US9037698B1
(en)
|
2006-03-14 |
2015-05-19 |
Amazon Technologies, Inc. |
Method and system for collecting and analyzing time-series data
|
KR101303643B1
(ko)
*
|
2007-01-31 |
2013-09-11 |
삼성전자주식회사 |
침입 코드 탐지 장치 및 그 방법
|
TWI331868B
(en)
*
|
2007-06-11 |
2010-10-11 |
Univ Nat Pingtung Sci & Tech |
Detecting method of network invasion
|
US7933946B2
(en)
|
2007-06-22 |
2011-04-26 |
Microsoft Corporation |
Detecting data propagation in a distributed system
|
EP2023572B1
(en)
*
|
2007-08-08 |
2017-12-06 |
Oracle International Corporation |
Method, computer program and apparatus for controlling access to a computer resource and obtaining a baseline therefor
|
US7996510B2
(en)
*
|
2007-09-28 |
2011-08-09 |
Intel Corporation |
Virtual clustering for scalable network control and management
|
US8954562B2
(en)
*
|
2007-09-28 |
2015-02-10 |
Intel Corporation |
Entropy-based (self-organizing) stability management
|
KR20090041198A
(ko)
*
|
2007-10-23 |
2009-04-28 |
한국정보보호진흥원 |
추이성분 필터링을 이용한 시계열 모델 기반의 네트워크공격 탐지 방법
|
US9843596B1
(en)
*
|
2007-11-02 |
2017-12-12 |
ThetaRay Ltd. |
Anomaly detection in dynamically evolving data and systems
|
WO2009083022A1
(en)
|
2007-12-31 |
2009-07-09 |
Telecom Italia S.P.A. |
Method of detecting anomalies in a communication system using numerical packet features
|
EP2227889B1
(en)
|
2007-12-31 |
2011-07-13 |
Telecom Italia S.p.A. |
Method of detecting anomalies in a communication system using symbolic packet features
|
US8717913B2
(en)
*
|
2008-06-20 |
2014-05-06 |
T-Mobile Usa, Inc. |
Method and system for user based network analysis and planning
|
US8472328B2
(en)
*
|
2008-07-31 |
2013-06-25 |
Riverbed Technology, Inc. |
Impact scoring and reducing false positives
|
US8825473B2
(en)
|
2009-01-20 |
2014-09-02 |
Oracle International Corporation |
Method, computer program and apparatus for analyzing symbols in a computer system
|
US8230272B2
(en)
*
|
2009-01-23 |
2012-07-24 |
Intelliscience Corporation |
Methods and systems for detection of anomalies in digital data streams
|
US20100287416A1
(en)
*
|
2009-03-17 |
2010-11-11 |
Correlsense Ltd |
Method and apparatus for event diagnosis in a computerized system
|
US8474041B2
(en)
*
|
2009-04-22 |
2013-06-25 |
Hewlett-Packard Development Company, L.P. |
Autonomous diagnosis and mitigation of network anomalies
|
JP4980396B2
(ja)
*
|
2009-06-30 |
2012-07-18 |
日本電信電話株式会社 |
トラヒック特性計測方法および装置
|
US8245302B2
(en)
*
|
2009-09-15 |
2012-08-14 |
Lockheed Martin Corporation |
Network attack visualization and response through intelligent icons
|
US8245301B2
(en)
*
|
2009-09-15 |
2012-08-14 |
Lockheed Martin Corporation |
Network intrusion detection visualization
|
US8666731B2
(en)
*
|
2009-09-22 |
2014-03-04 |
Oracle International Corporation |
Method, a computer program and apparatus for processing a computer message
|
US7920983B1
(en)
|
2010-03-04 |
2011-04-05 |
TaKaDu Ltd. |
System and method for monitoring resources in a water utility network
|
GB2507184B
(en)
*
|
2010-03-04 |
2014-08-13 |
Takadu Ltd |
System and method for monitoring resources in a water utility network
|
CN101848160B
(zh)
*
|
2010-05-26 |
2012-07-18 |
钱叶魁 |
在线检测和分类全网络流量异常的方法
|
US8719930B2
(en)
*
|
2010-10-12 |
2014-05-06 |
Sonus Networks, Inc. |
Real-time network attack detection and mitigation infrastructure
|
US8683591B2
(en)
*
|
2010-11-18 |
2014-03-25 |
Nant Holdings Ip, Llc |
Vector-based anomaly detection
|
US8583386B2
(en)
*
|
2011-01-18 |
2013-11-12 |
TaKaDu Ltd. |
System and method for identifying likely geographical locations of anomalies in a water utility network
|
CN102130800B
(zh)
*
|
2011-04-01 |
2013-08-28 |
苏州赛特斯网络科技有限公司 |
基于数据流行为分析的网络访问异常检测装置及方法
|
US8737204B2
(en)
|
2011-05-02 |
2014-05-27 |
Telefonaktiebolaget Lm Ericsson (Publ) |
