JP2019511030A - 人工知能によるコンピュータセキュリティ - Google Patents
人工知能によるコンピュータセキュリティ Download PDFInfo
- Publication number
- JP2019511030A JP2019511030A JP2018538714A JP2018538714A JP2019511030A JP 2019511030 A JP2019511030 A JP 2019511030A JP 2018538714 A JP2018538714 A JP 2018538714A JP 2018538714 A JP2018538714 A JP 2018538714A JP 2019511030 A JP2019511030 A JP 2019511030A
- Authority
- JP
- Japan
- Prior art keywords
- code
- data
- security
- information
- perception
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013473 artificial intelligence Methods 0.000 title claims abstract description 29
- 230000008447 perception Effects 0.000 claims abstract description 333
- 241000270322 Lepidosauria Species 0.000 claims abstract description 157
- 238000012546 transfer Methods 0.000 claims abstract description 48
- 230000010354 integration Effects 0.000 claims abstract description 11
- 238000010801 machine learning Methods 0.000 claims abstract description 7
- 230000004044 response Effects 0.000 claims description 202
- 238000004422 calculation algorithm Methods 0.000 claims description 146
- 230000006870 function Effects 0.000 claims description 135
- 238000000034 method Methods 0.000 claims description 112
- 238000004458 analytical method Methods 0.000 claims description 111
- 230000006399 behavior Effects 0.000 claims description 99
- 230000000694 effects Effects 0.000 claims description 97
- 238000007726 management method Methods 0.000 claims description 88
- 241000282414 Homo sapiens Species 0.000 claims description 86
- 230000008569 process Effects 0.000 claims description 68
- 230000009471 action Effects 0.000 claims description 66
- 238000003860 storage Methods 0.000 claims description 58
- 238000012545 processing Methods 0.000 claims description 53
- 230000000875 corresponding effect Effects 0.000 claims description 48
- 238000001514 detection method Methods 0.000 claims description 44
- 238000004891 communication Methods 0.000 claims description 42
- 238000005352 clarification Methods 0.000 claims description 40
- 238000009795 derivation Methods 0.000 claims description 33
- 230000008901 benefit Effects 0.000 claims description 30
- 230000002285 radioactive effect Effects 0.000 claims description 28
- 239000013598 vector Substances 0.000 claims description 27
- 238000012544 monitoring process Methods 0.000 claims description 26
- 230000003068 static effect Effects 0.000 claims description 26
- 230000008859 change Effects 0.000 claims description 25
- 230000007246 mechanism Effects 0.000 claims description 24
- 230000008520 organization Effects 0.000 claims description 24
- 238000012360 testing method Methods 0.000 claims description 24
- 238000010276 construction Methods 0.000 claims description 22
- 230000014509 gene expression Effects 0.000 claims description 22
- 239000003795 chemical substances by application Substances 0.000 claims description 20
- 230000003542 behavioural effect Effects 0.000 claims description 19
- 230000002776 aggregation Effects 0.000 claims description 18
- 238000004220 aggregation Methods 0.000 claims description 18
- 238000011835 investigation Methods 0.000 claims description 18
- 230000002441 reversible effect Effects 0.000 claims description 17
- 230000009466 transformation Effects 0.000 claims description 17
- 230000007704 transition Effects 0.000 claims description 17
- 238000004364 calculation method Methods 0.000 claims description 16
- 239000002131 composite material Substances 0.000 claims description 16
- 230000033001 locomotion Effects 0.000 claims description 16
- 230000014759 maintenance of location Effects 0.000 claims description 16
- 230000036961 partial effect Effects 0.000 claims description 15
- 238000012795 verification Methods 0.000 claims description 14
- 230000004048 modification Effects 0.000 claims description 13
- 238000012986 modification Methods 0.000 claims description 13
- 238000010521 absorption reaction Methods 0.000 claims description 12
- 230000006378 damage Effects 0.000 claims description 12
- 230000007123 defense Effects 0.000 claims description 12
- 238000013507 mapping Methods 0.000 claims description 12
- 239000000203 mixture Substances 0.000 claims description 12
- 238000000638 solvent extraction Methods 0.000 claims description 12
- 230000005540 biological transmission Effects 0.000 claims description 11
- 230000007547 defect Effects 0.000 claims description 11
- 230000009977 dual effect Effects 0.000 claims description 11
- 230000007774 longterm Effects 0.000 claims description 11
- 229940068196 placebo Drugs 0.000 claims description 11
- 239000000902 placebo Substances 0.000 claims description 11
