JP2019511030A - 人工知能によるコンピュータセキュリティ - Google Patents

人工知能によるコンピュータセキュリティ Download PDF

Info

Publication number
JP2019511030A
JP2019511030A JP2018538714A JP2018538714A JP2019511030A JP 2019511030 A JP2019511030 A JP 2019511030A JP 2018538714 A JP2018538714 A JP 2018538714A JP 2018538714 A JP2018538714 A JP 2018538714A JP 2019511030 A JP2019511030 A JP 2019511030A
Authority
JP
Japan
Prior art keywords
code
data
security
information
perception
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2018538714A
Other languages
English (en)
Japanese (ja)
Inventor
ハサン・シェド・カムラン
Original Assignee
ハサン・シェド・カムラン
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/145,800 external-priority patent/US20160330219A1/en
Priority claimed from US15/264,744 external-priority patent/US20170076391A1/en
Application filed by ハサン・シェド・カムラン filed Critical ハサン・シェド・カムラン
Publication of JP2019511030A publication Critical patent/JP2019511030A/ja
Priority to JP2022121072A priority Critical patent/JP2022141966A/ja
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/31Programming languages or programming paradigms
    • G06F8/311Functional or applicative languages; Rewrite languages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/31Programming languages or programming paradigms
    • G06F8/313Logic programming, e.g. PROLOG programming language
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • G06N5/022Knowledge engineering; Knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/04Inference or reasoning models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Artificial Intelligence (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Evolutionary Computation (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Medical Informatics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Medical Treatment And Welfare Office Work (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
JP2018538714A 2016-01-24 2017-01-24 人工知能によるコンピュータセキュリティ Pending JP2019511030A (ja)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2022121072A JP2022141966A (ja) 2016-01-24 2022-07-29 人工知能によるコンピュータセキュリティ

Applications Claiming Priority (19)

Application Number Priority Date Filing Date Title
US201662286437P 2016-01-24 2016-01-24
US62/286,437 2016-01-24
US201662294258P 2016-02-11 2016-02-11
US62/294,258 2016-02-11
US201662307558P 2016-03-13 2016-03-13
US62/307,558 2016-03-13
US201662323657P 2016-04-16 2016-04-16
US62/323,657 2016-04-16
US201662326723P 2016-04-23 2016-04-23
US62/326,723 2016-04-23
US15/145,800 2016-05-04
US15/145,800 US20160330219A1 (en) 2015-05-04 2016-05-04 Method and device for managing security in a computer network
US201662341310P 2016-05-25 2016-05-25
US62/341,310 2016-05-25
US15/264,744 US20170076391A1 (en) 2015-09-14 2016-09-14 System of perpetual giving
US15/264,744 2016-09-14
US201662439409P 2016-12-27 2016-12-27
US62/439,409 2016-12-27
PCT/US2017/014699 WO2017127850A1 (en) 2016-01-24 2017-01-24 Computer security based on artificial intelligence

Related Child Applications (1)

Application Number Title Priority Date Filing Date
JP2022121072A Division JP2022141966A (ja) 2016-01-24 2022-07-29 人工知能によるコンピュータセキュリティ

Publications (1)

Publication Number Publication Date
JP2019511030A true JP2019511030A (ja) 2019-04-18

Family

ID=59362181

Family Applications (2)

Application Number Title Priority Date Filing Date
JP2018538714A Pending JP2019511030A (ja) 2016-01-24 2017-01-24 人工知能によるコンピュータセキュリティ
JP2022121072A Pending JP2022141966A (ja) 2016-01-24 2022-07-29 人工知能によるコンピュータセキュリティ

Family Applications After (1)

Application Number Title Priority Date Filing Date
JP2022121072A Pending JP2022141966A (ja) 2016-01-24 2022-07-29 人工知能によるコンピュータセキュリティ

Country Status (14)

Country Link
EP (1) EP3405911A4 (ru)
JP (2) JP2019511030A (ru)
KR (1) KR20180105688A (ru)
CN (2) CN115062297A (ru)
AU (3) AU2017210132A1 (ru)
BR (1) BR112018015014A2 (ru)
CA (1) CA3051164A1 (ru)
IL (2) IL260711B2 (ru)
MX (1) MX2018009079A (ru)
MY (1) MY195524A (ru)
RU (1) RU2750554C2 (ru)
SG (2) SG11201806117TA (ru)
WO (1) WO2017127850A1 (ru)
ZA (1) ZA201805385B (ru)

