MY195524A - Computer Security Based on Artificial Intelligence - Google Patents

Computer Security Based on Artificial Intelligence

Info

Publication number
MY195524A
MY195524A MYPI2018702527A MYPI2018702527A MY195524A MY 195524 A MY195524 A MY 195524A MY PI2018702527 A MYPI2018702527 A MY PI2018702527A MY PI2018702527 A MYPI2018702527 A MY PI2018702527A MY 195524 A MY195524 A MY 195524A
Authority
MY
Malaysia
Prior art keywords
intelligence
artificial
retribution
computer security
artificial intelligence
Prior art date
Application number
MYPI2018702527A
Inventor
Kamran Hasan Syed
Original Assignee
Kamran Hasan Syed
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/145,800 external-priority patent/US20160330219A1/en
Priority claimed from US15/264,744 external-priority patent/US20170076391A1/en
Application filed by Kamran Hasan Syed filed Critical Kamran Hasan Syed
Publication of MY195524A publication Critical patent/MY195524A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/31Programming languages or programming paradigms
    • G06F8/311Functional or applicative languages; Rewrite languages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/31Programming languages or programming paradigms
    • G06F8/313Logic programming, e.g. PROLOG programming language
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • G06N5/022Knowledge engineering; Knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/04Inference or reasoning models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

Computer security system based on artificial intelligence includes Critical Infrastructure Protection & Retribution (CIPR) through Cloud & Tiered Information Security (CTIS), Machine Clandestine Intelligence (MACINT) & Retribution through Covert Operations in Cyberspace, Logically Inferred Zero-database A-priori Realtime Defense (LIZARD) (16), Critical Thinking Memory & Perception (CTMP) (22), Lexical Objectivity Mining (LOM), Linear Atomic Quantum Information Transfer (LAQIT), Universal/Ubiquitous Base Connection Harmonization Attaching Integrated Nodes (SCHAIN) Everyone, Everything, Everywhere All the time (E3A) Connections (UBEC) system and Symbiotic Recursive Intelligence Advancement (SRIA), which is a triad relationship between three different algorithms that enable each other to grow in Intelligence (e.g., Intelligence Explosion, Artificial General Intelligence, & Artificial Super-intelligence) in order to achieve Technological Singularity. (FIG. 123)
MYPI2018702527A 2016-01-24 2017-01-24 Computer Security Based on Artificial Intelligence MY195524A (en)

Applications Claiming Priority (10)

Application Number Priority Date Filing Date Title
US201662286437P 2016-01-24 2016-01-24
US201662294258P 2016-02-11 2016-02-11
US201662307558P 2016-03-13 2016-03-13
US201662323657P 2016-04-16 2016-04-16
US201662326723P 2016-04-23 2016-04-23
US15/145,800 US20160330219A1 (en) 2015-05-04 2016-05-04 Method and device for managing security in a computer network
US201662341310P 2016-05-25 2016-05-25
US15/264,744 US20170076391A1 (en) 2015-09-14 2016-09-14 System of perpetual giving
US201662439409P 2016-12-27 2016-12-27
PCT/US2017/014699 WO2017127850A1 (en) 2016-01-24 2017-01-24 Computer security based on artificial intelligence

Publications (1)

Publication Number Publication Date
MY195524A true MY195524A (en) 2023-01-30

Family

ID=59362181

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2018702527A MY195524A (en) 2016-01-24 2017-01-24 Computer Security Based on Artificial Intelligence

Country Status (14)

Country Link
EP (1) EP3405911A4 (en)
JP (2) JP2019511030A (en)
KR (1) KR20180105688A (en)
CN (2) CN115062297A (en)
AU (3) AU2017210132A1 (en)
BR (1) BR112018015014A2 (en)
CA (1) CA3051164A1 (en)
IL (2) IL260711B2 (en)
MX (1) MX2018009079A (en)
MY (1) MY195524A (en)
RU (1) RU2750554C2 (en)
SG (2) SG10202108336PA (en)
WO (1) WO2017127850A1 (en)
ZA (1) ZA201805385B (en)