- 238000012384 transportation and delivery Methods 0.000 claims description 11
- 238000006243 chemical reaction Methods 0.000 claims description 10
- 230000001965 increasing effect Effects 0.000 claims description 10
- 238000012913 prioritisation Methods 0.000 claims description 10
- 230000003111 delayed effect Effects 0.000 claims description 9
- 230000006698 induction Effects 0.000 claims description 9
- 241000282412 Homo Species 0.000 claims description 8
- 230000012010 growth Effects 0.000 claims description 8
- 230000002085 persistent effect Effects 0.000 claims description 8
- 238000009877 rendering Methods 0.000 claims description 8
- 230000008093 supporting effect Effects 0.000 claims description 8
- 239000004606 Fillers/Extenders Substances 0.000 claims description 7
- 230000015572 biosynthetic process Effects 0.000 claims description 7
- 230000000295 complement effect Effects 0.000 claims description 7
- 230000006872 improvement Effects 0.000 claims description 7
- 238000013519 translation Methods 0.000 claims description 7
- 239000008186 active pharmaceutical agent Substances 0.000 claims description 6
- 230000006978 adaptation Effects 0.000 claims description 6
- 230000002596 correlated effect Effects 0.000 claims description 6
- 230000006735 deficit Effects 0.000 claims description 6
- 238000005259 measurement Methods 0.000 claims description 6
- 230000009467 reduction Effects 0.000 claims description 6
- 230000001419 dependent effect Effects 0.000 claims description 5
- 229920006395 saturated elastomer Polymers 0.000 claims description 5
- 238000013068 supply chain management Methods 0.000 claims description 5
- 230000000007 visual effect Effects 0.000 claims description 5
- 239000000284 extract Substances 0.000 claims description 4
- 238000002955 isolation Methods 0.000 claims description 4
- 238000005457 optimization Methods 0.000 claims description 4
- 239000000126 substance Substances 0.000 claims description 4
- 239000013589 supplement Substances 0.000 claims description 4
- 230000000153 supplemental effect Effects 0.000 claims description 4
- 241000252203 Clupea harengus Species 0.000 claims description 3
- 230000004913 activation Effects 0.000 claims description 3
- 150000001875 compounds Chemical class 0.000 claims description 3
- 230000007423 decrease Effects 0.000 claims description 3
- 235000019514 herring Nutrition 0.000 claims description 3
- 230000001939 inductive effect Effects 0.000 claims description 3
- 238000007689 inspection Methods 0.000 claims description 3
- 238000010297 mechanical methods and process Methods 0.000 claims description 3
- 230000005226 mechanical processes and functions Effects 0.000 claims description 3
- 230000000737 periodic effect Effects 0.000 claims description 3
- 238000003786 synthesis reaction Methods 0.000 claims description 3
- 206010042635 Suspiciousness Diseases 0.000 claims description 2
- 230000001010 compromised effect Effects 0.000 claims description 2
- 238000001914 filtration Methods 0.000 claims description 2
- 230000006266 hibernation Effects 0.000 claims description 2
- 230000008450 motivation Effects 0.000 claims description 2
- 230000000717 retained effect Effects 0.000 claims description 2
- 238000012502 risk assessment Methods 0.000 claims description 2
- 230000007480 spreading Effects 0.000 claims description 2
- 238000003892 spreading Methods 0.000 claims description 2
- 102100031260 Acyl-coenzyme A thioesterase THEM4 Human genes 0.000 claims 1
- 101000638510 Homo sapiens Acyl-coenzyme A thioesterase THEM4 Proteins 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 134
- 235000013399 edible fruits Nutrition 0.000 description 16
- 241000196324 Embryophyta Species 0.000 description 13
- 238000012552 review Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 7
- 235000013410 fast food Nutrition 0.000 description 7
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 7
- 230000005658 nuclear physics Effects 0.000 description 7
- 239000000047 product Substances 0.000 description 7
- 230000036541 health Effects 0.000 description 6
- 235000013336 milk Nutrition 0.000 description 6
- 239000008267 milk Substances 0.000 description 6
- 210000004080 milk Anatomy 0.000 description 6
- 244000061458 Solanum melongena Species 0.000 description 5
- 235000002597 Solanum melongena Nutrition 0.000 description 5
- 238000013461 design Methods 0.000 description 5
- 235000013305 food Nutrition 0.000 description 5
- 230000002265 prevention Effects 0.000 description 5
- 238000011160 research Methods 0.000 description 5
- 238000004088 simulation Methods 0.000 description 5
- 244000141359 Malus pumila Species 0.000 description 4
