USD926809S1 - Display screen or portion thereof with a graphical user interface - Google Patents

Display screen or portion thereof with a graphical user interface Download PDF

Info

Publication number
USD926809S1
USD926809S1 US29/693,794 US201929693794F USD926809S US D926809 S1 USD926809 S1 US D926809S1 US 201929693794 F US201929693794 F US 201929693794F US D926809 S USD926809 S US D926809S
Authority
US
United States
Prior art keywords
user interface
display screen
graphical user
ornamental design
graphical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US29/693,794
Inventor
Brian P. Murphy
Joe Partlow
Colin O'CONNOR
Jason Pfeiffer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Reliaquest Holdings LLC
Original Assignee
Reliaquest Holdings LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Reliaquest Holdings LLC filed Critical Reliaquest Holdings LLC
Priority to US29/693,794 priority Critical patent/USD926809S1/en
Assigned to RELIAQUEST HOLDINGS, LLC reassignment RELIAQUEST HOLDINGS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PARTLOW, Joe, PFEIFFER, Jason, O'Connor, Colin, MURPHY, BRIAN P.
Assigned to SIXTH STREET SPECIALTY LENDING, INC., AS COLLATERAL AGENT reassignment SIXTH STREET SPECIALTY LENDING, INC., AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RELIAQUEST HOLDINGS, LLC
Application granted granted Critical
Publication of USD926809S1 publication Critical patent/USD926809S1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Description

The FIGURE is a front view of a display screen or portion thereof with a graphical user interface showing the claimed design.
The broken lines are included for the purpose of illustrating portions of the display screen or portion thereof with a graphical user interface that form no part of the claimed design.

Claims (1)

    CLAIM
  1. The ornamental design for a display screen or portion thereof with a graphical user interface, as shown and described.
US29/693,794 2019-06-05 2019-06-05 Display screen or portion thereof with a graphical user interface Active USD926809S1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US29/693,794 USD926809S1 (en) 2019-06-05 2019-06-05 Display screen or portion thereof with a graphical user interface

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US29/693,794 USD926809S1 (en) 2019-06-05 2019-06-05 Display screen or portion thereof with a graphical user interface

Publications (1)

Publication Number Publication Date
USD926809S1 true USD926809S1 (en) 2021-08-03

Family

ID=77040384

Family Applications (1)

Application Number Title Priority Date Filing Date
US29/693,794 Active USD926809S1 (en) 2019-06-05 2019-06-05 Display screen or portion thereof with a graphical user interface

Country Status (1)

Country Link
US (1) USD926809S1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USD936697S1 (en) * 2017-09-21 2021-11-23 Yuri Hosokuni Display screen with a graphical interface for an electronic game
USD940741S1 (en) * 2018-04-09 2022-01-11 Covestro Llc Display screen portion with graphical user interface
USD943000S1 (en) * 2020-05-20 2022-02-08 Frank Gunnar Vogelbruch Display screen or portion thereof with graphical user interface
USD947890S1 (en) * 2020-05-13 2022-04-05 Aixis, Inc. Graphical user interface for a display screen or portion thereof
USD969819S1 (en) * 2019-09-17 2022-11-15 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD1003928S1 (en) * 2021-04-29 2023-11-07 Coretech System Co., Ltd. Display screen or portion thereof with graphical user interface