Families Citing this family (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11574287B2 (en) 2017-10-10 2023-02-07 Text IQ, Inc. Automatic document classification
WO2019104189A1 (en) * 2017-11-27 2019-05-31 Intuition Robotics, Ltd System and method for optimizing resource usage of a robot
US11232523B2 (en) 2018-01-02 2022-01-25 Patrick Schur System and method for providing an intelligent operating interface and intelligent personal assistant as a service on a crypto secure social media and cross bridge service with continuous prosumer validation based on i-operant tags, i-bubble tags, demojis and demoticons
US11157295B2 (en) 2018-01-02 2021-10-26 Patrick Schur System and method for providing intelligent operant operating interface and intelligent personal assistant as a service on a crypto secure social media and cross bridge service with continuous prosumer validation based on i-operant+198 tags, i-bubble+198 tags, demojis+198 and demoticons+198
CA3093021A1 (en) * 2018-03-05 2019-09-12 EzoTech Inc. Automated security testing system and method
US10855702B2 (en) 2018-06-06 2020-12-01 Reliaquest Holdings, Llc Threat mitigation system and method
US11709946B2 (en) 2018-06-06 2023-07-25 Reliaquest Holdings, Llc Threat mitigation system and method
US10785108B1 (en) 2018-06-21 2020-09-22 Wells Fargo Bank, N.A. Intelligent learning and management of a networked architecture
US11068464B2 (en) 2018-06-26 2021-07-20 At&T Intellectual Property I, L.P. Cyber intelligence system and method
US10868782B2 (en) 2018-07-12 2020-12-15 Bank Of America Corporation System for flagging data transmissions for retention of metadata and triggering appropriate transmission placement
WO2020016906A1 (en) * 2018-07-16 2020-01-23 Sriram Govindan Method and system for intrusion detection in an enterprise
US11601442B2 (en) 2018-08-17 2023-03-07 The Research Foundation For The State University Of New York System and method associated with expedient detection and reconstruction of cyber events in a compact scenario representation using provenance tags and customizable policy
CN109189751B (en) * 2018-09-18 2023-05-26 平安科技(深圳)有限公司 Data synchronization method based on block chain and terminal equipment
US11122136B2 (en) 2018-10-22 2021-09-14 Red Hat, Inc. Quantum payload service for facilitating communications between a quantum computing system and classical computing systems
US10740930B2 (en) 2018-11-07 2020-08-11 Love Good Color LLC Systems and methods for color selection and auditing
US11144334B2 (en) 2018-12-20 2021-10-12 Red Hat, Inc. Quantum computer task manager
KR102167767B1 (en) * 2018-12-26 2020-10-19 단국대학교 산학협력단 Automatic build apparatus and method of application for generating training data set of machine learning
EP3693873B1 (en) * 2019-02-07 2022-02-16 AO Kaspersky Lab Systems and methods for configuring a gateway for protection of automated systems
WO2020167586A1 (en) * 2019-02-11 2020-08-20 Db Cybertech, Inc. Automated data discovery for cybersecurity
FR3094600B1 (en) * 2019-03-29 2022-05-06 Orange Method for extracting at least one communication pattern in a communication network
US11546366B2 (en) 2019-05-08 2023-01-03 International Business Machines Corporation Threat information sharing based on blockchain
CN111913892B (en) * 2019-05-09 2021-12-07 北京忆芯科技有限公司 Providing open channel storage devices using CMBs
US11309974B2 (en) 2019-05-09 2022-04-19 Red Hat, Inc. Quantum channel routing utilizing a quantum channel measurement service
USD926809S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926810S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926811S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926200S1 (en) 2019-06-06 2021-07-27 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926782S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
CN110187885B (en) * 2019-06-10 2023-03-31 合肥本源量子计算科技有限责任公司 Intermediate code generation method and device for quantum program compiling
CN111027623A (en) * 2019-12-10 2020-04-17 深圳供电局有限公司 Data-enhanced intelligent terminal security level classification method and system
KR102299145B1 (en) * 2020-02-25 2021-09-07 서울과학기술대학교 산학협력단 Cyber Physical System for digital forensic evidence collection
KR20210115728A (en) * 2020-03-16 2021-09-27 삼성전자주식회사 Electronic apparatus and control method thereof
CN111460129B (en) * 2020-03-27 2023-08-22 泰康保险集团股份有限公司 Method, device, electronic equipment and storage medium for generating identification
KR102164203B1 (en) * 2020-04-03 2020-10-13 주식회사 이지시큐 Information security risk analysis automation system and operation method thereof
CN111659124B (en) * 2020-05-27 2023-05-02 太原理工大学 Intelligent identification system for playing chess
WO2021243321A1 (en) * 2020-05-29 2021-12-02 Qomplx, Inc. A system and methods for score cybersecurity
CN111651756B (en) * 2020-06-04 2022-05-31 成都安恒信息技术有限公司 Automatic substitution and filling method applied to operation and maintenance audit navicat
CN112035797A (en) * 2020-08-31 2020-12-04 山东诺蓝信息科技有限公司 Power state decision algorithm based on autonomous learning
KR102233694B1 (en) * 2020-09-29 2021-03-30 주식회사 이지시큐 Information security system providing cost reduction and effective authentication management
KR102233698B1 (en) * 2020-09-29 2021-03-30 주식회사 이지시큐 method and system for setting risk level related to information protection based on confidentiality, integrity, availability
KR102233695B1 (en) * 2020-09-29 2021-03-30 주식회사 이지시큐 Information and communication system for performing information protection risk analysis
KR102232883B1 (en) * 2020-09-29 2021-03-26 주식회사 이지시큐 Artificial intelligence system for authentication of information security management system
US11606694B2 (en) 2020-10-08 2023-03-14 Surendra Goel System that provides cybersecurity in a home or office by interacting with internet of things devices and other devices
KR102280845B1 (en) 2020-11-24 2021-07-22 한국인터넷진흥원 Method and apparatus for detecting abnormal behavior in network
CA3202398A1 (en) * 2020-12-15 2022-06-23 Justine Celeste Fox Enterprise server and method with universal bypass mechanism for automatically testing real-time computer security services
CN114745291A (en) * 2020-12-23 2022-07-12 北京国双科技有限公司 Abnormal data cloud method and device, electronic equipment and storage medium
CN114765627A (en) * 2021-01-14 2022-07-19 京东科技控股股份有限公司 Data transmission method, device, storage medium and computer program product
CN112783661B (en) * 2021-02-08 2022-08-12 上海交通大学 Memory deduplication method and device suitable for container environment
US20240070276A1 (en) * 2021-02-08 2024-02-29 Hewlett-Packard Development Company, L.P. Malware scans
CN112819590B (en) * 2021-02-25 2023-03-10 紫光云技术有限公司 Method for managing product configuration information in cloud product service delivery process
CN113395593B (en) * 2021-08-17 2021-10-29 深圳佳力拓科技有限公司 Data transmission method and device for digital television terminal with reduced information leakage
CN113961518B (en) * 2021-09-08 2022-09-23 北京百度网讯科技有限公司 Log visual display method and device, electronic equipment and storage medium
WO2023097026A2 (en) * 2021-11-23 2023-06-01 Strong Force TX Portfolio 2018, LLC Transaction platforms where systems include sets of other systems
KR102509102B1 (en) * 2022-07-15 2023-03-09 신헌주 Fostering System Using Artificial Intelligence
CN115203689B (en) * 2022-07-25 2023-05-02 广州正则纬创信息科技有限公司 Data security sharing method and system
CN115987176B (en) * 2023-02-01 2023-09-12 北京东土科技股份有限公司 Method and device for carrying out zero return control on motor position and edge controller
CN116522895B (en) * 2023-06-16 2023-09-12 中国传媒大学 Text content authenticity assessment method and device based on writing style
CN117150551B (en) * 2023-09-04 2024-02-27 东方魂数字科技(北京)有限公司 User privacy protection method and system based on big data
CN117540038B (en) * 2024-01-10 2024-03-22 中国信息通信研究院 Intelligent detection false data synthesis method and system