- 238000013475 authorization Methods 0.000 description 4
- 238000011842 forensic investigation Methods 0.000 description 4
- 238000005755 formation reaction Methods 0.000 description 4
- 238000009434 installation Methods 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 4
- 230000011218 segmentation Effects 0.000 description 4
- 238000000926 separation method Methods 0.000 description 4
- 244000099147 Ananas comosus Species 0.000 description 3
- 235000007119 Ananas comosus Nutrition 0.000 description 3
- 244000000626 Daucus carota Species 0.000 description 3
- 235000002767 Daucus carota Nutrition 0.000 description 3
- 235000007688 Lycopersicon esculentum Nutrition 0.000 description 3
- 241000590419 Polygonia interrogationis Species 0.000 description 3
- 240000003768 Solanum lycopersicum Species 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 3
- 230000000739 chaotic effect Effects 0.000 description 3
- 230000001149 cognitive effect Effects 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 230000003203 everyday effect Effects 0.000 description 3
- 210000003128 head Anatomy 0.000 description 3
- 208000015181 infectious disease Diseases 0.000 description 3
- 230000010365 information processing Effects 0.000 description 3
- 238000002360 preparation method Methods 0.000 description 3
- 238000000844 transformation Methods 0.000 description 3
- 240000008415 Lactuca sativa Species 0.000 description 2
- 241000283973 Oryctolagus cuniculus Species 0.000 description 2
- 241000700605 Viruses Species 0.000 description 2
- 238000007792 addition Methods 0.000 description 2
- 230000002155 anti-virotic effect Effects 0.000 description 2
- 230000009118 appropriate response Effects 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 238000013479 data entry Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 206010012601 diabetes mellitus Diseases 0.000 description 2
- 230000008451 emotion Effects 0.000 description 2
- 239000012634 fragment Substances 0.000 description 2
- 239000003292 glue Substances 0.000 description 2
- 235000015220 hamburgers Nutrition 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000003278 mimic effect Effects 0.000 description 2
- 238000002156 mixing Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 239000010970 precious metal Substances 0.000 description 2
- 238000011867 re-evaluation Methods 0.000 description 2
- 235000012045 salad Nutrition 0.000 description 2
- 230000013707 sensory perception of sound Effects 0.000 description 2
- 230000036410 touch Effects 0.000 description 2
- 238000012549 training Methods 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- PCTMTFRHKVHKIS-BMFZQQSSSA-N (1s,3r,4e,6e,8e,10e,12e,14e,16e,18s,19r,20r,21s,25r,27r,30r,31r,33s,35r,37s,38r)-3-[(2r,3s,4s,5s,6r)-4-amino-3,5-dihydroxy-6-methyloxan-2-yl]oxy-19,25,27,30,31,33,35,37-octahydroxy-18,20,21-trimethyl-23-oxo-22,39-dioxabicyclo[33.3.1]nonatriaconta-4,6,8,10 Chemical compound C1C=C2C[C@@H](OS(O)(=O)=O)CC[C@]2(C)[C@@H]2[C@@H]1[C@@H]1CC[C@H]([C@H](C)CCCC(C)C)[C@@]1(C)CC2.O[C@H]1[C@@H](N)[C@H](O)[C@@H](C)O[C@H]1O[C@H]1/C=C/C=C/C=C/C=C/C=C/C=C/C=C/[C@H](C)[C@@H](O)[C@@H](C)[C@H](C)OC(=O)C[C@H](O)C[C@H](O)CC[C@@H](O)[C@H](O)C[C@H](O)C[C@](O)(C[C@H](O)[C@H]2C(O)=O)O[C@H]2C1 PCTMTFRHKVHKIS-BMFZQQSSSA-N 0.000 description 1
- TXECTBGVEUDNSL-UHFFFAOYSA-N 1-acetyloxyprop-2-enyl acetate Chemical compound CC(=O)OC(C=C)OC(C)=O TXECTBGVEUDNSL-UHFFFAOYSA-N 0.000 description 1
- QRKPLLLQZJCOLR-UHFFFAOYSA-N 6-[2-(4-carboxybut-2-enyl)-3-hydroxy-5-oxocyclopentyl]-4-oxohexanoic acid Chemical compound OC1CC(=O)C(CCC(=O)CCC(O)=O)C1CC=CCC(O)=O QRKPLLLQZJCOLR-UHFFFAOYSA-N 0.000 description 1
- 241000238876 Acari Species 0.000 description 1
- 241000256837 Apidae Species 0.000 description 1
- 235000004936 Bromus mango Nutrition 0.000 description 1
- 206010010144 Completed suicide Diseases 0.000 description 1
- 206010012335 Dependence Diseases 0.000 description 1
- 241000238558 Eucarida Species 0.000 description 1
- 208000002705 Glucose Intolerance Diseases 0.000 description 1
- 206010018429 Glucose tolerance impaired Diseases 0.000 description 1
- 241000257303 Hymenoptera Species 0.000 description 1
- 240000007228 Mangifera indica Species 0.000 description 1
- 235000014826 Mangifera indica Nutrition 0.000 description 1
- 240000008790 Musa x paradisiaca Species 0.000 description 1
- 229910052778 Plutonium Inorganic materials 0.000 description 1
- DYAHQFWOVKZOOW-UHFFFAOYSA-N Sarin Chemical compound CC(C)OP(C)(F)=O DYAHQFWOVKZOOW-UHFFFAOYSA-N 0.000 description 1
- 235000009184 Spondias indica Nutrition 0.000 description 1
