO2010105260A1 (fr) | 2009-03-13 | 2010-09-16 | Assa Abloy Ab | Dispositif de transfert pour élément sensible tel qu'une clé cryptographique |
US8533830B1 (en) | 2009-03-31 | 2013-09-10 | Mcafee, Inc. | System, method, and computer program product for mounting an image of a computer system in a pre-boot environment for validating the computer system |
KR101038048B1 (ko) | 2009-12-21 | 2011-06-01 | 한국인터넷진흥원 | 봇넷 악성행위 실시간 분석 시스템 |
US8621628B2 (en) | 2010-02-25 | 2013-12-31 | Microsoft Corporation | Protecting user mode processes from improper tampering or termination |
US9384112B2 (en) | 2010-07-01 | 2016-07-05 | Logrhythm, Inc. | Log collection, structuring and processing |
KR101329847B1 (ko) * | 2010-07-26 | 2013-11-14 | 주식회사 팬택 | 인체통신을 이용한 소셜 네트워크 서비스를 제공하는 휴대용 단말기 및 그 방법 |
US8539584B2 (en) | 2010-08-30 | 2013-09-17 | International Business Machines Corporation | Rootkit monitoring agent built into an operating system kernel |
US8776227B1 (en) | 2010-10-21 | 2014-07-08 | Symantec Corporation | User interface based malware detection |
KR20120072266A (ko) | 2010-12-23 | 2012-07-03 | 한국전자통신연구원 | 전역 네트워크 보안상황 제어 장치 및 방법 |
US8762298B1 (en) | 2011-01-05 | 2014-06-24 | Narus, Inc. | Machine learning based botnet detection using real-time connectivity graph based traffic features |
EP2487860B1 (fr) | 2011-02-10 | 2013-09-25 | Telefónica, S.A. | Procédé et système pour améliorer la détection de menaces de sécurité dans des réseaux de communication |
US20120246297A1 (en) | 2011-03-25 | 2012-09-27 | Vijaya Shanker | Agent based monitoring for saas it service management |
US8549648B2 (en) | 2011-03-29 | 2013-10-01 | Mcafee, Inc. | Systems and methods for identifying hidden processes |
US8813227B2 (en) | 2011-03-29 | 2014-08-19 | Mcafee, Inc. | System and method for below-operating system regulation and control of self-modifying code |
US9038176B2 (en) | 2011-03-31 | 2015-05-19 | Mcafee, Inc. | System and method for below-operating system trapping and securing loading of code into memory |
US8966629B2 (en) | 2011-03-31 | 2015-02-24 | Mcafee, Inc. | System and method for below-operating system trapping of driver loading and unloading |
KR101626424B1 (ko) | 2011-03-28 | 2016-06-01 | 맥아피 인코퍼레이티드 | 가상 머신 모니터 기반 안티 악성 소프트웨어 보안 시스템 및 방법 |
US8739281B2 (en) | 2011-12-06 | 2014-05-27 | At&T Intellectual Property I, L.P. | Multilayered deception for intrusion detection and prevention |
US8789034B1 (en) | 2011-12-31 | 2014-07-22 | Parallels IP Holdings GmbH | Method for updating operating system without memory reset |
CA2773095C (fr) | 2012-03-27 | 2014-12-02 | Yin Sheng Zhang | Ordinateur avec systeme d'exploitation souple |
US9081960B2 (en) | 2012-04-27 | 2015-07-14 | Ut-Battelle, Llc | Architecture for removable media USB-ARM |
IL219597A0 (en) | 2012-05-03 | 2012-10-31 | Syndrome X Ltd | Malicious threat detection, malicious threat prevention, and a learning systems and methods for malicious threat detection and prevention |
US9317687B2 (en) | 2012-05-21 | 2016-04-19 | Mcafee, Inc. | Identifying rootkits based on access permissions |
US9043903B2 (en) | 2012-06-08 | 2015-05-26 | Crowdstrike, Inc. | Kernel-level security agent |
US9292881B2 (en) | 2012-06-29 | 2016-03-22 | Crowdstrike, Inc. | Social sharing of security information in a group |
US9158914B2 (en) | 2013-04-19 | 2015-10-13 | Crowdstrike, Inc. | Executable component injection utilizing hotpatch mechanisms |
US9197654B2 (en) | 2013-06-28 | 2015-11-24 | Mcafee, Inc. | Rootkit detection by using HW resources to detect inconsistencies in network traffic |
US9477835B2 (en) | 2013-10-08 | 2016-10-25 | Crowdstrike, Inc. | Event model for correlating system component states |
US20150128206A1 (en) | 2013-11-04 | 2015-05-07 | Trusteer Ltd. | Early Filtering of Events Using a Kernel-Based Filter |
