SG11201906575QA - Continuous learning for intrusion detection - Google Patents
Continuous learning for intrusion detectionInfo
- Publication number
- SG11201906575QA SG11201906575QA SG11201906575QA SG11201906575QA SG11201906575QA SG 11201906575Q A SG11201906575Q A SG 11201906575QA SG 11201906575Q A SG11201906575Q A SG 11201906575QA SG 11201906575Q A SG11201906575Q A SG 11201906575QA SG 11201906575Q A SG11201906575Q A SG 11201906575QA
- Authority
- SG
- Singapore
- Prior art keywords
- microsoft
- international
- data
- llc
- models
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/01—Probabilistic graphical models, e.g. probabilistic networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Algebra (AREA)
- Mathematical Optimization (AREA)
- Artificial Intelligence (AREA)
- Computational Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Mathematical Analysis (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Peptides Or Proteins (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Small-Scale Networks (AREA)
Abstract
SecuritySignals Production Model 120 Rolling Window 130 Automated Attacker 140 Benign Signal Balancer 150 Training Data Bootstrapper 160 100 Attack Signal Balancer 155 Historic Signals 135 Detection Results 125 O 71' 00 (12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property Organization International Bureau (43) International Publication Date 02 August 2018 (02.08.2018) WIP0 I PCT IiiimmoinionotiolomolomonnomomovoimIE (10) International Publication Number WO 2018/140335 Al (51) International Patent Classification: GOOF 21/55 (2013.01) H04L 29/06 (2006.01) (21) International Application Number: PCT/US2018/014606 (22) International Filing Date: 22 January 2018 (22.01.2018) (25) Filing Language: English (26) Publication Language: English (30) Priority Data: 15/419,933 30 January 2017 (30.01.2017) US (71) Applicant: MICROSOFT TECHNOLOGY LI- CENSING, LLC [US/US]; One Microsoft Way, Redmond, Washington 98052-6399 (US). (72) Inventors: LUO, Pengcheng; MICROSOFT TECHNOL- OGY LICENSING, LLC, One Microsoft Way, Redmond, Washington 98052-6399 (US). BRIGGS, Reeves Hoppe; MICROSOFT TECHNOLOGY LICENSING, LLC, One Microsoft Way, Redmond, Washington 98052-6399 (US). AHMAD, Naveed; MICROSOFT TECHNOLOGY LI- CENSING, LLC, One Microsoft Way, Redmond, Washing- ton 98052-6399 (US). (74) Agent: MINHAS, Sandip S. et al.; MICROSOFT TECH- NOLOGY LICENSING, LLC, One Microsoft Way, Red- mond, Washington 98052-6399 (US). (81) Designated States (unless otherwise indicated, for every kind of national protection available): AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JO, JP, KE, KG, KH, KN, KP, (54) Title: CONTINUOUS LEARNING FOR INTRUSION DETECTION FIG. 1A (57) : Balancing the observed signals used to train network intrusion detection models allows for a more accurate allocation of computing resources to defend the network from malicious parties. The models are trained against live data defined within a rolling window and historic data to detect user-defined features in the data. Automated attacks ensure that various kinds of attacks are always present in the rolling training window. The set of models are constantly trained to determine which model to place into production, to alert analysts of intrusions, and/or to automatically deploy countermeasures. The models are continually updated as the features are redefined and as the data in the rolling window changes, and the content of the rolling window is balanced to provide sufficient data of each observed type by which to train the models. When balancing the dataset, low-population signals are overlaid onto high-population signals to balance their relative numbers. [Continued on next page] WO 2018/140335 Al MIDEDIMOMMIONER13010MOIMIHOMMOVOIMIE KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW. (84) Designated States (unless otherwise indicated, for every kind of regional protection available): ARIPO (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU, TJ, TM), European (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR), OAPI (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG). Declarations under Rule 4.17: as to applicant's entitlement to apply for and be granted a patent (Rule 4.17(ii)) as to the applicant's entitlement to claim the priority of the earlier application (Rule 4.17(iii)) Published: — with international search report (Art. 21(3))