- NINIDFKCEFEMDL-UHFFFAOYSA-N Sulfur Chemical group [S] NINIDFKCEFEMDL-UHFFFAOYSA-N 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 235000021016 apples Nutrition 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 235000021015 bananas Nutrition 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 239000003054 catalyst Substances 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000010835 comparative analysis Methods 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000001816 cooling Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000002354 daily effect Effects 0.000 description 1
- 238000013501 data transformation Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000003745 diagnosis Methods 0.000 description 1
- 235000006694 eating habits Nutrition 0.000 description 1
- 230000002996 emotional effect Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000001747 exhibiting effect Effects 0.000 description 1
- 230000004438 eyesight Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 239000012530 fluid Substances 0.000 description 1
- 230000020169 heat generation Effects 0.000 description 1
- 239000012771 household material Substances 0.000 description 1
- 238000009396 hybridization Methods 0.000 description 1
- 230000001976 improved effect Effects 0.000 description 1
- 230000008595 infiltration Effects 0.000 description 1
- 238000001764 infiltration Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000011068 loading method Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 230000000873 masking effect Effects 0.000 description 1
- 230000007595 memory recall Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 230000036651 mood Effects 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- OYEHPCDNVJXUIW-UHFFFAOYSA-N plutonium atom Chemical compound [Pu] OYEHPCDNVJXUIW-UHFFFAOYSA-N 0.000 description 1
- 230000010152 pollination Effects 0.000 description 1
- 230000002062 proliferating effect Effects 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 235000021148 salty food Nutrition 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
- 230000035807 sensation Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 230000008786 sensory perception of smell Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000007958 sleep Effects 0.000 description 1
- 230000035943 smell Effects 0.000 description 1
- 238000005476 soldering Methods 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 238000009662 stress testing Methods 0.000 description 1
- 201000009032 substance abuse Diseases 0.000 description 1
- 229910052717 sulfur Inorganic materials 0.000 description 1
- 239000011593 sulfur Substances 0.000 description 1
- 230000001502 supplementing effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000000699 topical effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 235000013311 vegetables Nutrition 0.000 description 1
- 230000016776 visual perception Effects 0.000 description 1
- 230000001755 vocal effect Effects 0.000 description 1
- 238000001363 water suppression through gradient tailored excitation Methods 0.000 description 1
- 230000003442 weekly effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/564—Static detection by virus signature recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/31—Programming languages or programming paradigms
- G06F8/311—Functional or applicative languages; Rewrite languages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/31—Programming languages or programming paradigms
- G06F8/313—Logic programming, e.g. PROLOG programming language
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
- G06N5/022—Knowledge engineering; Knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Artificial Intelligence (AREA)
- Data Mining & Analysis (AREA)
- Mathematical Physics (AREA)
- Evolutionary Computation (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Debugging And Monitoring (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2022121072A JP2022141966A (ja) | 2016-01-24 | 2022-07-29 | 人工知能によるコンピュータセキュリティ |
Applications Claiming Priority (19)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662286437P | 2016-01-24 | 2016-01-24 | |
US62/286,437 | 2016-01-24 | ||
US201662294258P | 2016-02-11 | 2016-02-11 | |
US62/294,258 | 2016-02-11 | ||
US201662307558P | 2016-03-13 | 2016-03-13 | |
US62/307,558 | 2016-03-13 | ||
US201662323657P | 2016-04-16 | 2016-04-16 | |
US62/323,657 | 2016-04-16 | ||
US201662326723P | 2016-04-23 | 2016-04-23 | |
US62/326,723 | 2016-04-23 | ||
US15/145,800 | 2016-05-04 | ||
US15/145,800 US20160330219A1 (en) | 2015-05-04 | 2016-05-04 | Method and device for managing security in a computer network |