Creating and using multiple packet traffic profiling models to profile packet flows
|
US20120283991A1
(en)
*
|
2011-05-06 |
2012-11-08 |
The Board of Trustees of the Leland Stanford, Junior, University |
Method and System for Online Detection of Multi-Component Interactions in Computing Systems
|
US9106689B2
(en)
|
2011-05-06 |
2015-08-11 |
Lockheed Martin Corporation |
Intrusion detection using MDL clustering
|
CN102271091B
(zh)
*
|
2011-09-06 |
2013-09-25 |
电子科技大学 |
一种网络异常事件分类方法
|
US8817655B2
(en)
|
2011-10-20 |
2014-08-26 |
Telefonaktiebolaget Lm Ericsson (Publ) |
Creating and using multiple packet traffic profiling models to profile packet flows
|
EP2587751A1
(en)
|
2011-10-24 |
2013-05-01 |
TELEFONAKTIEBOLAGET LM ERICSSON (publ) |
Method and arrangement for data clustering
|
US9141914B2
(en)
|
2011-10-31 |
2015-09-22 |
Hewlett-Packard Development Company, L.P. |
System and method for ranking anomalies
|
US8341106B1
(en)
|
2011-12-07 |
2012-12-25 |
TaKaDu Ltd. |
System and method for identifying related events in a resource network monitoring system
|
CN103186551B
(zh)
*
|
2011-12-28 |
2016-06-08 |
金蝶软件(中国)有限公司 |
基于web应用平台的异常分析方法及仿真系统
|
US9053519B2
(en)
|
2012-02-13 |
2015-06-09 |
TaKaDu Ltd. |
System and method for analyzing GIS data to improve operation and monitoring of water distribution networks
|
US9471544B1
(en)
|
2012-05-24 |
2016-10-18 |
Google Inc. |
Anomaly detection in a signal
|
US10242414B2
(en)
|
2012-06-12 |
2019-03-26 |
TaKaDu Ltd. |
Method for locating a leak in a fluid network
|
US9628499B1
(en)
|
2012-08-08 |
2017-04-18 |
Google Inc. |
Statistics-based anomaly detection
|
CN103051475B
(zh)
*
|
2012-12-20 |
2016-08-03 |
瑞斯康达科技发展股份有限公司 |
网管设备、分级网管系统及其查询被管设备状态的方法
|
US9614742B1
(en)
*
|
2013-03-14 |
2017-04-04 |
Google Inc. |
Anomaly detection in time series data
|
US9380066B2
(en)
|
2013-03-29 |
2016-06-28 |
Intel Corporation |
Distributed traffic pattern analysis and entropy prediction for detecting malware in a network environment
|
US9503465B2
(en)
|
2013-11-14 |
2016-11-22 |
At&T Intellectual Property I, L.P. |
Methods and apparatus to identify malicious activity in a network
|
EP2887579A1
(en)
*
|
2013-12-19 |
2015-06-24 |
BAE Systems PLC |
Data communications performance monitoring using principal component analysis
|
US10972345B1
(en)
*
|
2019-02-20 |
2021-04-06 |
Amdocs Development Limited |
System, method, and computer program for evaluating confidence level of predicting a network situation in a communication network managed using artificial intelligence
|
US10601688B2
(en)
|
2013-12-19 |
2020-03-24 |
Bae Systems Plc |
Method and apparatus for detecting fault conditions in a network
|
WO2015091784A1
(en)
*
|
2013-12-19 |
2015-06-25 |
Bae Systems Plc |
Data communications performance monitoring
|
US9692674B1
(en)
|
2013-12-30 |
2017-06-27 |
Google Inc. |
Non-parametric change point detection
|
US10560469B2
(en)
|
2014-01-24 |
2020-02-11 |
Hewlett Packard Enterprise Development Lp |
Identifying deviations in data
|
US9652354B2
(en)
|
2014-03-18 |
2017-05-16 |
Microsoft Technology Licensing, Llc. |
Unsupervised anomaly detection for arbitrary time series
|
US9503467B2
(en)
|
2014-05-22 |
2016-11-22 |
Accenture Global Services Limited |
Network anomaly detection
|
US10230747B2
(en)
|
2014-07-15 |
2019-03-12 |
Cisco Technology, Inc. |
Explaining network anomalies using decision trees
|
US9973520B2
(en)
*
|
2014-07-15 |
2018-05-15 |
Cisco Technology, Inc. |
Explaining causes of network anomalies
|
CN105337951B
(zh)
*
|
2014-08-15 |
2019-04-23 |
中国电信股份有限公司 |
对系统攻击进行路径回溯的方法与装置
|
US9407645B2
(en)
|
2014-08-29 |
2016-08-02 |
Accenture Global Services Limited |
Security threat information analysis
|
US9716721B2
(en)
|
2014-08-29 |
2017-07-25 |
Accenture Global Services Limited |