Families Citing this family (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11574287B2 (en) 2017-10-10 2023-02-07 Text IQ, Inc. Automatic document classification
WO2019104189A1 (en) * 2017-11-27 2019-05-31 Intuition Robotics, Ltd System and method for optimizing resource usage of a robot
US11157295B2 (en) 2018-01-02 2021-10-26 Patrick Schur System and method for providing intelligent operant operating interface and intelligent personal assistant as a service on a crypto secure social media and cross bridge service with continuous prosumer validation based on i-operant+198 tags, i-bubble+198 tags, demojis+198 and demoticons+198
US11232523B2 (en) 2018-01-02 2022-01-25 Patrick Schur System and method for providing an intelligent operating interface and intelligent personal assistant as a service on a crypto secure social media and cross bridge service with continuous prosumer validation based on i-operant tags, i-bubble tags, demojis and demoticons
CA3093021A1 (en) * 2018-03-05 2019-09-12 EzoTech Inc. Automated security testing system and method
US11709946B2 (en) 2018-06-06 2023-07-25 Reliaquest Holdings, Llc Threat mitigation system and method
US10855702B2 (en) 2018-06-06 2020-12-01 Reliaquest Holdings, Llc Threat mitigation system and method
US10785108B1 (en) 2018-06-21 2020-09-22 Wells Fargo Bank, N.A. Intelligent learning and management of a networked architecture
US11068464B2 (en) 2018-06-26 2021-07-20 At&T Intellectual Property I, L.P. Cyber intelligence system and method
US10868782B2 (en) 2018-07-12 2020-12-15 Bank Of America Corporation System for flagging data transmissions for retention of metadata and triggering appropriate transmission placement
WO2020016906A1 (en) * 2018-07-16 2020-01-23 Sriram Govindan Method and system for intrusion detection in an enterprise
US11601442B2 (en) 2018-08-17 2023-03-07 The Research Foundation For The State University Of New York System and method associated with expedient detection and reconstruction of cyber events in a compact scenario representation using provenance tags and customizable policy
CN109189751B (zh) * 2018-09-18 2023-05-26 平安科技(深圳)有限公司 基于区块链的数据同步方法及终端设备
US11122136B2 (en) 2018-10-22 2021-09-14 Red Hat, Inc. Quantum payload service for facilitating communications between a quantum computing system and classical computing systems
US10740930B2 (en) 2018-11-07 2020-08-11 Love Good Color LLC Systems and methods for color selection and auditing
US11144334B2 (en) 2018-12-20 2021-10-12 Red Hat, Inc. Quantum computer task manager
KR102167767B1 (ko) * 2018-12-26 2020-10-19 단국대학교 산학협력단 머신러닝의 학습 데이터셋 생성을 위한 애플리케이션 자동화 빌드 장치 및 방법
EP3693873B1 (en) * 2019-02-07 2022-02-16 AO Kaspersky Lab Systems and methods for configuring a gateway for protection of automated systems
WO2020167586A1 (en) * 2019-02-11 2020-08-20 Db Cybertech, Inc. Automated data discovery for cybersecurity
FR3094600B1 (fr) * 2019-03-29 2022-05-06 Orange Procédé d’extraction d’au moins un motif de communication dans un réseau de communication
US11546366B2 (en) 2019-05-08 2023-01-03 International Business Machines Corporation Threat information sharing based on blockchain
CN111913892B (zh) * 2019-05-09 2021-12-07 北京忆芯科技有限公司 使用cmb提供开放通道存储设备
US11309974B2 (en) 2019-05-09 2022-04-19 Red Hat, Inc. Quantum channel routing utilizing a quantum channel measurement service
USD926809S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926810S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926200S1 (en) 2019-06-06 2021-07-27 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926811S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926782S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
CN110187885B (zh) * 2019-06-10 2023-03-31 合肥本源量子计算科技有限责任公司 一种量子程序编译的中间代码生成方法及装置
CN111027623A (zh) * 2019-12-10 2020-04-17 深圳供电局有限公司 数据增强的智能终端安全等级分类方法及系统
KR102299145B1 (ko) * 2020-02-25 2021-09-07 서울과학기술대학교 산학협력단 디지털 포렌식 증거 수집을 위한 사이버 물리 시스템
KR20210115728A (ko) * 2020-03-16 2021-09-27 삼성전자주식회사 전자 장치 및 이의 제어 방법
CN111460129B (zh) * 2020-03-27 2023-08-22 泰康保险集团股份有限公司 标识生成的方法、装置、电子设备和存储介质
KR102164203B1 (ko) * 2020-04-03 2020-10-13 주식회사 이지시큐 정보보호 위험분석 자동화 시스템 및 그 동작 방법
CN111659124B (zh) * 2020-05-27 2023-05-02 太原理工大学 一种用于对弈的智能鉴别系统
WO2021243321A1 (en) * 2020-05-29 2021-12-02 Qomplx, Inc. A system and methods for score cybersecurity
CN111651756B (zh) * 2020-06-04 2022-05-31 成都安恒信息技术有限公司 一种应用于运维审计navicat的自动代填方法
CN112035797A (zh) * 2020-08-31 2020-12-04 山东诺蓝信息科技有限公司 一种基于自主学习的功率状态判决算法
KR102233694B1 (ko) * 2020-09-29 2021-03-30 주식회사 이지시큐 비용절감 및 효과적인 인증관리를 제공하는 정보보호 시스템
KR102233698B1 (ko) * 2020-09-29 2021-03-30 주식회사 이지시큐 기밀성, 무결성, 가용성에 기반하여 정보보호 관련 위험등급을 설정하는 방법 및 그 시스템
KR102233695B1 (ko) * 2020-09-29 2021-03-30 주식회사 이지시큐 정보보호 위험분석을 수행하는 정보통신 시스템
KR102232883B1 (ko) * 2020-09-29 2021-03-26 주식회사 이지시큐 정보보호 관리체계 인증을 위한 인공지능 시스템
US11606694B2 (en) 2020-10-08 2023-03-14 Surendra Goel System that provides cybersecurity in a home or office by interacting with internet of things devices and other devices
KR102280845B1 (ko) 2020-11-24 2021-07-22 한국인터넷진흥원 네트워크 내의 비정상 행위 탐지 방법 및 그 장치
US20220191234A1 (en) * 2020-12-15 2022-06-16 Mastercard Technologies Canada ULC Enterprise server and method with universal bypass mechanism for automatically testing real-time computer security services
CN114745291A (zh) * 2020-12-23 2022-07-12 北京国双科技有限公司 一种异常数据上云方法、装置、电子设备及存储介质
CN114765627A (zh) * 2021-01-14 2022-07-19 京东科技控股股份有限公司 数据传输方法、设备、存储介质及计算机程序产品
CN112783661B (zh) * 2021-02-08 2022-08-12 上海交通大学 一种适用于容器环境下的内存重删方法及装置
US20240070276A1 (en) * 2021-02-08 2024-02-29 Hewlett-Packard Development Company, L.P. Malware scans
CN112819590B (zh) * 2021-02-25 2023-03-10 紫光云技术有限公司 一种云产品服务交付过程中产品配置信息管理的方法
CN113395593B (zh) * 2021-08-17 2021-10-29 深圳佳力拓科技有限公司 减少信息泄漏的数字电视终端的数据发送方法和装置
CN113961518B (zh) * 2021-09-08 2022-09-23 北京百度网讯科技有限公司 日志的可视化展示方法、装置、电子设备及存储介质
WO2023097026A2 (en) * 2021-11-23 2023-06-01 Strong Force TX Portfolio 2018, LLC Transaction platforms where systems include sets of other systems
KR102509102B1 (ko) * 2022-07-15 2023-03-09 신헌주 인공지능을 이용한 육성 시스템
CN115203689B (zh) * 2022-07-25 2023-05-02 广州正则纬创信息科技有限公司 一种数据安全分享方法及系统
CN115987176B (zh) * 2023-02-01 2023-09-12 北京东土科技股份有限公司 对电机位置进行回零控制的方法、装置和边缘控制器
CN116522895B (zh) * 2023-06-16 2023-09-12 中国传媒大学 一种基于写作风格的文本内容真实性评估方法及设备
CN117150551B (zh) * 2023-09-04 2024-02-27 东方魂数字科技(北京)有限公司 基于大数据的用户隐私保护方法和系统
CN117540038B (zh) * 2024-01-10 2024-03-22 中国信息通信研究院 智能检测虚假数据合成方法和系统