US201662341310P | 2016-05-25 | 2016-05-25 | |
US62/341,310 | 2016-05-25 | ||
US15/264,744 US20170076391A1 (en) | 2015-09-14 | 2016-09-14 | System of perpetual giving |
US15/264,744 | 2016-09-14 | ||
US201662439409P | 2016-12-27 | 2016-12-27 | |
US62/439,409 | 2016-12-27 | ||
PCT/US2017/014699 WO2017127850A1 (en) | 2016-01-24 | 2017-01-24 | Computer security based on artificial intelligence |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2022121072A Division JP2022141966A (ja) | 2016-01-24 | 2022-07-29 | 人工知能によるコンピュータセキュリティ |
Publications (1)
Publication Number | Publication Date |
---|---|
JP2019511030A true JP2019511030A (ja) | 2019-04-18 |
Family
ID=59362181
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2018538714A Pending JP2019511030A (ja) | 2016-01-24 | 2017-01-24 | 人工知能によるコンピュータセキュリティ |
JP2022121072A Pending JP2022141966A (ja) | 2016-01-24 | 2022-07-29 | 人工知能によるコンピュータセキュリティ |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2022121072A Pending JP2022141966A (ja) | 2016-01-24 | 2022-07-29 | 人工知能によるコンピュータセキュリティ |
Country Status (14)
Country | Link |
---|---|
EP (1) | EP3405911A4 (ru) |
JP (2) | JP2019511030A (ru) |
KR (1) | KR20180105688A (ru) |
CN (2) | CN115062297A (ru) |
AU (3) | AU2017210132A1 (ru) |
BR (1) | BR112018015014A2 (ru) |
CA (1) | CA3051164A1 (ru) |
IL (2) | IL260711B2 (ru) |
MX (1) | MX2018009079A (ru) |
MY (1) | MY195524A (ru) |
RU (1) | RU2750554C2 (ru) |
SG (2) | SG11201806117TA (ru) |
WO (1) | WO2017127850A1 (ru) |
ZA (1) | ZA201805385B (ru) |
Families Citing this family (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11574287B2 (en) | 2017-10-10 | 2023-02-07 | Text IQ, Inc. | Automatic document classification |
WO2019104189A1 (en) * | 2017-11-27 | 2019-05-31 | Intuition Robotics, Ltd | System and method for optimizing resource usage of a robot |
US11157295B2 (en) | 2018-01-02 | 2021-10-26 | Patrick Schur | System and method for providing intelligent operant operating interface and intelligent personal assistant as a service on a crypto secure social media and cross bridge service with continuous prosumer validation based on i-operant+198 tags, i-bubble+198 tags, demojis+198 and demoticons+198 |
US11232523B2 (en) | 2018-01-02 | 2022-01-25 | Patrick Schur | System and method for providing an intelligent operating interface and intelligent personal assistant as a service on a crypto secure social media and cross bridge service with continuous prosumer validation based on i-operant tags, i-bubble tags, demojis and demoticons |
CA3093021A1 (en) * | 2018-03-05 | 2019-09-12 | EzoTech Inc. | Automated security testing system and method |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US10855702B2 (en) | 2018-06-06 | 2020-12-01 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US10785108B1 (en) | 2018-06-21 | 2020-09-22 | Wells Fargo Bank, N.A. | Intelligent learning and management of a networked architecture |
US11068464B2 (en) | 2018-06-26 | 2021-07-20 | At&T Intellectual Property I, L.P. | Cyber intelligence system and method |
US10868782B2 (en) | 2018-07-12 | 2020-12-15 | Bank Of America Corporation | System for flagging data transmissions for retention of metadata and triggering appropriate transmission placement |
WO2020016906A1 (en) * | 2018-07-16 | 2020-01-23 | Sriram Govindan | Method and system for intrusion detection in an enterprise |
US11601442B2 (en) | 2018-08-17 | 2023-03-07 | The Research Foundation For The State University Of New York | System and method associated with expedient detection and reconstruction of cyber events in a compact scenario representation using provenance tags and customizable policy |
CN109189751B (zh) * | 2018-09-18 | 2023-05-26 | 平安科技(深圳)有限公司 | 基于区块链的数据同步方法及终端设备 |
US11122136B2 (en) | 2018-10-22 | 2021-09-14 | Red Hat, Inc. | Quantum payload service for facilitating communications between a quantum computing system and classical computing systems |
US10740930B2 (en) | 2018-11-07 | 2020-08-11 | Love Good Color LLC | Systems and methods for color selection and auditing |
US11144334B2 (en) | 2018-12-20 | 2021-10-12 | Red Hat, Inc. | Quantum computer task manager |
KR102167767B1 (ko) * | 2018-12-26 | 2020-10-19 | 단국대학교 산학협력단 | 머신러닝의 학습 데이터셋 생성을 위한 애플리케이션 자동화 빌드 장치 및 방법 |
EP3693873B1 (en) * | 2019-02-07 | 2022-02-16 | AO Kaspersky Lab | Systems and methods for configuring a gateway for protection of automated systems |
WO2020167586A1 (en) * | 2019-02-11 | 2020-08-20 | Db Cybertech, Inc. | Automated data discovery for cybersecurity |
FR3094600B1 (fr) * | 2019-03-29 | 2022-05-06 | Orange | Procédé d’extraction d’au moins un motif de communication dans un réseau de communication |