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/419,933 US10397258B2 (en) | 2017-01-30 | 2017-01-30 | Continuous learning for intrusion detection |
PCT/US2018/014606 WO2018140335A1 (en) | 2017-01-30 | 2018-01-22 | Continuous learning for intrusion detection |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201906575QA true SG11201906575QA (en) | 2019-08-27 |
Family
ID=61163821
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201906575QA SG11201906575QA (en) | 2017-01-30 | 2018-01-22 | Continuous learning for intrusion detection |
Country Status (17)
Country | Link |
---|---|
US (2) | US10397258B2 (en) |
EP (1) | EP3574430B1 (en) |
JP (1) | JP7086972B2 (en) |
KR (1) | KR102480204B1 (en) |
CN (1) | CN110249331A (en) |
AU (1) | AU2018212470B2 (en) |
BR (1) | BR112019013603A2 (en) |
CA (1) | CA3049265C (en) |
CL (1) | CL2019002045A1 (en) |
CO (1) | CO2019007878A2 (en) |
IL (1) | IL268052B (en) |
MX (1) | MX2019008799A (en) |
PH (1) | PH12019550118A1 (en) |
RU (1) | RU2758041C2 (en) |
SG (1) | SG11201906575QA (en) |
WO (1) | WO2018140335A1 (en) |
ZA (1) | ZA201903697B (en) |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790292A (en) * | 2017-03-13 | 2017-05-31 | 摩贝(上海)生物科技有限公司 | The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis |
US10186124B1 (en) | 2017-10-26 | 2019-01-22 | Scott Charles Mullins | Behavioral intrusion detection system |
US10673895B2 (en) | 2017-12-01 | 2020-06-02 | KnowBe4, Inc. | Systems and methods for AIDA based grouping |
US20190279043A1 (en) * | 2018-03-06 | 2019-09-12 | Tazi AI Systems, Inc. | Online machine learning system that continuously learns from data and human input |
US10733287B2 (en) * | 2018-05-14 | 2020-08-04 | International Business Machines Corporation | Resiliency of machine learning models |
US11372893B2 (en) | 2018-06-01 | 2022-06-28 | Ntt Security Holdings Corporation | Ensemble-based data curation pipeline for efficient label propagation |
US11132445B2 (en) * | 2018-06-04 | 2021-09-28 | Hal A Aldridge | Combined analytical tools for electronic warfare and cybersecurity testing in embedded systems |
US10749890B1 (en) | 2018-06-19 | 2020-08-18 | Architecture Technology Corporation | Systems and methods for improving the ranking and prioritization of attack-related events |
US10817604B1 (en) | 2018-06-19 | 2020-10-27 | Architecture Technology Corporation | Systems and methods for processing source codes to detect non-malicious faults |
US11227047B1 (en) * | 2018-06-29 | 2022-01-18 | Fireeye Security Holdings Us Llc | System and method for improved end-to-end cybersecurity machine learning and deployment |
US11356440B2 (en) * | 2018-11-30 | 2022-06-07 | International Business Machines Corporation | Automated IoT device registration |
US11237713B2 (en) * | 2019-01-21 | 2022-02-01 | International Business Machines Corporation | Graphical user interface based feature extraction application for machine learning and cognitive models |
US11429713B1 (en) * | 2019-01-24 | 2022-08-30 | Architecture Technology Corporation | Artificial intelligence modeling for cyber-attack simulation protocols |
US11128654B1 (en) | 2019-02-04 | 2021-09-21 | Architecture Technology Corporation | Systems and methods for unified hierarchical cybersecurity |
SG10201901110RA (en) * | 2019-02-08 | 2020-09-29 | Accenture Global Solutions Ltd | Method and system for detecting and preventing malware execution in a target system |
US11252185B2 (en) | 2019-03-28 | 2022-02-15 | NTT Security Corporation | Graph stream mining pipeline for efficient subgraph detection |
US11875252B2 (en) | 2019-05-17 | 2024-01-16 | Robert Bosch Gmbh | Neural network including a neural network projection layer configured for a summing parameter |
US11403405B1 (en) | 2019-06-27 | 2022-08-02 | Architecture Technology Corporation | Portable vulnerability identification tool for embedded non-IP devices |
US11954602B1 (en) * | 2019-07-10 | 2024-04-09 | Optum, Inc. | Hybrid-input predictive data analysis |