Citations (307)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USD418495S (en) 1997-11-05 2000-01-04 The United States Of America As Represented By The Secretary Of The Army Computer/generated image for a computer monitor
US6381556B1 (en) 1999-08-02 2002-04-30 Ciena Corporation Data analyzer system and method for manufacturing control environment
US20020087882A1 (en) 2000-03-16 2002-07-04 Bruce Schneier Mehtod and system for dynamic network intrusion monitoring detection and response
US6530024B1 (en) 1998-11-20 2003-03-04 Centrax Corporation Adaptive feedback security system and method
US20040010697A1 (en) 2002-03-13 2004-01-15 Conor White Biometric authentication system and method
US20040193598A1 (en) * 2000-06-30 2004-09-30 Masataka Kan Method and system for display data in a database system
US20040193912A1 (en) 2003-03-31 2004-09-30 Intel Corporation Methods and systems for managing security policies
US20050055330A1 (en) 2001-05-15 2005-03-10 Britton Colin P. Surveillance, monitoring and real-time events platform
US20050125694A1 (en) 2003-12-05 2005-06-09 Fakes Thomas F. Security policy update supporting at least one security service provider
US20050165631A1 (en) 2004-01-28 2005-07-28 Microsoft Corporation Time management representations and automation for allocating time to projects and meetings within an online calendaring system
US20050235206A1 (en) 2004-04-15 2005-10-20 Udo Arend User interface for a quick activity window
US20060095967A1 (en) 2004-10-29 2006-05-04 David Durham Platform-based identification of host software circumvention
US20060123022A1 (en) 2003-03-12 2006-06-08 Intotality Pty Ltd, Australia Automated application discovery and analysis system and method
US7152240B1 (en) 2000-07-25 2006-12-19 Green Stuart D Method for communication security and apparatus therefor
US20070143827A1 (en) 2005-12-21 2007-06-21 Fiberlink Methods and systems for intelligently controlling access to computing resources
US20070180509A1 (en) 2005-12-07 2007-08-02 Swartz Alon R Practical platform for high risk applications
US20070199070A1 (en) 2006-02-17 2007-08-23 Hughes William A Systems and methods for intelligent monitoring and response to network threats
USD552121S1 (en) 2006-07-20 2007-10-02 Xerion Avionix, Llc Computer-generated icon for a portion of an engine instrument display
US20070245238A1 (en) 2006-03-22 2007-10-18 Fugitt Jesse A Timeline visualizations linked with other visualizations of data in a thin client
US7487544B2 (en) 2001-07-30 2009-02-03 The Trustees Of Columbia University In The City Of New York System and methods for detection of new malicious executables
US20090077666A1 (en) 2007-03-12 2009-03-19 University Of Southern California Value-Adaptive Security Threat Modeling and Vulnerability Ranking
US20090089701A1 (en) 2007-09-27 2009-04-02 Rockwell Automation Technologies, Inc. Distance-wise presentation of industrial automation data as a function of relevance to user
US20090178139A1 (en) 2008-01-09 2009-07-09 Global Dataguard, Inc. Systems and Methods of Network Security and Threat Management
US20090208910A1 (en) 2008-02-19 2009-08-20 Architecture Technology Corporation Automated execution and evaluation of network-based training exercises
US20090220929A1 (en) 2006-03-17 2009-09-03 Daniel Warren C Pc-based simulator training system and methods
US20090320137A1 (en) 2008-06-18 2009-12-24 Eads Na Defense Security And Systems Solutions Inc. Systems and methods for a simulated network attack generator
US20090328219A1 (en) 2008-06-27 2009-12-31 Juniper Networks, Inc. Dynamic policy provisioning within network security devices
US20100067390A1 (en) 2008-05-21 2010-03-18 Luis Filipe Pereira Valente System and method for discovery of network entities
US20100077078A1 (en) 2007-06-22 2010-03-25 Fortisphere, Inc. Network traffic analysis using a dynamically updating ontological network description
US20100156630A1 (en) 2008-12-18 2010-06-24 Robert Ainsbury Contextual Risk Indicators in Connection with Threat Level Management
US20100169948A1 (en) 2008-12-31 2010-07-01 Hytrust, Inc. Intelligent security control system for virtualized ecosystems
US20100205136A1 (en) 2009-02-09 2010-08-12 Southwest Research Institute System and Method for Modeling and Predicting Security Threats
US7818797B1 (en) 2001-10-11 2010-10-19 The Trustees Of Columbia University In The City Of New York Methods for cost-sensitive modeling for intrusion detection and response
US20110029450A1 (en) 2009-07-31 2011-02-03 Accenture Global Services Gmbh Computer-implemented method, system, and computer program product for connecting contract management and claim management
USD636779S1 (en) 2009-10-07 2011-04-26 Dfs Services Llc Graphical user interface for a spending analysis tool for a computer display
US20110288692A1 (en) 2010-05-20 2011-11-24 Accenture Global Services Gmbh Malicious attack detection and analysis
US20110289308A1 (en) 2010-05-18 2011-11-24 Sobko Andrey V Team security for portable information devices
US20110320307A1 (en) 2010-06-18 2011-12-29 Google Inc. Context-influenced application recommendations
US20120072968A1 (en) 2007-02-16 2012-03-22 Wysopal Christopher J Assessment and analysis of software security flaws in virtual machines
US8146146B1 (en) 2005-12-23 2012-03-27 At&T Intellectual Property Ii, L.P. Method and apparatus for integrated network security alert information retrieval
US20120079433A1 (en) * 2010-09-28 2012-03-29 J-MEX, Inc. Device and system and method for interacting with target in operation area
US20120079596A1 (en) 2010-08-26 2012-03-29 Verisign, Inc. Method and system for automatic detection and analysis of malware
US20120083706A1 (en) * 2009-02-26 2012-04-05 Draeger Medical Systems, Inc. Ecg data display method for rapid detection of myocardial ischemia
US8191147B1 (en) 2008-04-24 2012-05-29 Symantec Corporation Method for malware removal based on network signatures and file system artifacts
US20120154169A1 (en) 2010-12-15 2012-06-21 Edo Vincent Hoekstra Toilet management systems, methods, and techniques
USD665412S1 (en) 2011-03-09 2012-08-14 Microsoft Corporation Display screen with graphical user interface
US8253747B2 (en) * 2004-04-16 2012-08-28 Apple Inc. User interface for controlling animation of an object
US20120240233A1 (en) 2011-03-17 2012-09-20 Skunk Worx B.V. Method and system for detecting malicious web content
US8291500B1 (en) 2012-03-29 2012-10-16 Cyber Engineering Services, Inc. Systems and methods for automated malware artifact retrieval and analysis
US20130014264A1 (en) 2005-01-27 2013-01-10 Scott Cruickshanks Kennedy Systems and Methods For Implementing and Scoring Computer Network Defense Exercises
USD674404S1 (en) 2011-10-26 2013-01-15 Mcafee, Inc. Computer having graphical user interface
US20130031555A1 (en) 2011-07-26 2013-01-31 Salesforce.Com, Inc. System, method and computer program product for conditionally executing related reports in parallel based on an estimated execution time
US20130081141A1 (en) 2010-05-25 2013-03-28 Hewlett-Packard Development Company, L.P. Security threat detection associated with security events and an actor category model
USD681662S1 (en) 2012-01-05 2013-05-07 Flextronics Ap, Llc Display panel with graphical user interface for analyzing and presenting supply, fabrication, and logistics data
US20130117847A1 (en) 2011-11-07 2013-05-09 William G. Friedman Streaming Method and System for Processing Network Metadata
USD685391S1 (en) * 2011-06-27 2013-07-02 Specialty Minerals (Michigan) Inc. Graphical user interface for a display screen or a portion thereof for evaluating refractory data
USD685813S1 (en) 2011-05-19 2013-07-09 Nxn Tech, Llc Display screen with a results graphical user interface
US20130179938A1 (en) 2012-01-09 2013-07-11 International Business Machines Corporation Security policy management using incident analysis
US8490149B1 (en) 2008-08-20 2013-07-16 Juniper Networks, Inc. Secure session handling in a device after a policy update
US8539385B2 (en) * 2010-01-26 2013-09-17 Apple Inc. Device, method, and graphical user interface for precise positioning of objects
US8549626B1 (en) 2009-03-20 2013-10-01 Symantec Corporation Method and apparatus for securing a computer from malicious threats through generic remediation
US20130275770A1 (en) 2011-12-22 2013-10-17 Michael Berger Always-available embedded theft reaction subsystem
US20130291087A1 (en) 2012-04-30 2013-10-31 Zscaler, Inc. Systems and methods for integrating cloud services with information management systems
US20140007264A1 (en) 2011-12-22 2014-01-02 Michael Berger Always-available embedded theft reaction subsystem
USD697080S1 (en) * 2010-02-26 2014-01-07 Draeger Medical Systems, Inc. Display screen with an icon
US20140009289A1 (en) 2011-12-22 2014-01-09 Michael Berger Always-available embedded theft reaction subsystem
US20140013455A1 (en) 2011-12-22 2014-01-09 Michael Berger Always-available embedded theft reaction subsystem
US20140013454A1 (en) 2011-12-22 2014-01-09 Michael Berger Always-available embedded theft reaction subsystem
US20140020121A1 (en) 2011-12-22 2014-01-16 Michael Berger Always-available embedded theft reaction subsystem
US20140020122A1 (en) 2011-12-22 2014-01-16 Michael Berger Always-available embedded theft reaction subsystem
US20140020123A1 (en) 2011-12-22 2014-01-16 Michael Berger Always-available embedded theft reaction subsystem
US20140046709A1 (en) 2012-08-08 2014-02-13 Mark Clement Kwapiszeski Methods and systems for evaluating technology assets
US20140053273A1 (en) 2012-08-18 2014-02-20 Lume Systems, Inc. System and method for limiting exploitable or potentially exploitable sub-components in software components
US20140096181A1 (en) 2012-09-28 2014-04-03 Tripwire, Inc. Event integration frameworks