US11546366B2 (en) | 2019-05-08 | 2023-01-03 | International Business Machines Corporation | Threat information sharing based on blockchain |
CN111913892B (zh) * | 2019-05-09 | 2021-12-07 | 北京忆芯科技有限公司 | 使用cmb提供开放通道存储设备 |
US11309974B2 (en) | 2019-05-09 | 2022-04-19 | Red Hat, Inc. | Quantum channel routing utilizing a quantum channel measurement service |
USD926809S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926810S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926200S1 (en) | 2019-06-06 | 2021-07-27 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926811S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926782S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
CN110187885B (zh) * | 2019-06-10 | 2023-03-31 | 合肥本源量子计算科技有限责任公司 | 一种量子程序编译的中间代码生成方法及装置 |
CN111027623A (zh) * | 2019-12-10 | 2020-04-17 | 深圳供电局有限公司 | 数据增强的智能终端安全等级分类方法及系统 |
KR102299145B1 (ko) * | 2020-02-25 | 2021-09-07 | 서울과학기술대학교 산학협력단 | 디지털 포렌식 증거 수집을 위한 사이버 물리 시스템 |
KR20210115728A (ko) * | 2020-03-16 | 2021-09-27 | 삼성전자주식회사 | 전자 장치 및 이의 제어 방법 |
CN111460129B (zh) * | 2020-03-27 | 2023-08-22 | 泰康保险集团股份有限公司 | 标识生成的方法、装置、电子设备和存储介质 |
KR102164203B1 (ko) * | 2020-04-03 | 2020-10-13 | 주식회사 이지시큐 | 정보보호 위험분석 자동화 시스템 및 그 동작 방법 |
CN111659124B (zh) * | 2020-05-27 | 2023-05-02 | 太原理工大学 | 一种用于对弈的智能鉴别系统 |
WO2021243321A1 (en) * | 2020-05-29 | 2021-12-02 | Qomplx, Inc. | A system and methods for score cybersecurity |
CN111651756B (zh) * | 2020-06-04 | 2022-05-31 | 成都安恒信息技术有限公司 | 一种应用于运维审计navicat的自动代填方法 |
CN112035797A (zh) * | 2020-08-31 | 2020-12-04 | 山东诺蓝信息科技有限公司 | 一种基于自主学习的功率状态判决算法 |
KR102233694B1 (ko) * | 2020-09-29 | 2021-03-30 | 주식회사 이지시큐 | 비용절감 및 효과적인 인증관리를 제공하는 정보보호 시스템 |
KR102233698B1 (ko) * | 2020-09-29 | 2021-03-30 | 주식회사 이지시큐 | 기밀성, 무결성, 가용성에 기반하여 정보보호 관련 위험등급을 설정하는 방법 및 그 시스템 |
KR102233695B1 (ko) * | 2020-09-29 | 2021-03-30 | 주식회사 이지시큐 | 정보보호 위험분석을 수행하는 정보통신 시스템 |
KR102232883B1 (ko) * | 2020-09-29 | 2021-03-26 | 주식회사 이지시큐 | 정보보호 관리체계 인증을 위한 인공지능 시스템 |
US11606694B2 (en) | 2020-10-08 | 2023-03-14 | Surendra Goel | System that provides cybersecurity in a home or office by interacting with internet of things devices and other devices |
KR102280845B1 (ko) | 2020-11-24 | 2021-07-22 | 한국인터넷진흥원 | 네트워크 내의 비정상 행위 탐지 방법 및 그 장치 |
US20220191234A1 (en) * | 2020-12-15 | 2022-06-16 | Mastercard Technologies Canada ULC | Enterprise server and method with universal bypass mechanism for automatically testing real-time computer security services |
CN114745291A (zh) * | 2020-12-23 | 2022-07-12 | 北京国双科技有限公司 | 一种异常数据上云方法、装置、电子设备及存储介质 |
CN114765627A (zh) * | 2021-01-14 | 2022-07-19 | 京东科技控股股份有限公司 | 数据传输方法、设备、存储介质及计算机程序产品 |
CN112783661B (zh) * | 2021-02-08 | 2022-08-12 | 上海交通大学 | 一种适用于容器环境下的内存重删方法及装置 |
US20240070276A1 (en) * | 2021-02-08 | 2024-02-29 | Hewlett-Packard Development Company, L.P. | Malware scans |
CN112819590B (zh) * | 2021-02-25 | 2023-03-10 | 紫光云技术有限公司 | 一种云产品服务交付过程中产品配置信息管理的方法 |
CN113395593B (zh) * | 2021-08-17 | 2021-10-29 | 深圳佳力拓科技有限公司 | 减少信息泄漏的数字电视终端的数据发送方法和装置 |
CN113961518B (zh) * | 2021-09-08 | 2022-09-23 | 北京百度网讯科技有限公司 | 日志的可视化展示方法、装置、电子设备及存储介质 |
WO2023097026A2 (en) * | 2021-11-23 | 2023-06-01 | Strong Force TX Portfolio 2018, LLC | Transaction platforms where systems include sets of other systems |
KR102509102B1 (ko) * | 2022-07-15 | 2023-03-09 | 신헌주 | 인공지능을 이용한 육성 시스템 |
CN115203689B (zh) * | 2022-07-25 | 2023-05-02 | 广州正则纬创信息科技有限公司 | 一种数据安全分享方法及系统 |
CN115987176B (zh) * | 2023-02-01 | 2023-09-12 | 北京东土科技股份有限公司 | 对电机位置进行回零控制的方法、装置和边缘控制器 |
CN116522895B (zh) * | 2023-06-16 | 2023-09-12 | 中国传媒大学 | 一种基于写作风格的文本内容真实性评估方法及设备 |
CN117150551B (zh) * | 2023-09-04 | 2024-02-27 | 东方魂数字科技(北京)有限公司 | 基于大数据的用户隐私保护方法和系统 |
CN117540038B (zh) * | 2024-01-10 | 2024-03-22 | 中国信息通信研究院 | 智能检测虚假数据合成方法和系统 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004524598A (ja) * | 2000-09-25 | 2004-08-12 | クロスビーム システムズ, インク. | ネットワークアプリケーション装置のためのフロースケジューリング及びアーキテクチャ |
JP2010152431A (ja) * | 2008-12-24 | 2010-07-08 | Mitsubishi Electric Corp | 不正アクセス検知装置及び不正アクセス検知プログラム及び記録媒体及び不正アクセス検知方法 |
JP2014060722A (ja) * | 2012-09-18 | 2014-04-03 | Kddi Corp | 将来のネットワーク攻撃を検知及び予測するために、様々な指標と過去の攻撃事例を相関させ、攻撃に関する指標のプロファイルを作成するシステム及び方法 |
JP2014099758A (ja) * | 2012-11-14 | 2014-05-29 | National Institute Of Information & Communication Technology | 複数センサの観測情報の突合による不正通信検知方法 |
US20140310001A1 (en) * | 2013-04-16 | 2014-10-16 | Sri International | Using Intents to Analyze and Personalize a User's Dialog Experience with a Virtual Personal Assistant |
JP2015079504A (ja) * | 2013-10-11 | 2015-04-23 | ベリサイン・インコーポレイテッド | ネットワーク動作アーチファクトの順序によるマルウェアの分類 |
US20150149182A1 (en) * | 2013-11-27 | 2015-05-28 | Sri International | Sharing Intents to Provide Virtual Assistance in a Multi-Person Dialog |