US11303653B2 (en) | 2019-08-12 | 2022-04-12 | Bank Of America Corporation | Network threat detection and information security using machine learning |
CN110837644B (en) * | 2019-10-15 | 2021-07-30 | 深圳开源互联网安全技术有限公司 | System penetration testing method and device and terminal equipment |
US11444974B1 (en) | 2019-10-23 | 2022-09-13 | Architecture Technology Corporation | Systems and methods for cyber-physical threat modeling |
CN110969186B (en) * | 2019-10-28 | 2023-04-07 | 浙江工业大学 | Channel detection-based attack-resisting defense method and device facing wireless signal identification |
US11750634B1 (en) * | 2019-12-12 | 2023-09-05 | Amazon Technologies, Inc. | Threat detection model development for network-based systems |
US11503075B1 (en) | 2020-01-14 | 2022-11-15 | Architecture Technology Corporation | Systems and methods for continuous compliance of nodes |
US11323473B2 (en) | 2020-01-31 | 2022-05-03 | Bank Of America Corporation | Network threat prevention and information security using machine learning |
CN111478913B (en) * | 2020-04-13 | 2022-01-21 | 广东电网有限责任公司东莞供电局 | Network intrusion detection method, device and storage medium for power distribution and utilization communication network |
CN112052245B (en) * | 2020-09-11 | 2022-10-21 | 中国人民解放军战略支援部队信息工程大学 | Method and device for judging attack behavior in network security training |
US11514173B2 (en) | 2020-12-02 | 2022-11-29 | International Business Machines Corporation | Predicting software security exploits by monitoring software events |
KR102229613B1 (en) * | 2021-01-11 | 2021-03-18 | 펜타시큐리티시스템 주식회사 | Method and apparatus for web firewall maintenance based on non-face-to-face authentication using maching learning self-check function |
US11740618B2 (en) | 2021-04-23 | 2023-08-29 | General Electric Company | Systems and methods for global cyber-attack or fault detection model |
US11483322B1 (en) * | 2021-09-30 | 2022-10-25 | Atlassian Pty Ltd | Proactive suspicious activity monitoring for a software application framework |
CN114615052A (en) * | 2022-03-10 | 2022-06-10 | 南京理工大学 | Intrusion detection method and system based on knowledge compilation |
EP4329243A1 (en) * | 2022-08-25 | 2024-02-28 | DGC Switzerland AG | Computer implemented method for automated securing of a computer system |
CN116886448B (en) * | 2023-09-07 | 2023-12-01 | 卓望数码技术(深圳)有限公司 | DDoS attack alarm studying and judging method and device based on semi-supervised learning |
Family Cites Families (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CZ2002582A3 (en) | 1999-08-30 | 2002-07-17 | Nagracard S. A. | Method for multiple-stage encryption |
US6769066B1 (en) * | 1999-10-25 | 2004-07-27 | Visa International Service Association | Method and apparatus for training a neural network model for use in computer network intrusion detection |
US7072876B1 (en) * | 2000-09-19 | 2006-07-04 | Cigital | System and method for mining execution traces with finite automata |
US6944616B2 (en) * | 2001-11-28 | 2005-09-13 | Pavilion Technologies, Inc. | System and method for historical database training of support vector machines |
US9306966B2 (en) * | 2001-12-14 | 2016-04-05 | The Trustees Of Columbia University In The City Of New York | Methods of unsupervised anomaly detection using a geometric framework |
US7225343B1 (en) | 2002-01-25 | 2007-05-29 | The Trustees Of Columbia University In The City Of New York | System and methods for adaptive model generation for detecting intrusions in computer systems |
US20030188189A1 (en) | 2002-03-27 | 2003-10-02 | Desai Anish P. | Multi-level and multi-platform intrusion detection and response system |
US7454499B2 (en) | 2002-11-07 | 2008-11-18 | Tippingpoint Technologies, Inc. | Active network defense system and method |
FR2847360B1 (en) | 2002-11-14 | 2005-02-04 | Eads Defence & Security Ntwk | METHOD AND DEVICE FOR ANALYZING THE SECURITY OF AN INFORMATION SYSTEM |
JP2004312083A (en) * | 2003-04-02 | 2004-11-04 | Kddi Corp | Learning data generating apparatus, intrusion detection system, and its program |
US8528086B1 (en) * | 2004-04-01 | 2013-09-03 | Fireeye, Inc. | System and method of detecting computer worms |