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004524598A (ja) * 2000-09-25 2004-08-12 クロスビーム システムズ, インク. ネットワークアプリケーション装置のためのフロースケジューリング及びアーキテクチャ
JP2010152431A (ja) * 2008-12-24 2010-07-08 Mitsubishi Electric Corp 不正アクセス検知装置及び不正アクセス検知プログラム及び記録媒体及び不正アクセス検知方法
JP2014060722A (ja) * 2012-09-18 2014-04-03 Kddi Corp 将来のネットワーク攻撃を検知及び予測するために、様々な指標と過去の攻撃事例を相関させ、攻撃に関する指標のプロファイルを作成するシステム及び方法
JP2014099758A (ja) * 2012-11-14 2014-05-29 National Institute Of Information & Communication Technology 複数センサの観測情報の突合による不正通信検知方法
US20140310001A1 (en) * 2013-04-16 2014-10-16 Sri International Using Intents to Analyze and Personalize a User's Dialog Experience with a Virtual Personal Assistant
JP2015079504A (ja) * 2013-10-11 2015-04-23 ベリサイン・インコーポレイテッド ネットワーク動作アーチファクトの順序によるマルウェアの分類
US20150149182A1 (en) * 2013-11-27 2015-05-28 Sri International Sharing Intents to Provide Virtual Assistance in a Multi-Person Dialog
US20150279366A1 (en) * 2014-03-28 2015-10-01 Cubic Robotics, Inc. Voice driven operating system for interfacing with electronic devices: system, method, and architecture