US20140156711A1 (en) 2011-08-01 2014-06-05 Dhiraj Sharan Asset model import connector
US20140172706A1 (en) 2012-12-18 2014-06-19 Michael Condry Security broker
US20140189870A1 (en) 2011-09-08 2014-07-03 Anurag Singla Visual component and drill down mapping
US20140195502A1 (en) 2011-08-26 2014-07-10 Wei Huang Multidimension column-based partitioning and storage
US20140201836A1 (en) 2012-08-23 2014-07-17 David B. Amsler Automated Internet Threat Detection and Mitigation System and Associated Methods
US20140208447A1 (en) 2011-12-22 2014-07-24 Michael Berger Always-available embedded theft reaction subsystem
US20140223555A1 (en) 2011-02-10 2014-08-07 Telefonica, S.A. Method and system for improving security threats detection in communication networks
US20140240122A1 (en) 2014-02-27 2014-08-28 Fitbit, Inc. Notifications on a User Device Based on Activity Detected By an Activity Monitoring Device
US8832148B2 (en) 2010-06-29 2014-09-09 International Business Machines Corporation Enterprise evidence repository
US20140280075A1 (en) 2011-08-26 2014-09-18 Hewlett-Packard Development Company, L.P. Multidimension clusters for data partitioning
US20140297495A1 (en) 2010-03-18 2014-10-02 Pankaj B. Dalal Multidimensional risk analysis
USD716328S1 (en) 2012-07-20 2014-10-28 Desire2Learn Incorporated Display screen with graphical user interface
US20140330816A1 (en) 2011-11-18 2014-11-06 Debabrata Dash Query summary generation using row-column data storage
USD717328S1 (en) 2013-03-05 2014-11-11 Xian Qian Lin Display screen or portion thereof with graphical user interface
US20150033340A1 (en) 2013-07-23 2015-01-29 Crypteia Networks S.A. Systems and methods for self-tuning network intrusion detection and prevention
US8947374B2 (en) 2011-02-07 2015-02-03 Healthfusion, Inc. Electronic medical system touch phrase technology
US20150040233A1 (en) 2003-07-01 2015-02-05 Securityprofiling, Llc Sdk-equipped anti-vulnerability system, method, and computer program product
US20150067844A1 (en) 2002-10-21 2015-03-05 Rockwell Automation Technologies, Inc. System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US20150106867A1 (en) 2013-10-12 2015-04-16 Fortinet, Inc. Security information and event management
US20150120373A1 (en) 2013-10-25 2015-04-30 Jabil Circuit, Inc. Systems and methods for risk processing and visualization of supply chain management system data
US20150128049A1 (en) * 2012-07-06 2015-05-07 Robert S. Block Advanced user interface
US20150135316A1 (en) 2013-11-13 2015-05-14 NetCitadel Inc. System and method of protecting client computers
US20150135262A1 (en) 2012-05-03 2015-05-14 Shine Security Ltd. Detection and prevention for malicious threats
US20150142491A1 (en) 2013-11-15 2015-05-21 Cognito Limited Management of field-based workers
USD730925S1 (en) 2013-02-07 2015-06-02 Esco Technologies (Asia) Pte Ltd Display screen or portion thereof with graphical user interface
US20150163199A1 (en) 2012-04-30 2015-06-11 Zscaler, Inc. Systems and methods for integrating cloud services with information management systems
USD732555S1 (en) * 2012-07-19 2015-06-23 D2L Corporation Display screen with graphical user interface
US9064210B1 (en) 2012-03-31 2015-06-23 Emc Corporation Semantically-aware behavioral security analysis system for security information and event management
US20150178835A1 (en) 2013-12-20 2015-06-25 David W. Quillian Supply chain finance system
US20150180891A1 (en) 2013-12-19 2015-06-25 Splunk Inc. Using network locations obtained from multiple threat lists to evaluate network data or machine data
US9069930B1 (en) 2011-03-29 2015-06-30 Emc Corporation Security information and event management system employing security business objects and workflows
US20150207813A1 (en) 2012-02-01 2015-07-23 Vorstack, Inc. Techniques for sharing network security event information
US20150206245A1 (en) 2014-01-20 2015-07-23 Fmr Llc Dynamic Portfolio Simulator Tool Apparatuses, Methods and Systems
US20150215334A1 (en) 2012-09-28 2015-07-30 Level 3 Communications, Llc Systems and methods for generating network threat intelligence
US20150222667A1 (en) 2013-12-02 2015-08-06 Alex Nayshtut Protection system including security rule evaluation
USD736824S1 (en) 2012-12-28 2015-08-18 P&W Solutions Co., Ltd. Display screen with graphical user interface
US20150242619A1 (en) 2014-02-24 2015-08-27 Northcross Group Security management system
US20150242628A1 (en) 2014-02-23 2015-08-27 Cyphort Inc. System and Method for Detection of Malicious Hypertext Transfer Protocol Chains
US20150264011A1 (en) 2014-03-17 2015-09-17 Fortinet, Inc. Security information and event management
US20150281287A1 (en) 2009-11-20 2015-10-01 Alert Enterprise, Inc. Policy/rule engine, multi-compliance framework and risk remediation
US20150286636A1 (en) 2013-03-15 2015-10-08 Salim Elkhou Document processing system and method
US20150332398A1 (en) 2012-09-04 2015-11-19 Slav Brkic Risk management system and method for monitoring and controlling of messages in a trading system
US20150341212A1 (en) 2014-04-15 2015-11-26 Splunk Inc. Visualizations of statistics associated with captured network data
US20150350161A1 (en) 2013-07-31 2015-12-03 International Business Machines Corporation Network Traffic Analysis to Enhance Rule-Based Network Security
US20150356701A1 (en) 2014-06-06 2015-12-10 Play-it Health, Inc. Monitoring and adapting a patient's medical regimen and facilitating communication with a caregiver
US20160019388A1 (en) 2013-03-11 2016-01-21 Hewlett-Packard Development Company, L.P. Event correlation based on confidence factor
USD748126S1 (en) 2013-12-23 2016-01-26 Skyhigh Networks, Inc. Display screen with a graphical user interface for cloud usage analysis
US20160034361A1 (en) 2013-04-16 2016-02-04 Hewlett-Packard Development Company, L.P. Distributed event correlation system
US20160044054A1 (en) 2014-08-06 2016-02-11 Norse Corporation Network appliance for dynamic protection from risky network activities
US20160048658A1 (en) 2014-08-15 2016-02-18 Federal Express Corporation Research performance framework
US9282114B1 (en) 2011-06-30 2016-03-08 Emc Corporation Generation of alerts in an event management system based upon risk
US20160092408A1 (en) 2014-09-26 2016-03-31 Oracle International Corporation Semantic distance-based assignment of data elements to visualization edges
US20160094565A1 (en) 2014-09-29 2016-03-31 Juniper Networks, Inc. Targeted attack discovery
USD753134S1 (en) 2014-04-04 2016-04-05 Adp, Llc Display screen or portion thereof with graphical user interface
US20160117466A1 (en) 2014-10-27 2016-04-28 Jay P. Singh System and method for risk management
US20160125535A1 (en) 2014-10-31 2016-05-05 Trading Technologies International Inc. Location-aware risk mitigation systems and methods
USD756371S1 (en) 2013-12-02 2016-05-17 Symantec Corporation Display screen with graphical user interface
USD757075S1 (en) 2014-02-27 2016-05-24 Robert Bosch Gmbh Display screen with a graphical user interface
US20160164893A1 (en) 2013-07-17 2016-06-09 Hewlett-Packard Development Company, L.P. Event management systems
US20160164907A1 (en) 2014-12-03 2016-06-09 Phantom Cyber Corporation Security actions for computing assets based on enrichment information
US9367535B2 (en) 2012-11-29 2016-06-14 Business Objects Software, Ltd. Dashboard formula execution
US20160170594A1 (en) * 2014-03-26 2016-06-16 Unanimous A. I., Inc. Dynamic systems for optimization of real-time collaborative intelligence
US9378361B1 (en) 2012-12-31 2016-06-28 Emc Corporation Anomaly sensor framework for detecting advanced persistent threat attacks
US20160191466A1 (en) 2014-12-30 2016-06-30 Fortinet, Inc. Dynamically optimized security policy management
US20160203319A1 (en) 2015-01-14 2016-07-14 Leidos, Inc. System and Method For Providing Technology-Driven End-to-End Managed Security Service Products Through a Security Marketplace
US20160203883A1 (en) 2015-01-14 2016-07-14 David W. Richardson Semi Submersible Nuclear Power Plant and Multi-Purpose Platform
US9398035B2 (en) 2013-12-31 2016-07-19 Cisco Technology, Inc. Attack mitigation using learning machines
US20160224619A1 (en) 2015-01-30 2016-08-04 Splunk Inc. Text-based table manipulation of event data
US20160232353A1 (en) 2015-02-09 2016-08-11 Qualcomm Incorporated Determining Model Protection Level On-Device based on Malware Detection in Similar Devices
US20160241581A1 (en) 2014-04-03 2016-08-18 Isight Partners, Inc. System and Method of Cyber Threat Intensity Determination and Application to Cyber Threat Mitigation
US20160246490A1 (en) 2015-02-25 2016-08-25 Bank Of America Corporation Customizable Dashboard
US20160246849A1 (en) 2015-02-25 2016-08-25 FactorChain Inc. Service interface for event data store
USD765672S1 (en) 2014-12-08 2016-09-06 Kpmg Llp Electronic device with portfolio risk view graphical user interface
US20160259939A1 (en) 2015-03-05 2016-09-08 Minerva Labs Ltd. Systems and methods for malware evasion management
USD766302S1 (en) 2015-08-11 2016-09-13 Unified Office Display screen with call center performance graphical user interface
US20160286084A1 (en) 2015-03-26 2016-09-29 Konica Minolta, Inc. Image processing apparatus, image processing system, method for giving temporary use permission to portable terminal apparatus, and recording medium
US20160294800A1 (en) 2015-04-03 2016-10-06 Oracle International Corporation Aggregated computing infrastructure analyzer
USD769287S1 (en) * 2015-04-27 2016-10-18 Vericle Corporation Computer screen with practice health monitor and radar graphical user interface
US20160306862A1 (en) 2015-04-16 2016-10-20 Nuix Pty Ltd Systems and methods for data indexing with user-side scripting