US20150279366A1 (en) * | 2014-03-28 | 2015-10-01 | Cubic Robotics, Inc. | Voice driven operating system for interfacing with electronic devices: system, method, and architecture |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1245572A (zh) * | 1997-10-30 | 2000-02-23 | 全昌龙 | 计算机安全部件 |
WO2007117567A2 (en) * | 2006-04-06 | 2007-10-18 | Smobile Systems Inc. | Malware detection system and method for limited access mobile platforms |
US7991724B2 (en) * | 2006-12-21 | 2011-08-02 | Support Machines Ltd. | Method and a computer program product for providing a response to a statement of a user |
US9489647B2 (en) * | 2008-06-19 | 2016-11-08 | Csc Agility Platform, Inc. | System and method for a cloud computing abstraction with self-service portal for publishing resources |
US8353033B1 (en) * | 2008-07-02 | 2013-01-08 | Symantec Corporation | Collecting malware samples via unauthorized download protection |
US8516594B2 (en) * | 2009-04-24 | 2013-08-20 | Jeff Bennett | Enterprise information security management software for prediction modeling with interactive graphs |
WO2011014668A2 (en) * | 2009-07-30 | 2011-02-03 | Zinan Chen | Independent carrier ethernet interconnection platform |
US10019677B2 (en) * | 2009-11-20 | 2018-07-10 | Alert Enterprise, Inc. | Active policy enforcement |
US8806568B2 (en) * | 2011-07-11 | 2014-08-12 | International Business Machines Corporation | Automatic generation of user account policies based on configuration management database information |
EP2725728B1 (en) * | 2012-10-29 | 2018-08-15 | ADVA Optical Networking SE | Method and device for assessing the performance of one or more packet synchronization services in a packet data transmission network |
RU2522019C1 (ru) * | 2012-12-25 | 2014-07-10 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ обнаружения угроз в коде, исполняемом виртуальной машиной |
US9406143B2 (en) * | 2013-02-21 | 2016-08-02 | Samsung Electronics Co., Ltd. | Electronic device and method of operating electronic device |
KR20140136350A (ko) * | 2013-05-20 | 2014-11-28 | 삼성전자주식회사 | 전자장치의 사용 방법 및 장치 |
CN103593610B (zh) * | 2013-10-09 | 2016-08-31 | 中国电子科技集团公司第二十八研究所 | 基于计算机免疫的间谍软件自适应诱导与检测方法 |
GB2524583B (en) * | 2014-03-28 | 2017-08-09 | Kaizen Reaux-Savonte Corey | System, architecture and methods for an intelligent, self-aware and context-aware digital organism-based telecommunication system |
US9519686B2 (en) * | 2014-04-09 | 2016-12-13 | International Business Machines Corporation | Confidence ranking of answers based on temporal semantics |
US9130906B1 (en) * | 2014-05-23 | 2015-09-08 | The United States Of America As Represented By The Secretary Of The Navy | Method and apparatus for automated secure one-way data transmission |
WO2016001924A2 (en) * | 2014-06-30 | 2016-01-07 | Syqe Medical Ltd. | Methods, devices and systems for pulmonary delivery of active agents |
-
2017
- 2017-01-24 CA CA3051164A patent/CA3051164A1/en active Pending
- 2017-01-24 KR KR1020187024400A patent/KR20180105688A/ko not_active Application Discontinuation
- 2017-01-24 CN CN202210557303.8A patent/CN115062297A/zh active Pending
- 2017-01-24 IL IL260711A patent/IL260711B2/en unknown
- 2017-01-24 AU AU2017210132A patent/AU2017210132A1/en not_active Abandoned
- 2017-01-24 IL IL306075A patent/IL306075A/en unknown
- 2017-01-24 WO PCT/US2017/014699 patent/WO2017127850A1/en active Application Filing
- 2017-01-24 SG SG11201806117TA patent/SG11201806117TA/en unknown
- 2017-01-24 EP EP17742143.5A patent/EP3405911A4/en active Pending
- 2017-01-24 CN CN201780019904.0A patent/CN109313687B/zh active Active
- 2017-01-24 BR BR112018015014A patent/BR112018015014A2/pt unknown
- 2017-01-24 RU RU2018129947A patent/RU2750554C2/ru active
- 2017-01-24 MX MX2018009079A patent/MX2018009079A/es unknown
- 2017-01-24 JP JP2018538714A patent/JP2019511030A/ja active Pending
- 2017-01-24 SG SG10202108336PA patent/SG10202108336PA/en unknown
- 2017-01-24 MY MYPI2018702527A patent/MY195524A/en unknown
-
2018
- 2018-08-13 ZA ZA2018/05385A patent/ZA201805385B/en unknown
-
2022
- 2022-04-27 AU AU2022202786A patent/AU2022202786A1/en not_active Abandoned
- 2022-07-29 JP JP2022121072A patent/JP2022141966A/ja active Pending
-
2024
- 2024-03-27 AU AU2024202003A patent/AU2024202003A1/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004524598A (ja) * | 2000-09-25 | 2004-08-12 | クロスビーム システムズ, インク. | ネットワークアプリケーション装置のためのフロースケジューリング及びアーキテクチャ |
JP2010152431A (ja) * | 2008-12-24 | 2010-07-08 | Mitsubishi Electric Corp | 不正アクセス検知装置及び不正アクセス検知プログラム及び記録媒体及び不正アクセス検知方法 |
JP2014060722A (ja) * | 2012-09-18 | 2014-04-03 | Kddi Corp | 将来のネットワーク攻撃を検知及び予測するために、様々な指標と過去の攻撃事例を相関させ、攻撃に関する指標のプロファイルを作成するシステム及び方法 |