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1245572A (en) * 1997-10-30 2000-02-23 全昌龙 Computer security device
US20020165947A1 (en) * 2000-09-25 2002-11-07 Crossbeam Systems, Inc. Network application apparatus
US9064115B2 (en) * 2006-04-06 2015-06-23 Pulse Secure, Llc Malware detection system and method for limited access mobile platforms
US7991724B2 (en) * 2006-12-21 2011-08-02 Support Machines Ltd. Method and a computer program product for providing a response to a statement of a user
US9489647B2 (en) * 2008-06-19 2016-11-08 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with self-service portal for publishing resources
US8353033B1 (en) * 2008-07-02 2013-01-08 Symantec Corporation Collecting malware samples via unauthorized download protection
JP5219783B2 (en) * 2008-12-24 2013-06-26 三菱電機株式会社 Unauthorized access detection device, unauthorized access detection program, recording medium, and unauthorized access detection method
JP5559306B2 (en) * 2009-04-24 2014-07-23 アルグレス・インコーポレイテッド Enterprise information security management software for predictive modeling using interactive graphs
WO2011014668A2 (en) * 2009-07-30 2011-02-03 Zinan Chen Independent carrier ethernet interconnection platform
US10019677B2 (en) * 2009-11-20 2018-07-10 Alert Enterprise, Inc. Active policy enforcement
US8806568B2 (en) * 2011-07-11 2014-08-12 International Business Machines Corporation Automatic generation of user account policies based on configuration management database information
US9386030B2 (en) * 2012-09-18 2016-07-05 Vencore Labs, Inc. System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
US10096316B2 (en) * 2013-11-27 2018-10-09 Sri International Sharing intents to provide virtual assistance in a multi-person dialog
EP2725728B1 (en) * 2012-10-29 2018-08-15 ADVA Optical Networking SE Method and device for assessing the performance of one or more packet synchronization services in a packet data transmission network
JP6086423B2 (en) * 2012-11-14 2017-03-01 国立研究開発法人情報通信研究機構 Unauthorized communication detection method by collating observation information of multiple sensors
RU2522019C1 (en) * 2012-12-25 2014-07-10 Закрытое акционерное общество "Лаборатория Касперского" System and method of detecting threat in code executed by virtual machine
US9406143B2 (en) * 2013-02-21 2016-08-02 Samsung Electronics Co., Ltd. Electronic device and method of operating electronic device
US9875494B2 (en) * 2013-04-16 2018-01-23 Sri International Using intents to analyze and personalize a user's dialog experience with a virtual personal assistant
KR20140136350A (en) * 2013-05-20 2014-11-28 삼성전자주식회사 Method and apparatus for using a electronic device
CN103593610B (en) * 2013-10-09 2016-08-31 中国电子科技集团公司第二十八研究所 Spyware self adaptation based on computer immunity induction and detection method
US9489514B2 (en) * 2013-10-11 2016-11-08 Verisign, Inc. Classifying malware by order of network behavior artifacts
RU2014111971A (en) * 2014-03-28 2015-10-10 Юрий Михайлович Буров METHOD AND SYSTEM OF VOICE INTERFACE
GB2524583B (en) * 2014-03-28 2017-08-09 Kaizen Reaux-Savonte Corey System, architecture and methods for an intelligent, self-aware and context-aware digital organism-based telecommunication system
US9519686B2 (en) * 2014-04-09 2016-12-13 International Business Machines Corporation Confidence ranking of answers based on temporal semantics
US9130906B1 (en) * 2014-05-23 2015-09-08 The United States Of America As Represented By The Secretary Of The Navy Method and apparatus for automated secure one-way data transmission
PL3160565T3 (en) * 2014-06-30 2022-01-10 Syqe Medical Ltd. Devices and systems for pulmonary delivery of active agents