US7610375B2 (en) | 2004-10-28 | 2009-10-27 | Cisco Technology, Inc. | Intrusion detection in a data center environment |
US7725735B2 (en) * | 2005-03-29 | 2010-05-25 | International Business Machines Corporation | Source code management method for malicious code detection |
US7690037B1 (en) | 2005-07-13 | 2010-03-30 | Symantec Corporation | Filtering training data for machine learning |
US8789172B2 (en) * | 2006-09-18 | 2014-07-22 | The Trustees Of Columbia University In The City Of New York | Methods, media, and systems for detecting attack on a digital processing device |
US20080083029A1 (en) * | 2006-09-29 | 2008-04-03 | Alcatel | Intelligence Network Anomaly Detection Using A Type II Fuzzy Neural Network |
US7941382B2 (en) | 2007-10-12 | 2011-05-10 | Microsoft Corporation | Method of classifying and active learning that ranks entries based on multiple scores, presents entries to human analysts, and detects and/or prevents malicious behavior |
US8719936B2 (en) | 2008-02-01 | 2014-05-06 | Northeastern University | VMM-based intrusion detection system |
IL191744A0 (en) * | 2008-05-27 | 2009-02-11 | Yuval Elovici | Unknown malcode detection using classifiers with optimal training sets |
US8635171B1 (en) | 2009-08-17 | 2014-01-21 | Symantec Corporation | Systems and methods for reducing false positives produced by heuristics |
US8521667B2 (en) * | 2010-12-15 | 2013-08-27 | Microsoft Corporation | Detection and categorization of malicious URLs |
US8762298B1 (en) | 2011-01-05 | 2014-06-24 | Narus, Inc. | Machine learning based botnet detection using real-time connectivity graph based traffic features |
CN102158486A (en) * | 2011-04-02 | 2011-08-17 | 华北电力大学 | Method for rapidly detecting network invasion |
RU2523114C2 (en) * | 2012-04-06 | 2014-07-20 | Закрытое акционерное общество "Лаборатория Касперского" | Method of analysing malicious activity on internet, detecting malicious network nodes and neighbouring intermediate nodes |
US9197653B2 (en) | 2012-06-05 | 2015-11-24 | Empire Technology Development Llc | Cross-user correlation for detecting server-side multi-target intrusion |
KR101868893B1 (en) * | 2012-07-09 | 2018-06-19 | 한국전자통신연구원 | Method and apparatus for visualizing network security state |
US9386030B2 (en) * | 2012-09-18 | 2016-07-05 | Vencore Labs, Inc. | System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks |
US8955138B1 (en) * | 2013-07-11 | 2015-02-10 | Symantec Corporation | Systems and methods for reevaluating apparently benign behavior on computing devices |
US9306962B1 (en) * | 2013-07-25 | 2016-04-05 | Niddel Corp | Systems and methods for classifying malicious network events |
US9497204B2 (en) * | 2013-08-30 | 2016-11-15 | Ut-Battelle, Llc | In-situ trainable intrusion detection system |
US9485263B2 (en) | 2014-07-16 | 2016-11-01 | Microsoft Technology Licensing, Llc | Volatility-based classifier for security solutions |
US11122058B2 (en) | 2014-07-23 | 2021-09-14 | Seclytics, Inc. | System and method for the automated detection and prediction of online threats |
US9591006B2 (en) | 2014-09-18 | 2017-03-07 | Microsoft Technology Licensing, Llc | Lateral movement detection |
US9985984B1 (en) * | 2014-10-27 | 2018-05-29 | National Technology & Engineering Solutions Of Sandia, Llc | Dynamic defense and network randomization for computer systems |
US9043894B1 (en) | 2014-11-06 | 2015-05-26 | Palantir Technologies Inc. | Malicious software detection in a computing system |
US20160308725A1 (en) | 2015-04-16 | 2016-10-20 | Nec Laboratories America, Inc. | Integrated Community And Role Discovery In Enterprise Networks |
US9723016B2 (en) | 2015-05-14 | 2017-08-01 | International Business Machines Corporation | Detecting web exploit kits by tree-based structural similarity search |
US9959407B1 (en) * | 2016-03-15 | 2018-05-01 | Symantec Corporation | Systems and methods for identifying potentially malicious singleton files |
US20170372224A1 (en) * | 2016-06-28 | 2017-12-28 | General Electric Company | Deep learning for imputation of industrial multivariate time-series |
CN106357618B (en) * | 2016-08-26 | 2020-10-16 | 北京奇虎科技有限公司 | Web anomaly detection method and device |
-
2017
- 2017-01-30 US US15/419,933 patent/US10397258B2/en active Active