US9479357B1 (en) 2010-03-05 2016-10-25 Symantec Corporation Detecting malware on mobile devices based on mobile behavior analysis
US20160321664A1 (en) 2015-04-28 2016-11-03 Ronald R. Erickson System and method for secure transactions using images
USD771068S1 (en) 2014-09-18 2016-11-08 Cheetah Mobile Inc. Display screen or portion thereof with graphical user interface
US9516053B1 (en) 2015-08-31 2016-12-06 Splunk Inc. Network security threat detection by user/user-entity behavioral analysis
US20160357418A1 (en) * 2014-03-26 2016-12-08 Unanimous A. I., Inc. Methods for analyzing decisions made by real-time collective intelligence systems
US20160366174A1 (en) 2015-04-17 2016-12-15 Soltra Solutions, Llc Computerized system and method for securely distributing and exchanging cyber-threat information in a standardized format
USD774540S1 (en) 2014-05-08 2016-12-20 Express Scripts, Inc. Display screen with a graphical user interface
USD775180S1 (en) 2012-07-12 2016-12-27 Mx Technologies, Inc. Display screen or portion thereof with a graphical user interface
US20170006058A1 (en) 2015-07-02 2017-01-05 Reliaquest Holdings, Llc Threat intelligence system and method
US20170032279A1 (en) 2015-07-31 2017-02-02 Acuity Solutions Corporation System and method for in-situ classifier retraining for malware identification and model heterogeneity
US20170041337A1 (en) 2011-01-26 2017-02-09 Viaforensics, Llc Systems, Methods, Apparatuses, And Computer Program Products For Forensic Monitoring
US20170041036A1 (en) 2015-08-05 2017-02-09 International Business Machines Corporation Automatic Self-Protection for a Portable Electronic Device
US20170048267A1 (en) 2014-12-13 2017-02-16 Security Scorecard, Inc. Calculating and benchmarking an entity's cybersecurity risk score
US20170048264A1 (en) 2015-08-01 2017-02-16 Splunk Inc, Creating Timeline Views of Information Technology Event Investigations
USD780199S1 (en) 2014-05-02 2017-02-28 Enigami Systems, Inc. Display screen or portion thereof with a graphical user interface
US20170060792A1 (en) 2015-09-01 2017-03-02 The Boeing Company Platform Management System, Apparatus, and Method
US20170061338A1 (en) 2015-08-31 2017-03-02 Salesforce.Com, Inc. Quantitative metrics for assessing status of a platform architecture for cloud computing
US20170060537A1 (en) 2015-08-31 2017-03-02 Salesforce.Com, Inc. Platform provider architecture creation utilizing platform architecture type unit definitions
US20170061348A1 (en) 2015-08-31 2017-03-02 Salesforce.com. inc. Platform architecture planning process utilizing platform architecture type unit definitions
USD781326S1 (en) 2015-04-15 2017-03-14 Deere & Company Status display screen with a graphical user interface
US20170083682A1 (en) 2014-05-15 2017-03-23 The Johns Hopkins University Method, system and computer-readable media for treatment plan risk analysis
US20170093910A1 (en) 2015-09-25 2017-03-30 Acalvio Technologies, Inc. Dynamic security mechanisms
USD783046S1 (en) * 2015-11-24 2017-04-04 Microsoft Corporation Display screen with graphical user interface
US20170118239A1 (en) 2015-10-26 2017-04-27 Microsoft Technology Licensing, Llc. Detection of cyber threats against cloud-based applications
US20170118245A1 (en) 2015-10-27 2017-04-27 Xypro Technology Corporation Method and system for gathering and contextualizing multiple security events
US9639697B2 (en) 2012-02-29 2017-05-02 Cisco Technology, Inc. Method and apparatus for retroactively detecting malicious or otherwise undesirable software
USD786273S1 (en) * 2015-06-16 2017-05-09 Adp, Llc Display screen with graphical user interface
US20170139894A1 (en) 2010-09-20 2017-05-18 Welch Global Consulting, Inc. Method and system for dynamic data modeling for use in real-time computerized presentations
US20170140293A1 (en) 2015-11-13 2017-05-18 Accenture Global Solutions Limited Analytics platform using telematics data
USD788165S1 (en) 2015-09-04 2017-05-30 Chargepoint Technology Ltd. Display screen with transitional icon
US20170154026A1 (en) 2015-12-01 2017-06-01 Business Objects Software Ltd. Interaction relationship building and explorer for dashboard
US20170154382A1 (en) 2015-11-30 2017-06-01 Hartford Fire Insurance Company Processing system for data elements received via source inputs
US20170171231A1 (en) 2015-12-11 2017-06-15 Brightpoint Security, Inc. Computer Network Threat Assessment
US20170177641A1 (en) 2015-12-19 2017-06-22 Viktor Charles Von Drakk Method and device for correlating multiple tables in a database environment
US20170192952A1 (en) 2015-12-30 2017-07-06 Sap Se Systems and methods for tracking and modifying actions in an action history
US20170206361A1 (en) 2014-07-16 2017-07-20 Beijing Zhigu Rui Tuo Tech Co., Ltd Application recommendation method and application recommendation apparatus
WO2017127850A1 (en) 2016-01-24 2017-07-27 Hasan Syed Kamran Computer security based on artificial intelligence
US20170214701A1 (en) 2016-01-24 2017-07-27 Syed Kamran Hasan Computer security based on artificial intelligence
US20170244736A1 (en) 2014-10-30 2017-08-24 Ironscales Ltd. Method and system for mitigating malicious messages attacks
US20170251013A1 (en) 2016-02-26 2017-08-31 Oracle International Corporation Techniques for discovering and managing security of applications
US20170249461A1 (en) 2016-02-26 2017-08-31 Cylance Inc. Retention and accessibility of data characterizing events on an endpoint computer
US20170251002A1 (en) 2016-02-29 2017-08-31 Palo Alto Networks, Inc. Malware analysis platform for threat intelligence made actionable
US20170264588A1 (en) 2016-03-08 2017-09-14 Tanium Inc. System and Method for Performing Event Inquiries in a Network
US20170263092A1 (en) 2016-03-10 2017-09-14 Pinpoint, Inc. Systems and methods for threat monitoring
US20170279835A1 (en) 2016-03-28 2017-09-28 Cisco Technology, Inc. Adaptive capture of packet traces based on user feedback learning
US20170301024A1 (en) 2009-03-20 2017-10-19 Pankaj B. Dalal Multidimensional risk analysis
USD800736S1 (en) * 2015-06-16 2017-10-24 Adp Llc Display screen with animated graphical user interface
USD802001S1 (en) 2016-07-08 2017-11-07 Ge Aviation Systems Llc Portion of a display panel with a graphical user interface component for flight operations management
US9813449B1 (en) 2012-08-10 2017-11-07 Lookwise S.L. Systems and methods for providing a security information and event management system in a distributed architecture
US20170322959A1 (en) 2016-05-09 2017-11-09 FactorChain Inc. Searchable investigation history for event data store
US20170331817A1 (en) 2016-05-12 2017-11-16 Bank Of America Corporation Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
US20170331816A1 (en) 2016-05-12 2017-11-16 Bank Of America Corporation Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
US20170346824A1 (en) 2016-05-31 2017-11-30 Tracker Networks Inc. Methods and systems for mobile device risk management
USD804497S1 (en) 2016-04-19 2017-12-05 Minebea Co., Ltd. Display screen with graphical user interface
US20170359366A1 (en) 2016-06-10 2017-12-14 General Electric Company Threat detection and localization for monitoring nodes of an industrial asset control system
US20170366582A1 (en) 2016-06-21 2017-12-21 International Business Machines Corporation Incident Response Plan based on Indicators of Compromise
US9852599B1 (en) 2015-08-17 2017-12-26 Alarm.Com Incorporated Safety monitoring platform
US20180007060A1 (en) 2016-06-30 2018-01-04 Amazon Technologies, Inc. Multi-Factor Authentication to Access Services
US20180027006A1 (en) 2015-02-24 2018-01-25 Cloudlock, Inc. System and method for securing an enterprise computing environment
USD808988S1 (en) 2016-12-20 2018-01-30 Abbott Laboratories Display screen with graphical user interface
US20180032914A1 (en) 2016-07-26 2018-02-01 Gamalon, Inc. Machine learning data analysis system and method
US20180033279A1 (en) 2016-07-27 2018-02-01 Accenture Global Solutions Limited Providing predictive alerts for workplace safety
USD809530S1 (en) 2016-12-20 2018-02-06 Smartorg, Inc. Display screen or portion thereof with an animated graphical user interface
US20180041537A1 (en) 2016-08-02 2018-02-08 Sophos Limited Identifying and remediating phishing security weaknesses
USD811425S1 (en) 2016-07-29 2018-02-27 Neurotrack Technologies, Inc. Display screen or portion thereof with graphical user interface
US20180060253A1 (en) 2016-05-20 2018-03-01 Faraday&Future Inc. Pairing of input device and display in vehicle infotainment systems
US20180063186A1 (en) 2014-09-05 2018-03-01 International Business Machines Corporation System for tracking data security threats and method for same
US20180069885A1 (en) 2016-09-06 2018-03-08 Accenture Global Solutions Limited Graph database analysis for network anomaly detection systems
US20180077188A1 (en) 2016-09-12 2018-03-15 Qualcomm Incorporated Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs
US20180077195A1 (en) 2016-09-12 2018-03-15 Qualcomm Incorporated Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs
USD813884S1 (en) * 2016-06-01 2018-03-27 Innovation 360 Group AB Display screen with graphical user interface
US20180091559A1 (en) 2016-09-26 2018-03-29 Splunk Inc. Managing the collection of forensic data from endpoint devices
US20180115523A1 (en) 2016-10-26 2018-04-26 Elastic Beam, Inc. Methods and systems for api deception environment and api traffic control and security
US20180121982A1 (en) 2015-04-02 2018-05-03 Zhejiang Geely Holding Group Co., Ltd Safe online transaction method, online transaction platform, and service fee platform
US20180124096A1 (en) 2016-10-31 2018-05-03 Armis Security Ltd. Detection of vulnerable devices in wireless networks
US20180129978A1 (en) 2016-11-09 2018-05-10 Gamalon, Inc. Machine learning data analysis system and method