JP2014099758A (ja) * | 2012-11-14 | 2014-05-29 | National Institute Of Information & Communication Technology | 複数センサの観測情報の突合による不正通信検知方法 |
US20140310001A1 (en) * | 2013-04-16 | 2014-10-16 | Sri International | Using Intents to Analyze and Personalize a User's Dialog Experience with a Virtual Personal Assistant |
JP2015079504A (ja) * | 2013-10-11 | 2015-04-23 | ベリサイン・インコーポレイテッド | ネットワーク動作アーチファクトの順序によるマルウェアの分類 |
US20150149182A1 (en) * | 2013-11-27 | 2015-05-28 | Sri International | Sharing Intents to Provide Virtual Assistance in a Multi-Person Dialog |
US20150279366A1 (en) * | 2014-03-28 | 2015-10-01 | Cubic Robotics, Inc. | Voice driven operating system for interfacing with electronic devices: system, method, and architecture |
Also Published As
Publication number | Publication date |
---|---|
MY195524A (en) | 2023-01-30 |
RU2750554C2 (ru) | 2021-06-29 |
SG11201806117TA (en) | 2018-08-30 |
AU2022202786A1 (en) | 2022-05-19 |
AU2024202003A1 (en) | 2024-04-18 |
EP3405911A4 (en) | 2019-09-18 |
SG10202108336PA (en) | 2021-08-30 |
ZA201805385B (en) | 2022-07-27 |
IL306075A (en) | 2023-11-01 |
AU2017210132A1 (en) | 2018-08-23 |
JP2022141966A (ja) | 2022-09-29 |
IL260711B2 (en) | 2024-02-01 |
IL260711A (ru) | 2018-09-20 |
BR112018015014A2 (pt) | 2018-12-18 |
MX2018009079A (es) | 2022-12-15 |
RU2018129947A3 (ru) | 2020-07-08 |
RU2018129947A (ru) | 2020-02-25 |
IL260711B1 (en) | 2023-10-01 |
KR20180105688A (ko) | 2018-09-28 |
CN109313687B (zh) | 2022-06-24 |
WO2017127850A1 (en) | 2017-07-27 |
CA3051164A1 (en) | 2017-07-27 |
CN115062297A (zh) | 2022-09-16 |
EP3405911A1 (en) | 2018-11-28 |
CN109313687A (zh) | 2019-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2750554C2 (ru) | Система компьютерной безопасности, основанная на искусственном интеллекте | |
US20220030009A1 (en) | Computer security based on artificial intelligence | |
Capuano et al. | Explainable artificial intelligence in cybersecurity: A survey | |
Moustafa et al. | Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions | |
Charmet et al. | Explainable artificial intelligence for cybersecurity: a literature survey | |
US20230208869A1 (en) | Generative artificial intelligence method and system configured to provide outputs for company compliance | |
US11601463B2 (en) | Cybersecurity threat modeling and analysis with text miner and data flow diagram editor | |
Ganesh et al. | A systematic literature review on forensics in cloud, IoT, AI & blockchain | |
Kroll et al. | Enhancing cybersecurity via artificial intelligence: Risks, rewards, and frameworks | |
Pogrebna et al. | Navigating New Cyber Risks | |
Mateus-Coelho et al. | Exploring Cyber Criminals and Data Privacy Measures | |
Smith et al. | Machine learning algorithms and frameworks in ransomware detection | |
Khan et al. | Cyber Security for Next-Generation Computing Technologies | |
Huang et al. | Utilizing Prompt Engineering to Operationalize Cybersecurity | |
Kuru et al. | Blockchain-Based Decentralised Privacy-Preserving Machine Learning Authentication and Verification With Immersive Devices in the Urban Metaverse Ecosystem | |
Kapoor et al. | Platform and Model Design for Responsible AI: Design and build resilient, private, fair, and transparent machine learning models | |
Scheibmeir et al. | Multi-model security and social media analytics of the digital twin | |
McDaniel et al. | Secure and Trustworthy Computing 2.0 Vision Statement | |
Aswathy et al. | 10 Privacy Breaches | |
Kambhampaty | Detecting insider and masquerade attacks by identifying malicious user behavior and evaluating trust in cloud computing and IoT devices | |
Al-Kadhimi et al. | A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence techniques | |
Bada | IoTs and the need for digital norms—a global or regional issue | |
Shannaq et al. | A security analysis to be technology architecture for ministry of regional municipalities and water resources (MRMWR) Sultanate of Oman | |
Varkas | A security control ontology to support automated risk mitigation | |
Tun et al. | Using Artificial Intelligence (AI) and Blockchain to Secure Smart Cities’ Services and Applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20200121 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20210406 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20210702 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20210903 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20220201 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20220422 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20220427 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20221004 |