-
2018
- 2018-01-22 EP EP18703428.5A patent/EP3574430B1/en active Active
- 2018-01-22 BR BR112019013603-7A patent/BR112019013603A2/en unknown
- 2018-01-22 CA CA3049265A patent/CA3049265C/en active Active
- 2018-01-22 AU AU2018212470A patent/AU2018212470B2/en active Active
- 2018-01-22 MX MX2019008799A patent/MX2019008799A/en unknown
- 2018-01-22 CN CN201880008704.XA patent/CN110249331A/en active Pending
- 2018-01-22 JP JP2019541304A patent/JP7086972B2/en active Active
- 2018-01-22 KR KR1020197022466A patent/KR102480204B1/en active IP Right Grant
- 2018-01-22 SG SG11201906575QA patent/SG11201906575QA/en unknown
- 2018-01-22 WO PCT/US2018/014606 patent/WO2018140335A1/en unknown
- 2018-01-22 RU RU2019126640A patent/RU2758041C2/en active
-
2019
- 2019-06-10 ZA ZA2019/03697A patent/ZA201903697B/en unknown
- 2019-06-28 PH PH12019550118A patent/PH12019550118A1/en unknown
- 2019-07-14 IL IL268052A patent/IL268052B/en unknown
- 2019-07-17 US US16/514,729 patent/US11689549B2/en active Active
- 2019-07-22 CO CONC2019/0007878A patent/CO2019007878A2/en unknown
- 2019-07-22 CL CL2019002045A patent/CL2019002045A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
JP2020505707A (en) | 2020-02-20 |
ZA201903697B (en) | 2020-10-28 |
US10397258B2 (en) | 2019-08-27 |
CA3049265A1 (en) | 2018-08-02 |
US11689549B2 (en) | 2023-06-27 |
KR20190109427A (en) | 2019-09-25 |
AU2018212470A1 (en) | 2019-07-04 |
EP3574430A1 (en) | 2019-12-04 |
RU2019126640A3 (en) | 2021-05-04 |
CL2019002045A1 (en) | 2019-12-13 |
MX2019008799A (en) | 2019-09-11 |
CN110249331A (en) | 2019-09-17 |
AU2018212470B2 (en) | 2022-01-20 |
JP7086972B2 (en) | 2022-06-20 |
EP3574430B1 (en) | 2021-02-24 |
US20180219887A1 (en) | 2018-08-02 |
IL268052A (en) | 2019-09-26 |
BR112019013603A2 (en) | 2020-01-07 |
IL268052B (en) | 2022-03-01 |
WO2018140335A1 (en) | 2018-08-02 |
PH12019550118A1 (en) | 2019-12-02 |
US20190342319A1 (en) | 2019-11-07 |
KR102480204B1 (en) | 2022-12-21 |
RU2019126640A (en) | 2021-03-01 |
CA3049265C (en) | 2024-06-04 |
NZ754552A (en) | 2023-10-27 |
CO2019007878A2 (en) | 2019-07-31 |
RU2758041C2 (en) | 2021-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201906575QA (en) | Continuous learning for intrusion detection | |
SG11201907140UA (en) | Multi-signal analysis for compromised scope identification | |
SG11201805986TA (en) | Automated honeypot provisioning system | |
SG11201804190YA (en) | Method and system for blockchain variant using digital signatures | |
SG11201710238QA (en) | Autonomic incident triage prioritization by performance modifier and temporal decay parameters | |
SG11201902981RA (en) | Iot provisioning service | |
SG11201907912YA (en) | An appliance operation signal processing system and method | |
SG11201811740WA (en) | Systems and methods for identifying risky driving behavior | |
SG11201900116RA (en) | Communication flow for verification and identification check | |
SG11201903141QA (en) | Business processing method and apparatus | |
SG11201811343SA (en) | System and methods for detecting online fraud | |
SG11201804327TA (en) | Dual memory introspection for securing multiple network endpoints | |
SG11201710236RA (en) | Quantitative unified analytic neural networks | |
SG11201807002TA (en) | Intention signaling for an autonomous vehicle | |
SG11201901577SA (en) | Method and system for fast tracking navigation of blockchains via data manipulation | |
SG11201809963XA (en) | Application framework using blockchain-based asset ownership | |
SG11201806650VA (en) | Systems and methods for providing a personal distributed ledger | |
SG11201905463TA (en) | Abstract enclave identity | |
SG11201905460SA (en) | Data unsealing with a sealing enclave | |
SG11201906151QA (en) | System for free-space optical communication and lidar | |
SG11201810295UA (en) | Hardware-based virtualized security isolation | |
SG11201806541RA (en) | Image classification and labeling | |
SG11201907125XA (en) | Dynamic execution of parameterized applications for the processing of keyed network data streams | |
SG11201908288XA (en) | Configurable annotations for privacy-sensitive user content | |
SG11201806653SA (en) | Systems and methods for providing identity scores |