US20180137277A1 (en) 2016-11-15 2018-05-17 General Electric Company Dynamic normalization of monitoring node data for threat detection in industrial asset control system
USD818487S1 (en) 2015-04-28 2018-05-22 Includehealth, Inc. Display screen with a graphical user interface
US20180144110A1 (en) 2016-11-22 2018-05-24 International Business Machines Corporation Multi-input user interaction and behavioral based authentication system for context aware applications
US20180159877A1 (en) 2016-12-07 2018-06-07 General Electric Company Multi-mode boundary selection for threat detection in industrial asset control system
US20180157831A1 (en) 2016-12-06 2018-06-07 General Electric Company Automated attack localization and detection
US20180189697A1 (en) 2016-12-30 2018-07-05 Lookingglass Cyber Solutions, Inc. Methods and apparatus for processing threat metrics to determine a risk of loss due to the compromise of an organization asset
US20180191758A1 (en) 2017-01-03 2018-07-05 General Electric Company Cluster-based decision boundaries for threat detection in industrial asset control system
USD822705S1 (en) * 2017-04-20 2018-07-10 Palantir Technologies, Inc. Display screen or portion thereof with graphical user interface
US20180211549A1 (en) 2015-07-21 2018-07-26 Moshe Cohen Method and system for autonomous dynamic air traffic management
US20180219911A1 (en) 2017-01-31 2018-08-02 Hewlett Packard Enterprise Development Lp Responding to alerts
US20180219876A1 (en) 2017-01-31 2018-08-02 Hewlett Packard Enterprise Development Lp Determining contextual information for alerts
US20180219875A1 (en) 2017-01-31 2018-08-02 Hewlett Packard Enterprise Development Lp Grouping alerts into bundles of alerts
US20180219891A1 (en) 2017-02-02 2018-08-02 Aetna Inc. Individualized cybersecurity risk detection using multiple attributes
US20180232528A1 (en) 2017-02-13 2018-08-16 Protegrity Corporation Sensitive Data Classification
US20180248904A1 (en) 2017-02-24 2018-08-30 LogRhythm Inc. Analytics for processing information system data
US20180248863A1 (en) 2017-02-24 2018-08-30 Fmr Llc Systems and methods for user authentication using pattern-based risk assessment and adjustment
US20180253676A1 (en) 2017-03-01 2018-09-06 Accenture Global Solutions Limited Automatic analysis of a technical capability
US20180260572A1 (en) 2017-03-08 2018-09-13 Wipro Limited Method and device for software risk management within information technology (it) infrastructure
US20180268506A1 (en) 2017-03-15 2018-09-20 Exari Group, Inc. Machine evaluation of contract terms
US20180275845A1 (en) 2017-03-23 2018-09-27 International Business Machines Corporation Dashboard Creation With Popular Patterns and Suggestions Using Analytics
US20180288078A1 (en) 2017-04-03 2018-10-04 Juniper Networks, Inc. Tracking and mitigation of an infected host device
USD831697S1 (en) * 2016-10-31 2018-10-23 Agile Transformation, Inc. Display screen or portion thereof with icon
US20180309752A1 (en) 2017-04-20 2018-10-25 Adp, Llc Enhanced security authentication system
US20180308026A1 (en) 2017-04-21 2018-10-25 Accenture Global Solutions Limited Identifying risk patterns in a multi-level network structure
US20180316701A1 (en) 2017-04-26 2018-11-01 General Electric Company Threat detection for a fleet of industrial assets
US20180324207A1 (en) 2017-05-05 2018-11-08 Servicenow, Inc. Network security threat intelligence sharing
US20180337891A1 (en) 2015-05-27 2018-11-22 Ping Identity Corporation Methods and systems for api proxy based adaptive security
US20180337941A1 (en) 2017-05-18 2018-11-22 Qadium, Inc. Correlation-driven threat assessment and remediation
USD834606S1 (en) * 2015-08-25 2018-11-27 Branch Banking And Trust Company Display screen or portions thereof with graphical user interface
US20180348979A1 (en) 2017-06-02 2018-12-06 Oracle International Corporation Inter-application sharing
US20180357422A1 (en) 2016-02-25 2018-12-13 Sas Institute Inc. Simulated attack generator for testing a cybersecurity system
US20180359272A1 (en) 2017-06-12 2018-12-13 ARIM Technologies Pte Ltd. Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management
US20180367561A1 (en) 2017-06-14 2018-12-20 International Business Machines Corporation Threat disposition analysis and modeling using supervised machine learning
US20190007447A1 (en) 2017-06-29 2019-01-03 Webroot Inc. Peer Device Protection
US20190019432A1 (en) 2017-07-12 2019-01-17 Electronics And Telecommunications Research Institute Apparatus and method for cyber-crisis response training based on augmented reality
US20190020667A1 (en) 2017-07-14 2019-01-17 Guavus, Inc. Non-rule based security risk detection
US20190021004A1 (en) 2017-07-13 2019-01-17 Sophos Limited Threat index based wlan security and quality of service
US20190028498A1 (en) 2017-07-24 2019-01-24 Sap Se Threat Modeling Tool Using Machine Learning
US20190037081A1 (en) 2017-07-25 2019-01-31 Vail Systems, Inc. Adaptive, multi-modal fraud detection system
US20190052665A1 (en) 2016-02-10 2019-02-14 Cortex Insight Limited Security system
US20190068620A1 (en) 2017-08-30 2019-02-28 International Business Machines Corporation Detecting malware attacks using extracted behavioral features
US20190068616A1 (en) 2017-08-25 2019-02-28 Ecrime Management Strategies, Inc., d/b/a PhishLabs Security system for detection and mitigation of malicious communications
US10242187B1 (en) 2016-09-14 2019-03-26 Symantec Corporation Systems and methods for providing integrated security management
US20190095618A1 (en) 2016-10-24 2019-03-28 Certis Cisco Security Pte Ltd Quantitative unified analytic neural networks
US20190104140A1 (en) 2017-09-29 2019-04-04 AO Kaspersky Lab System and method of cloud detection, investigation and elimination of targeted attacks
US10257227B1 (en) 2014-08-14 2019-04-09 Amazon Technologies, Inc. Computer security threat correlation
USD845344S1 (en) 2018-01-30 2019-04-09 Citrix Systems, Inc. Display screen or portion thereof with icon group
US20190124104A1 (en) 2017-01-30 2019-04-25 Splunk Inc. Graph-Based Network Anomaly Detection Across Time and Entities
US20190121977A1 (en) 2017-10-19 2019-04-25 AO Kaspersky Lab System and method of detecting a malicious file
US20190132351A1 (en) 2015-07-30 2019-05-02 IOR Analytics, LLC. Method and apparatus for data security analysis of data flows
US10284587B1 (en) 2016-09-14 2019-05-07 Symantec Corporation Systems and methods for responding to electronic security incidents
US20190158525A1 (en) 2016-02-29 2019-05-23 Palo Alto Networks, Inc. Automatically grouping malware based on artifacts
US20190163914A1 (en) 2017-11-30 2019-05-30 Bank Of America Corporation System for information security threat assessment and event triggering
US20190188389A1 (en) 2017-12-14 2019-06-20 Forescout Technologies, Inc. Contextual risk monitoring
US20190199739A1 (en) 2017-12-22 2019-06-27 Cisco Technology, Inc. Leveraging endpoint and network environment inferences for malware traffic classification
US20190199744A1 (en) 2017-12-22 2019-06-27 Kpmg Llp System and method for identifying cybersecurity threats
US20190207967A1 (en) 2017-12-28 2019-07-04 Fireeye, Inc. Platform and method for retroactive reclassification employing a cybersecurity-based global data store
US20190207953A1 (en) 2017-12-29 2019-07-04 Square, Inc. Logical Validation of Devices Against Fraud and Tampering
US20190205511A1 (en) 2017-05-17 2019-07-04 Forescout Technologies, Inc. Account monitoring
US20190207966A1 (en) 2017-12-28 2019-07-04 Fireeye, Inc. Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data Store
US20190222596A1 (en) 2018-01-18 2019-07-18 General Electric Company Reliable cyber-threat detection in rapidly changing environments
USD854561S1 (en) 2017-03-17 2019-07-23 Health Management Systems, Inc. Display screen with animated graphical user interface
US20190230099A1 (en) 2018-01-19 2019-07-25 General Electric Company Learning method and system for separating independent and dependent attacks
US20190230098A1 (en) 2018-01-22 2019-07-25 T-Mobile Usa, Inc. Indicator of compromise calculation system
US20190254634A1 (en) * 2017-12-27 2019-08-22 Canon Medical Systems Corporation Analysis apparatus
USD857749S1 (en) 2017-12-01 2019-08-27 Agco Corporation Display screen or portion thereof with graphical user interface
US20190266297A1 (en) 2018-02-26 2019-08-29 Noblis, Inc. Multi-layer cyber-physical systems simulation platform
USD859441S1 (en) 2017-11-09 2019-09-10 Veriphy Analytics, Inc. Display screen with graphical user interface
USD866576S1 (en) 2017-06-02 2019-11-12 Sap Se Display screen or portion thereof with graphical user interface
US20200037919A1 (en) * 2018-08-06 2020-02-06 Siemens Healthcare Gmbh Protocol parameter selection method, apparatus and magnetic resonance imaging system
US20200110803A1 (en) 2018-10-08 2020-04-09 Tableau Software, Inc. Determining Levels of Detail for Data Visualizations Using Natural Language Constructs
USD882583S1 (en) * 2016-07-12 2020-04-28 Google Llc Display screen with graphical user interface
USD889490S1 (en) 2017-08-29 2020-07-07 3M Innovative Properties Company Display screen with graphical user interface
US20200243178A1 (en) 2018-04-10 2020-07-30 Mobile Innovations Llc Advanced health monitoring system and method
US10775988B2 (en) 2016-01-22 2020-09-15 Johnson Controls Technology Company Building energy management system with ad hoc dashboard
US10791148B2 (en) 2013-04-29 2020-09-29 Moogsoft Inc. System in communication with a managed infrastructure
USD905704S1 (en) 2019-03-25 2020-12-22 Magnifi Llc Display screen or portion thereof with a graphical user interface
USD905733S1 (en) 2018-04-25 2020-12-22 Adp, Llc Display screen with an animated graphical user interface