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1245572A (zh) * 1997-10-30 2000-02-23 全昌龙 计算机安全部件
WO2007117567A2 (en) * 2006-04-06 2007-10-18 Smobile Systems Inc. Malware detection system and method for limited access mobile platforms
US7991724B2 (en) * 2006-12-21 2011-08-02 Support Machines Ltd. Method and a computer program product for providing a response to a statement of a user
US9489647B2 (en) * 2008-06-19 2016-11-08 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with self-service portal for publishing resources
US8353033B1 (en) * 2008-07-02 2013-01-08 Symantec Corporation Collecting malware samples via unauthorized download protection
US8516594B2 (en) * 2009-04-24 2013-08-20 Jeff Bennett Enterprise information security management software for prediction modeling with interactive graphs
WO2011014668A2 (en) * 2009-07-30 2011-02-03 Zinan Chen Independent carrier ethernet interconnection platform
US10019677B2 (en) * 2009-11-20 2018-07-10 Alert Enterprise, Inc. Active policy enforcement
US8806568B2 (en) * 2011-07-11 2014-08-12 International Business Machines Corporation Automatic generation of user account policies based on configuration management database information
EP2725728B1 (en) * 2012-10-29 2018-08-15 ADVA Optical Networking SE Method and device for assessing the performance of one or more packet synchronization services in a packet data transmission network
RU2522019C1 (ru) * 2012-12-25 2014-07-10 Закрытое акционерное общество "Лаборатория Касперского" Система и способ обнаружения угроз в коде, исполняемом виртуальной машиной
US9406143B2 (en) * 2013-02-21 2016-08-02 Samsung Electronics Co., Ltd. Electronic device and method of operating electronic device
KR20140136350A (ko) * 2013-05-20 2014-11-28 삼성전자주식회사 전자장치의 사용 방법 및 장치
CN103593610B (zh) * 2013-10-09 2016-08-31 中国电子科技集团公司第二十八研究所 基于计算机免疫的间谍软件自适应诱导与检测方法
GB2524583B (en) * 2014-03-28 2017-08-09 Kaizen Reaux-Savonte Corey System, architecture and methods for an intelligent, self-aware and context-aware digital organism-based telecommunication system
US9519686B2 (en) * 2014-04-09 2016-12-13 International Business Machines Corporation Confidence ranking of answers based on temporal semantics
US9130906B1 (en) * 2014-05-23 2015-09-08 The United States Of America As Represented By The Secretary Of The Navy Method and apparatus for automated secure one-way data transmission
WO2016001924A2 (en) * 2014-06-30 2016-01-07 Syqe Medical Ltd. Methods, devices and systems for pulmonary delivery of active agents