US9170803B2 (en) | 2013-12-19 | 2015-10-27 | Novell, Inc. | Runtime patching of an operating system (OS) without stopping execution |
KR101554633B1 (ko) | 2014-03-04 | 2015-09-21 | 한국전자통신연구원 | 악성 코드 검출 장치 및 그 방법 |
US10289405B2 (en) | 2014-03-20 | 2019-05-14 | Crowdstrike, Inc. | Integrity assurance and rebootless updating during runtime |
US9798882B2 (en) | 2014-06-06 | 2017-10-24 | Crowdstrike, Inc. | Real-time model of states of monitored devices |
US10339316B2 (en) | 2015-07-28 | 2019-07-02 | Crowdstrike, Inc. | Integrity assurance through early loading in the boot phase |
-
2012
- 2012-06-29 US US13/538,439 patent/US9292881B2/en active Active
-
2013
- 2013-05-09 JP JP2015520185A patent/JP2015524585A/ja active Pending
- 2013-05-09 SG SG11201408279QA patent/SG11201408279QA/en unknown
- 2013-05-09 IN IN10274DEN2014 patent/IN2014DN10274A/en unknown
- 2013-05-09 CA CA2874320A patent/CA2874320A1/fr not_active Abandoned
- 2013-05-09 WO PCT/US2013/040428 patent/WO2014003900A1/fr active Application Filing
- 2013-05-09 AU AU2013281175A patent/AU2013281175A1/en not_active Abandoned
- 2013-05-09 BR BR112014032528A patent/BR112014032528A2/pt not_active IP Right Cessation
- 2013-05-09 EP EP13808592.3A patent/EP2867810B1/fr active Active
-
2014
- 2014-12-21 IL IL236390A patent/IL236390B/en active IP Right Grant
-
2015
- 2015-07-06 US US14/792,177 patent/US9858626B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
AU2013281175A1 (en) | 2014-12-18 |
BR112014032528A2 (pt) | 2017-06-27 |
JP2015524585A (ja) | 2015-08-24 |
EP2867810B1 (fr) | 2021-04-28 |
US20150326614A1 (en) | 2015-11-12 |
EP2867810A4 (fr) | 2016-07-06 |
WO2014003900A1 (fr) | 2014-01-03 |
US20140007190A1 (en) | 2014-01-02 |
US9292881B2 (en) | 2016-03-22 |
IL236390B (en) | 2019-02-28 |
IL236390A0 (en) | 2015-02-26 |
SG11201408279QA (en) | 2015-01-29 |
EP2867810A1 (fr) | 2015-05-06 |
US9858626B2 (en) | 2018-01-02 |
CA2874320A1 (fr) | 2014-01-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014DN10274A (fr) | ||
IL252772A0 (en) | Creating stacks of cards with queries in online social networks | |
WO2012119137A3 (fr) | Identification d'experts et d'influenceurs dans un réseau social | |
EP3005283A4 (fr) | Gestion de personne sociale en ligne | |
IL242367A (en) | Query Comments Social Search on the Internet | |
EA201690280A1 (ru) | Композиции и способы, относящиеся к выделенным эндофитам | |
BR112015031216A2 (pt) | objetos holográficos compartilhados e privados | |
EP2973035A4 (fr) | Prévisualisations d'entités sociales dans une formulation de requête | |
GB2505123B (en) | Social media identity discovery and mapping | |
PH12014502350A1 (en) | Mixtures, methods and compositions pertaining to conductive materials | |
MX356565B (es) | Modificación de consultas de busqueda estructuradas en redes sociales en línea. | |
MX2015002282A (es) | Motor de inteligencia de comercio social. | |
WO2014004615A3 (fr) | Système et procédé pour héberger et partager un évènement en direct | |
CL2016002873A1 (es) | Composición farmacéutica para reducir el daño talámico. | |
WO2014133522A3 (fr) | Traitement local de files d'attente de messages pour travailleurs cositués | |
TR201905787T4 (tr) | Liyofilize TAT-NR2B9C formülasyonu. | |
AU345835S (en) | Lock | |
IN2013MU02197A (fr) | ||
GB2522584A (en) | Managing performance policies based on workload scalability | |
BR112016005991A2 (pt) | polissiloxanas com grupos quaternários heterocíclicos | |
TR201818988T4 (tr) | Multipl skleroz semptomlarını hafifletmeye yönelik apoaequorin içeren bileşimlere dayalı yöntemler. | |
Salmon | E-moderating: the key to online teaching and learning | |
Холявко | Vital Issues Regarding the Urban Planning in Sweden | |
Marklund | Cluster multi-point studies of the auroral acceleration region | |
De Mello et al. | UV Morphology at 1-From Clumps to Disks |