Patent Citations (315)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USD418495S (en) 1997-11-05 2000-01-04 The United States Of America As Represented By The Secretary Of The Army Computer/generated image for a computer monitor
US6530024B1 (en) 1998-11-20 2003-03-04 Centrax Corporation Adaptive feedback security system and method
US6381556B1 (en) 1999-08-02 2002-04-30 Ciena Corporation Data analyzer system and method for manufacturing control environment
US20020087882A1 (en) 2000-03-16 2002-07-04 Bruce Schneier Mehtod and system for dynamic network intrusion monitoring detection and response
US20040193598A1 (en) * 2000-06-30 2004-09-30 Masataka Kan Method and system for display data in a database system
US7152240B1 (en) 2000-07-25 2006-12-19 Green Stuart D Method for communication security and apparatus therefor
US20050055330A1 (en) 2001-05-15 2005-03-10 Britton Colin P. Surveillance, monitoring and real-time events platform
US7487544B2 (en) 2001-07-30 2009-02-03 The Trustees Of Columbia University In The City Of New York System and methods for detection of new malicious executables
US7818797B1 (en) 2001-10-11 2010-10-19 The Trustees Of Columbia University In The City Of New York Methods for cost-sensitive modeling for intrusion detection and response
US20040010697A1 (en) 2002-03-13 2004-01-15 Conor White Biometric authentication system and method
US20150067844A1 (en) 2002-10-21 2015-03-05 Rockwell Automation Technologies, Inc. System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US20060123022A1 (en) 2003-03-12 2006-06-08 Intotality Pty Ltd, Australia Automated application discovery and analysis system and method
US20040193912A1 (en) 2003-03-31 2004-09-30 Intel Corporation Methods and systems for managing security policies
US20150040233A1 (en) 2003-07-01 2015-02-05 Securityprofiling, Llc Sdk-equipped anti-vulnerability system, method, and computer program product
US20050125694A1 (en) 2003-12-05 2005-06-09 Fakes Thomas F. Security policy update supporting at least one security service provider
US20050165631A1 (en) 2004-01-28 2005-07-28 Microsoft Corporation Time management representations and automation for allocating time to projects and meetings within an online calendaring system
US20050235206A1 (en) 2004-04-15 2005-10-20 Udo Arend User interface for a quick activity window
US8253747B2 (en) * 2004-04-16 2012-08-28 Apple Inc. User interface for controlling animation of an object
US20060095967A1 (en) 2004-10-29 2006-05-04 David Durham Platform-based identification of host software circumvention
US20130014264A1 (en) 2005-01-27 2013-01-10 Scott Cruickshanks Kennedy Systems and Methods For Implementing and Scoring Computer Network Defense Exercises
US20070180509A1 (en) 2005-12-07 2007-08-02 Swartz Alon R Practical platform for high risk applications
US20070143827A1 (en) 2005-12-21 2007-06-21 Fiberlink Methods and systems for intelligently controlling access to computing resources
US8146146B1 (en) 2005-12-23 2012-03-27 At&T Intellectual Property Ii, L.P. Method and apparatus for integrated network security alert information retrieval
US20070199070A1 (en) 2006-02-17 2007-08-23 Hughes William A Systems and methods for intelligent monitoring and response to network threats
US20090220929A1 (en) 2006-03-17 2009-09-03 Daniel Warren C Pc-based simulator training system and methods
US20070245238A1 (en) 2006-03-22 2007-10-18 Fugitt Jesse A Timeline visualizations linked with other visualizations of data in a thin client
USD552121S1 (en) 2006-07-20 2007-10-02 Xerion Avionix, Llc Computer-generated icon for a portion of an engine instrument display
US20120072968A1 (en) 2007-02-16 2012-03-22 Wysopal Christopher J Assessment and analysis of software security flaws in virtual machines
US20090077666A1 (en) 2007-03-12 2009-03-19 University Of Southern California Value-Adaptive Security Threat Modeling and Vulnerability Ranking
US20100077078A1 (en) 2007-06-22 2010-03-25 Fortisphere, Inc. Network traffic analysis using a dynamically updating ontological network description
US20090089701A1 (en) 2007-09-27 2009-04-02 Rockwell Automation Technologies, Inc. Distance-wise presentation of industrial automation data as a function of relevance to user
US20090178139A1 (en) 2008-01-09 2009-07-09 Global Dataguard, Inc. Systems and Methods of Network Security and Threat Management
US20090208910A1 (en) 2008-02-19 2009-08-20 Architecture Technology Corporation Automated execution and evaluation of network-based training exercises
US8191147B1 (en) 2008-04-24 2012-05-29 Symantec Corporation Method for malware removal based on network signatures and file system artifacts
US20100067390A1 (en) 2008-05-21 2010-03-18 Luis Filipe Pereira Valente System and method for discovery of network entities
US20090320137A1 (en) 2008-06-18 2009-12-24 Eads Na Defense Security And Systems Solutions Inc. Systems and methods for a simulated network attack generator
US20090328219A1 (en) 2008-06-27 2009-12-31 Juniper Networks, Inc. Dynamic policy provisioning within network security devices
US8490149B1 (en) 2008-08-20 2013-07-16 Juniper Networks, Inc. Secure session handling in a device after a policy update
US20100156630A1 (en) 2008-12-18 2010-06-24 Robert Ainsbury Contextual Risk Indicators in Connection with Threat Level Management
US20100169948A1 (en) 2008-12-31 2010-07-01 Hytrust, Inc. Intelligent security control system for virtualized ecosystems
US20100205136A1 (en) 2009-02-09 2010-08-12 Southwest Research Institute System and Method for Modeling and Predicting Security Threats
US20120083706A1 (en) * 2009-02-26 2012-04-05 Draeger Medical Systems, Inc. Ecg data display method for rapid detection of myocardial ischemia
US20170301024A1 (en) 2009-03-20 2017-10-19 Pankaj B. Dalal Multidimensional risk analysis
US8549626B1 (en) 2009-03-20 2013-10-01 Symantec Corporation Method and apparatus for securing a computer from malicious threats through generic remediation
US20110029450A1 (en) 2009-07-31 2011-02-03 Accenture Global Services Gmbh Computer-implemented method, system, and computer program product for connecting contract management and claim management
USD691159S1 (en) 2009-10-07 2013-10-08 Discover Financial Services Computer display with a graphical user interface for a spending analysis tool
USD636779S1 (en) 2009-10-07 2011-04-26 Dfs Services Llc Graphical user interface for a spending analysis tool for a computer display
US20150281287A1 (en) 2009-11-20 2015-10-01 Alert Enterprise, Inc. Policy/rule engine, multi-compliance framework and risk remediation
US8539385B2 (en) * 2010-01-26 2013-09-17 Apple Inc. Device, method, and graphical user interface for precise positioning of objects
USD697080S1 (en) * 2010-02-26 2014-01-07 Draeger Medical Systems, Inc. Display screen with an icon
US9479357B1 (en) 2010-03-05 2016-10-25 Symantec Corporation Detecting malware on mobile devices based on mobile behavior analysis
US20140297495A1 (en) 2010-03-18 2014-10-02 Pankaj B. Dalal Multidimensional risk analysis
US20110289308A1 (en) 2010-05-18 2011-11-24 Sobko Andrey V Team security for portable information devices
US20110288692A1 (en) 2010-05-20 2011-11-24 Accenture Global Services Gmbh Malicious attack detection and analysis
US20130081141A1 (en) 2010-05-25 2013-03-28 Hewlett-Packard Development Company, L.P. Security threat detection associated with security events and an actor category model
US20110320307A1 (en) 2010-06-18 2011-12-29 Google Inc. Context-influenced application recommendations
US8832148B2 (en) 2010-06-29 2014-09-09 International Business Machines Corporation Enterprise evidence repository
US20120079596A1 (en) 2010-08-26 2012-03-29 Verisign, Inc. Method and system for automatic detection and analysis of malware
US20170139894A1 (en) 2010-09-20 2017-05-18 Welch Global Consulting, Inc. Method and system for dynamic data modeling for use in real-time computerized presentations
US20120079433A1 (en) * 2010-09-28 2012-03-29 J-MEX, Inc. Device and system and method for interacting with target in operation area
US20120154169A1 (en) 2010-12-15 2012-06-21 Edo Vincent Hoekstra Toilet management systems, methods, and techniques
US20170041337A1 (en) 2011-01-26 2017-02-09 Viaforensics, Llc Systems, Methods, Apparatuses, And Computer Program Products For Forensic Monitoring
US8947374B2 (en) 2011-02-07 2015-02-03 Healthfusion, Inc. Electronic medical system touch phrase technology