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004524598A (ja) * 2000-09-25 2004-08-12 クロスビーム システムズ, インク. ネットワークアプリケーション装置のためのフロースケジューリング及びアーキテクチャ
JP2010152431A (ja) * 2008-12-24 2010-07-08 Mitsubishi Electric Corp 不正アクセス検知装置及び不正アクセス検知プログラム及び記録媒体及び不正アクセス検知方法
JP2014060722A (ja) * 2012-09-18 2014-04-03 Kddi Corp 将来のネットワーク攻撃を検知及び予測するために、様々な指標と過去の攻撃事例を相関させ、攻撃に関する指標のプロファイルを作成するシステム及び方法
JP2014099758A (ja) * 2012-11-14 2014-05-29 National Institute Of Information & Communication Technology 複数センサの観測情報の突合による不正通信検知方法
US20140310001A1 (en) * 2013-04-16 2014-10-16 Sri International Using Intents to Analyze and Personalize a User's Dialog Experience with a Virtual Personal Assistant
JP2015079504A (ja) * 2013-10-11 2015-04-23 ベリサイン・インコーポレイテッド ネットワーク動作アーチファクトの順序によるマルウェアの分類
US20150149182A1 (en) * 2013-11-27 2015-05-28 Sri International Sharing Intents to Provide Virtual Assistance in a Multi-Person Dialog
US20150279366A1 (en) * 2014-03-28 2015-10-01 Cubic Robotics, Inc. Voice driven operating system for interfacing with electronic devices: system, method, and architecture

Also Published As

Publication number Publication date
MY195524A (en) 2023-01-30
RU2750554C2 (ru) 2021-06-29
SG11201806117TA (en) 2018-08-30
AU2022202786A1 (en) 2022-05-19
AU2024202003A1 (en) 2024-04-18
EP3405911A4 (en) 2019-09-18
SG10202108336PA (en) 2021-08-30
ZA201805385B (en) 2022-07-27
IL306075A (en) 2023-11-01
AU2017210132A1 (en) 2018-08-23
JP2022141966A (ja) 2022-09-29
IL260711B2 (en) 2024-02-01
IL260711A (ru) 2018-09-20
BR112018015014A2 (pt) 2018-12-18
MX2018009079A (es) 2022-12-15
RU2018129947A3 (ru) 2020-07-08
RU2018129947A (ru) 2020-02-25
IL260711B1 (en) 2023-10-01
KR20180105688A (ko) 2018-09-28
CN109313687B (zh) 2022-06-24
WO2017127850A1 (en) 2017-07-27
CA3051164A1 (en) 2017-07-27
CN115062297A (zh) 2022-09-16
EP3405911A1 (en) 2018-11-28
CN109313687A (zh) 2019-02-05

Similar Documents

Publication Publication Date Title
RU2750554C2 (ru) Система компьютерной безопасности, основанная на искусственном интеллекте
US20220030009A1 (en) Computer security based on artificial intelligence
Capuano et al. Explainable artificial intelligence in cybersecurity: A survey
Moustafa et al. Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions
Charmet et al. Explainable artificial intelligence for cybersecurity: a literature survey
US20230208869A1 (en) Generative artificial intelligence method and system configured to provide outputs for company compliance
US11601463B2 (en) Cybersecurity threat modeling and analysis with text miner and data flow diagram editor
Ganesh et al. A systematic literature review on forensics in cloud, IoT, AI & blockchain
Kroll et al. Enhancing cybersecurity via artificial intelligence: Risks, rewards, and frameworks
Pogrebna et al. Navigating New Cyber Risks
Mateus-Coelho et al. Exploring Cyber Criminals and Data Privacy Measures
Smith et al. Machine learning algorithms and frameworks in ransomware detection
Khan et al. Cyber Security for Next-Generation Computing Technologies
Huang et al. Utilizing Prompt Engineering to Operationalize Cybersecurity
Kuru et al. Blockchain-Based Decentralised Privacy-Preserving Machine Learning Authentication and Verification With Immersive Devices in the Urban Metaverse Ecosystem
Kapoor et al. Platform and Model Design for Responsible AI: Design and build resilient, private, fair, and transparent machine learning models
Scheibmeir et al. Multi-model security and social media analytics of the digital twin
McDaniel et al. Secure and Trustworthy Computing 2.0 Vision Statement
Aswathy et al. 10 Privacy Breaches
Kambhampaty Detecting insider and masquerade attacks by identifying malicious user behavior and evaluating trust in cloud computing and IoT devices
Al-Kadhimi et al. A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence techniques
Bada IoTs and the need for digital norms—a global or regional issue
Shannaq et al. A security analysis to be technology architecture for ministry of regional municipalities and water resources (MRMWR) Sultanate of Oman
Varkas A security control ontology to support automated risk mitigation
Tun et al. Using Artificial Intelligence (AI) and Blockchain to Secure Smart Cities’ Services and Applications

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20200121

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20210406

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20210702

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20210903

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20220201

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20220422

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20220427

A02 Decision of refusal

Free format text: JAPANESE INTERMEDIATE CODE: A02

Effective date: 20221004