Unstructured security threat information analysis
|
US10505819B2
(en)
|
2015-06-04 |
2019-12-10 |
Cisco Technology, Inc. |
Method and apparatus for computing cell density based rareness for use in anomaly detection
|
US9729571B1
(en)
*
|
2015-07-31 |
2017-08-08 |
Amdocs Software Systems Limited |
System, method, and computer program for detecting and measuring changes in network behavior of communication networks utilizing real-time clustering algorithms
|
US9979743B2
(en)
|
2015-08-13 |
2018-05-22 |
Accenture Global Services Limited |
Computer asset vulnerabilities
|
US9886582B2
(en)
|
2015-08-31 |
2018-02-06 |
Accenture Global Sevices Limited |
Contextualization of threat data
|
US10193780B2
(en)
*
|
2015-10-09 |
2019-01-29 |
Futurewei Technologies, Inc. |
System and method for anomaly root cause analysis
|
DE112015006466B4
(de)
*
|
2015-10-23 |
2024-05-02 |
NEC Laboratories Europe GmbH |
Verfahren und System zur Unterstützung der Detektion von Unregelmässigkeiten in einem Netzwerk
|
JP6078179B1
(ja)
*
|
2016-01-20 |
2017-02-08 |
西日本電信電話株式会社 |
セキュリティ脅威検出システム、セキュリティ脅威検出方法、及びセキュリティ脅威検出プログラム
|
CN105808639B
(zh)
*
|
2016-02-24 |
2021-02-09 |
平安科技(深圳)有限公司 |
网络访问行为识别方法和装置
|
WO2017145591A1
(ja)
*
|
2016-02-26 |
2017-08-31 |
日本電信電話株式会社 |
分析装置、分析方法および分析プログラム
|
US10659333B2
(en)
*
|
2016-03-24 |
2020-05-19 |
Cisco Technology, Inc. |
Detection and analysis of seasonal network patterns for anomaly detection
|
US10659481B2
(en)
*
|
2016-06-29 |
2020-05-19 |
Paypal, Inc. |
Network operation application monitoring
|
US10079768B2
(en)
|
2016-07-07 |
2018-09-18 |
Cisco Technology, Inc. |
Framework for joint learning of network traffic representations and traffic classifiers
|
US10223191B2
(en)
*
|
2016-07-20 |
2019-03-05 |
International Business Machines Corporation |
Anomaly detection in performance management
|
US20180077227A1
(en)
*
|
2016-08-24 |
2018-03-15 |
Oleg Yeshaya RYABOY |
High Volume Traffic Handling for Ordering High Demand Products
|
US10505894B2
(en)
|
2016-10-13 |
2019-12-10 |
Microsoft Technology Licensing, Llc |
Active and passive method to perform IP to name resolution in organizational environments
|
KR101923776B1
(ko)
*
|
2016-11-16 |
2018-11-29 |
순천향대학교 산학협력단 |
이상 데이터 분석을 통한 네트워크 침입 검출 장치 및 방법
|
KR20200007931A
(ko)
*
|
2017-05-18 |
2020-01-22 |
익스팬스 인코포레이티드 |
상관관계 중심 위협 평가 및 치료
|
US11934937B2
(en)
|
2017-07-10 |
2024-03-19 |
Accenture Global Solutions Limited |
System and method for detecting the occurrence of an event and determining a response to the event
|
WO2019026684A1
(ja)
*
|
2017-08-04 |
2019-02-07 |
日本電信電話株式会社 |
経路制御方法及び経路設定装置
|
CN110110160B
(zh)
|
2017-12-29 |
2020-04-14 |
阿里巴巴集团控股有限公司 |
确定数据异常的方法及装置
|
US10547518B2
(en)
*
|
2018-01-26 |
2020-01-28 |
Cisco Technology, Inc. |
Detecting transient vs. perpetual network behavioral patterns using machine learning
|
CN108566340B
(zh)
*
|
2018-02-05 |
2021-03-09 |
中国科学院信息工程研究所 |
基于动态时间规整算法的网络流量精细化分类方法和装置
|
US11005870B2
(en)
*
|
2018-11-27 |
2021-05-11 |
General Electric Company |
Framework to develop cyber-physical system behavior-based monitoring
|
US11405413B2
(en)
*
|
2019-02-01 |
2022-08-02 |
Microsoft Technology Licensing, Llc |
Anomaly lookup for cyber security hunting
|
CN112910825B
(zh)
*
|
2019-11-19 |
2022-06-14 |
华为技术有限公司 |
一种蠕虫检测方法及网络设备
|
WO2021133791A1
(en)
*
|
2019-12-23 |
2021-07-01 |
Boon Logic Inc. |
Method for network traffic analysis
|
WO2021262136A1
(en)
*
|
2020-06-22 |
2021-12-30 |
Hewlett-Packard Development Company, L.P. |
Monitoring an embedded system
|
US11652833B2
(en)
|
2020-07-24 |
2023-05-16 |
Microsoft Technology Licensing, Llc |
Detection of anomalous count of new entities
|
US11398970B2
(en)
*
|
2020-08-05 |
2022-07-26 |
Cisco Technology, Inc. |
Internet last-mile outage detection using IP-route clustering
|