US20140223555A1 (en) 2011-02-10 2014-08-07 Telefonica, S.A. Method and system for improving security threats detection in communication networks
USD665412S1 (en) 2011-03-09 2012-08-14 Microsoft Corporation Display screen with graphical user interface
US20120240233A1 (en) 2011-03-17 2012-09-20 Skunk Worx B.V. Method and system for detecting malicious web content
US9069930B1 (en) 2011-03-29 2015-06-30 Emc Corporation Security information and event management system employing security business objects and workflows
USD685813S1 (en) 2011-05-19 2013-07-09 Nxn Tech, Llc Display screen with a results graphical user interface
USD685391S1 (en) * 2011-06-27 2013-07-02 Specialty Minerals (Michigan) Inc. Graphical user interface for a display screen or a portion thereof for evaluating refractory data
US9282114B1 (en) 2011-06-30 2016-03-08 Emc Corporation Generation of alerts in an event management system based upon risk
US20130031555A1 (en) 2011-07-26 2013-01-31 Salesforce.Com, Inc. System, method and computer program product for conditionally executing related reports in parallel based on an estimated execution time
US20140156711A1 (en) 2011-08-01 2014-06-05 Dhiraj Sharan Asset model import connector
US20140280075A1 (en) 2011-08-26 2014-09-18 Hewlett-Packard Development Company, L.P. Multidimension clusters for data partitioning
US20140195502A1 (en) 2011-08-26 2014-07-10 Wei Huang Multidimension column-based partitioning and storage
US20140189870A1 (en) 2011-09-08 2014-07-03 Anurag Singla Visual component and drill down mapping
USD674404S1 (en) 2011-10-26 2013-01-15 Mcafee, Inc. Computer having graphical user interface
US20130117847A1 (en) 2011-11-07 2013-05-09 William G. Friedman Streaming Method and System for Processing Network Metadata
US20140330816A1 (en) 2011-11-18 2014-11-06 Debabrata Dash Query summary generation using row-column data storage
US20140020123A1 (en) 2011-12-22 2014-01-16 Michael Berger Always-available embedded theft reaction subsystem
US20140007264A1 (en) 2011-12-22 2014-01-02 Michael Berger Always-available embedded theft reaction subsystem
US20140009289A1 (en) 2011-12-22 2014-01-09 Michael Berger Always-available embedded theft reaction subsystem
US20140208447A1 (en) 2011-12-22 2014-07-24 Michael Berger Always-available embedded theft reaction subsystem
US20140020122A1 (en) 2011-12-22 2014-01-16 Michael Berger Always-available embedded theft reaction subsystem
US20140013455A1 (en) 2011-12-22 2014-01-09 Michael Berger Always-available embedded theft reaction subsystem
US20140020121A1 (en) 2011-12-22 2014-01-16 Michael Berger Always-available embedded theft reaction subsystem
US20140013454A1 (en) 2011-12-22 2014-01-09 Michael Berger Always-available embedded theft reaction subsystem
US20130275770A1 (en) 2011-12-22 2013-10-17 Michael Berger Always-available embedded theft reaction subsystem
USD681662S1 (en) 2012-01-05 2013-05-07 Flextronics Ap, Llc Display panel with graphical user interface for analyzing and presenting supply, fabrication, and logistics data
US20130179938A1 (en) 2012-01-09 2013-07-11 International Business Machines Corporation Security policy management using incident analysis
US20150207813A1 (en) 2012-02-01 2015-07-23 Vorstack, Inc. Techniques for sharing network security event information
US9639697B2 (en) 2012-02-29 2017-05-02 Cisco Technology, Inc. Method and apparatus for retroactively detecting malicious or otherwise undesirable software
US20130263266A1 (en) 2012-03-29 2013-10-03 Cyber Engineering Services, Inc. Systems and methods for automated malware artifact retrieval and analysis
US8850585B2 (en) 2012-03-29 2014-09-30 Cyber Engineering Services, Inc. Systems and methods for automated malware artifact retrieval and analysis
US8291500B1 (en) 2012-03-29 2012-10-16 Cyber Engineering Services, Inc. Systems and methods for automated malware artifact retrieval and analysis
US9064210B1 (en) 2012-03-31 2015-06-23 Emc Corporation Semantically-aware behavioral security analysis system for security information and event management
US20130291087A1 (en) 2012-04-30 2013-10-31 Zscaler, Inc. Systems and methods for integrating cloud services with information management systems
US20150163199A1 (en) 2012-04-30 2015-06-11 Zscaler, Inc. Systems and methods for integrating cloud services with information management systems
US20150135262A1 (en) 2012-05-03 2015-05-14 Shine Security Ltd. Detection and prevention for malicious threats
US20150128049A1 (en) * 2012-07-06 2015-05-07 Robert S. Block Advanced user interface
USD775180S1 (en) 2012-07-12 2016-12-27 Mx Technologies, Inc. Display screen or portion thereof with a graphical user interface
USD732555S1 (en) * 2012-07-19 2015-06-23 D2L Corporation Display screen with graphical user interface
USD716328S1 (en) 2012-07-20 2014-10-28 Desire2Learn Incorporated Display screen with graphical user interface
US20140046709A1 (en) 2012-08-08 2014-02-13 Mark Clement Kwapiszeski Methods and systems for evaluating technology assets
US9813449B1 (en) 2012-08-10 2017-11-07 Lookwise S.L. Systems and methods for providing a security information and event management system in a distributed architecture
US20140053273A1 (en) 2012-08-18 2014-02-20 Lume Systems, Inc. System and method for limiting exploitable or potentially exploitable sub-components in software components
US20140201836A1 (en) 2012-08-23 2014-07-17 David B. Amsler Automated Internet Threat Detection and Mitigation System and Associated Methods
US20150332398A1 (en) 2012-09-04 2015-11-19 Slav Brkic Risk management system and method for monitoring and controlling of messages in a trading system
US20140096181A1 (en) 2012-09-28 2014-04-03 Tripwire, Inc. Event integration frameworks
US20150215334A1 (en) 2012-09-28 2015-07-30 Level 3 Communications, Llc Systems and methods for generating network threat intelligence
US9367535B2 (en) 2012-11-29 2016-06-14 Business Objects Software, Ltd. Dashboard formula execution
US20140172706A1 (en) 2012-12-18 2014-06-19 Michael Condry Security broker
USD736824S1 (en) 2012-12-28 2015-08-18 P&W Solutions Co., Ltd. Display screen with graphical user interface
US9378361B1 (en) 2012-12-31 2016-06-28 Emc Corporation Anomaly sensor framework for detecting advanced persistent threat attacks
USD730925S1 (en) 2013-02-07 2015-06-02 Esco Technologies (Asia) Pte Ltd Display screen or portion thereof with graphical user interface
USD717328S1 (en) 2013-03-05 2014-11-11 Xian Qian Lin Display screen or portion thereof with graphical user interface
US20160019388A1 (en) 2013-03-11 2016-01-21 Hewlett-Packard Development Company, L.P. Event correlation based on confidence factor
US20150286636A1 (en) 2013-03-15 2015-10-08 Salim Elkhou Document processing system and method
US20160034361A1 (en) 2013-04-16 2016-02-04 Hewlett-Packard Development Company, L.P. Distributed event correlation system
US10791148B2 (en) 2013-04-29 2020-09-29 Moogsoft Inc. System in communication with a managed infrastructure
US20160164893A1 (en) 2013-07-17 2016-06-09 Hewlett-Packard Development Company, L.P. Event management systems
US20150033340A1 (en) 2013-07-23 2015-01-29 Crypteia Networks S.A. Systems and methods for self-tuning network intrusion detection and prevention
US20150350161A1 (en) 2013-07-31 2015-12-03 International Business Machines Corporation Network Traffic Analysis to Enhance Rule-Based Network Security
US20150106867A1 (en) 2013-10-12 2015-04-16 Fortinet, Inc. Security information and event management
US20150120373A1 (en) 2013-10-25 2015-04-30 Jabil Circuit, Inc. Systems and methods for risk processing and visualization of supply chain management system data
US20150135316A1 (en) 2013-11-13 2015-05-14 NetCitadel Inc. System and method of protecting client computers
US20150142491A1 (en) 2013-11-15 2015-05-21 Cognito Limited Management of field-based workers
US20150222667A1 (en) 2013-12-02 2015-08-06 Alex Nayshtut Protection system including security rule evaluation
USD756371S1 (en) 2013-12-02 2016-05-17 Symantec Corporation Display screen with graphical user interface
US20150180891A1 (en) 2013-12-19 2015-06-25 Splunk Inc. Using network locations obtained from multiple threat lists to evaluate network data or machine data
US20150178835A1 (en) 2013-12-20 2015-06-25 David W. Quillian Supply chain finance system