Also Published As

Publication number Publication date
CN109313687B (en) 2022-06-24
SG11201806117TA (en) 2018-08-30
RU2018129947A (en) 2020-02-25
IL260711B2 (en) 2024-02-01
ZA201805385B (en) 2022-07-27
SG10202108336PA (en) 2021-08-30
CA3051164A1 (en) 2017-07-27
JP2019511030A (en) 2019-04-18
IL306075A (en) 2023-11-01
RU2750554C2 (en) 2021-06-29
AU2017210132A1 (en) 2018-08-23
CN115062297A (en) 2022-09-16
BR112018015014A2 (en) 2018-12-18
EP3405911A4 (en) 2019-09-18
IL260711B1 (en) 2023-10-01
IL260711A (en) 2018-09-20
AU2022202786A1 (en) 2022-05-19
WO2017127850A1 (en) 2017-07-27
AU2024202003A1 (en) 2024-04-18
EP3405911A1 (en) 2018-11-28
MX2018009079A (en) 2022-12-15
KR20180105688A (en) 2018-09-28
RU2018129947A3 (en) 2020-07-08
JP2022141966A (en) 2022-09-29
CN109313687A (en) 2019-02-05

Similar Documents

Publication Publication Date Title
MY195524A (en) Computer Security Based on Artificial Intelligence
MX2019013495A (en) System and method for biometric identification.
PH12019502084A1 (en) Time-series data processing device, time-series data processing system, and time-series data processing method
GB2561759A (en) Secure deployment of an application across deployment locations
CA154567S (en) Case for a smart phone
EP2977899A3 (en) Integrating execution of computing analytics within a mapreduce processing environment
USD863907S1 (en) Insert for finger ring of shears
MX2021009911A (en) Multicamera image processing.
MX2019013229A (en) Systems and methods for visualizing clinical trial site performance.
GB2549037A (en) Using augmented reality to collect,process and share information
WO2018091974A3 (en) System and methods to prevent unauthorized usage of card readers
CY1121890T1 (en) SECURE TRANSMISSION
AR098974A1 (en) METHODS AND APPLIANCE TO EVALUATE CONDITIONS IN THE WELL FUND THROUGH RFID DETECTION
MX2020010798A (en) Self-powered semi-active electronic tag with autonomous processing capability and its communication procedure.
GB2559621A8 (en) Wearable device, system and method
WO2019010277A3 (en) Highly atomized segmented and interrogatable data systems (hasids)
GB2566855A (en) Relating collections in an item universe
GB201815141D0 (en) Arithmetic logic unit, data processing system, method and module
Camisassa et al. Evolución de enanas blancas masivas
Alonso CUTE: Correlation Utilities and Two-point Estimation
Pimentel de Figueiredo et al. On the Advantages of Multiple Stereo Vision Camera Designs for Autonomous Drone Navigation
GB2557483A (en) Method for N-Dimensional detection of spatial, temporal and gravimetric attributes and associated variation in plots, digital objects and photographs
Amine Lkabous et al. A unified approach to ruin probabilities with delays for spectrally negative Lévy processes
GB201815138D0 (en) Arithmetic logic unit. data processing system, method and module
Tian et al. Adjacent Vertex Distinguishing Distance Coloring of Grids