USD748126S1 (en) 2013-12-23 2016-01-26 Skyhigh Networks, Inc. Display screen with a graphical user interface for cloud usage analysis
US9398035B2 (en) 2013-12-31 2016-07-19 Cisco Technology, Inc. Attack mitigation using learning machines
US20150206245A1 (en) 2014-01-20 2015-07-23 Fmr Llc Dynamic Portfolio Simulator Tool Apparatuses, Methods and Systems
US20150242628A1 (en) 2014-02-23 2015-08-27 Cyphort Inc. System and Method for Detection of Malicious Hypertext Transfer Protocol Chains
US20150242619A1 (en) 2014-02-24 2015-08-27 Northcross Group Security management system
USD757075S1 (en) 2014-02-27 2016-05-24 Robert Bosch Gmbh Display screen with a graphical user interface
US20140240122A1 (en) 2014-02-27 2014-08-28 Fitbit, Inc. Notifications on a User Device Based on Activity Detected By an Activity Monitoring Device
US20150264011A1 (en) 2014-03-17 2015-09-17 Fortinet, Inc. Security information and event management
US20160170594A1 (en) * 2014-03-26 2016-06-16 Unanimous A. I., Inc. Dynamic systems for optimization of real-time collaborative intelligence
US20160357418A1 (en) * 2014-03-26 2016-12-08 Unanimous A. I., Inc. Methods for analyzing decisions made by real-time collective intelligence systems
US20160241581A1 (en) 2014-04-03 2016-08-18 Isight Partners, Inc. System and Method of Cyber Threat Intensity Determination and Application to Cyber Threat Mitigation
USD753134S1 (en) 2014-04-04 2016-04-05 Adp, Llc Display screen or portion thereof with graphical user interface
US20150341212A1 (en) 2014-04-15 2015-11-26 Splunk Inc. Visualizations of statistics associated with captured network data
USD780199S1 (en) 2014-05-02 2017-02-28 Enigami Systems, Inc. Display screen or portion thereof with a graphical user interface
USD774540S1 (en) 2014-05-08 2016-12-20 Express Scripts, Inc. Display screen with a graphical user interface
US20170083682A1 (en) 2014-05-15 2017-03-23 The Johns Hopkins University Method, system and computer-readable media for treatment plan risk analysis
US20150356701A1 (en) 2014-06-06 2015-12-10 Play-it Health, Inc. Monitoring and adapting a patient's medical regimen and facilitating communication with a caregiver
US20170206361A1 (en) 2014-07-16 2017-07-20 Beijing Zhigu Rui Tuo Tech Co., Ltd Application recommendation method and application recommendation apparatus
US20160044054A1 (en) 2014-08-06 2016-02-11 Norse Corporation Network appliance for dynamic protection from risky network activities
US10257227B1 (en) 2014-08-14 2019-04-09 Amazon Technologies, Inc. Computer security threat correlation
US20160048658A1 (en) 2014-08-15 2016-02-18 Federal Express Corporation Research performance framework
US20180063186A1 (en) 2014-09-05 2018-03-01 International Business Machines Corporation System for tracking data security threats and method for same
USD771068S1 (en) 2014-09-18 2016-11-08 Cheetah Mobile Inc. Display screen or portion thereof with graphical user interface
US20160092408A1 (en) 2014-09-26 2016-03-31 Oracle International Corporation Semantic distance-based assignment of data elements to visualization edges
US20160094565A1 (en) 2014-09-29 2016-03-31 Juniper Networks, Inc. Targeted attack discovery
US20160117466A1 (en) 2014-10-27 2016-04-28 Jay P. Singh System and method for risk management
US20170244736A1 (en) 2014-10-30 2017-08-24 Ironscales Ltd. Method and system for mitigating malicious messages attacks
US20160125535A1 (en) 2014-10-31 2016-05-05 Trading Technologies International Inc. Location-aware risk mitigation systems and methods
US20160164907A1 (en) 2014-12-03 2016-06-09 Phantom Cyber Corporation Security actions for computing assets based on enrichment information
USD765672S1 (en) 2014-12-08 2016-09-06 Kpmg Llp Electronic device with portfolio risk view graphical user interface
US20170048267A1 (en) 2014-12-13 2017-02-16 Security Scorecard, Inc. Calculating and benchmarking an entity's cybersecurity risk score
US20160191466A1 (en) 2014-12-30 2016-06-30 Fortinet, Inc. Dynamically optimized security policy management
US20160203319A1 (en) 2015-01-14 2016-07-14 Leidos, Inc. System and Method For Providing Technology-Driven End-to-End Managed Security Service Products Through a Security Marketplace
US20160203883A1 (en) 2015-01-14 2016-07-14 David W. Richardson Semi Submersible Nuclear Power Plant and Multi-Purpose Platform
US20160224619A1 (en) 2015-01-30 2016-08-04 Splunk Inc. Text-based table manipulation of event data
US20160232353A1 (en) 2015-02-09 2016-08-11 Qualcomm Incorporated Determining Model Protection Level On-Device based on Malware Detection in Similar Devices
US20180027006A1 (en) 2015-02-24 2018-01-25 Cloudlock, Inc. System and method for securing an enterprise computing environment
US20160246490A1 (en) 2015-02-25 2016-08-25 Bank Of America Corporation Customizable Dashboard
US20160246849A1 (en) 2015-02-25 2016-08-25 FactorChain Inc. Service interface for event data store
US20160259939A1 (en) 2015-03-05 2016-09-08 Minerva Labs Ltd. Systems and methods for malware evasion management
US20160286084A1 (en) 2015-03-26 2016-09-29 Konica Minolta, Inc. Image processing apparatus, image processing system, method for giving temporary use permission to portable terminal apparatus, and recording medium
US20180121982A1 (en) 2015-04-02 2018-05-03 Zhejiang Geely Holding Group Co., Ltd Safe online transaction method, online transaction platform, and service fee platform
US20160294800A1 (en) 2015-04-03 2016-10-06 Oracle International Corporation Aggregated computing infrastructure analyzer
USD781326S1 (en) 2015-04-15 2017-03-14 Deere & Company Status display screen with a graphical user interface
US20160306862A1 (en) 2015-04-16 2016-10-20 Nuix Pty Ltd Systems and methods for data indexing with user-side scripting
US20160366174A1 (en) 2015-04-17 2016-12-15 Soltra Solutions, Llc Computerized system and method for securely distributing and exchanging cyber-threat information in a standardized format
USD769287S1 (en) * 2015-04-27 2016-10-18 Vericle Corporation Computer screen with practice health monitor and radar graphical user interface
US20160321664A1 (en) 2015-04-28 2016-11-03 Ronald R. Erickson System and method for secure transactions using images
USD818487S1 (en) 2015-04-28 2018-05-22 Includehealth, Inc. Display screen with a graphical user interface
US20180337891A1 (en) 2015-05-27 2018-11-22 Ping Identity Corporation Methods and systems for api proxy based adaptive security
USD786273S1 (en) * 2015-06-16 2017-05-09 Adp, Llc Display screen with graphical user interface
USD800736S1 (en) * 2015-06-16 2017-10-24 Adp Llc Display screen with animated graphical user interface
US20170006058A1 (en) 2015-07-02 2017-01-05 Reliaquest Holdings, Llc Threat intelligence system and method
US20180211549A1 (en) 2015-07-21 2018-07-26 Moshe Cohen Method and system for autonomous dynamic air traffic management
US20190132351A1 (en) 2015-07-30 2019-05-02 IOR Analytics, LLC. Method and apparatus for data security analysis of data flows
US20170032279A1 (en) 2015-07-31 2017-02-02 Acuity Solutions Corporation System and method for in-situ classifier retraining for malware identification and model heterogeneity
US20170048264A1 (en) 2015-08-01 2017-02-16 Splunk Inc, Creating Timeline Views of Information Technology Event Investigations
US20170041036A1 (en) 2015-08-05 2017-02-09 International Business Machines Corporation Automatic Self-Protection for a Portable Electronic Device
USD766302S1 (en) 2015-08-11 2016-09-13 Unified Office Display screen with call center performance graphical user interface
US9852599B1 (en) 2015-08-17 2017-12-26 Alarm.Com Incorporated Safety monitoring platform
USD834606S1 (en) * 2015-08-25 2018-11-27 Branch Banking And Trust Company Display screen or portions thereof with graphical user interface
US20170061348A1 (en) 2015-08-31 2017-03-02 Salesforce.com. inc. Platform architecture planning process utilizing platform architecture type unit definitions
US9516053B1 (en) 2015-08-31 2016-12-06 Splunk Inc. Network security threat detection by user/user-entity behavioral analysis
US20170061338A1 (en) 2015-08-31 2017-03-02 Salesforce.Com, Inc. Quantitative metrics for assessing status of a platform architecture for cloud computing
US20170060537A1 (en) 2015-08-31 2017-03-02 Salesforce.Com, Inc. Platform provider architecture creation utilizing platform architecture type unit definitions
US20170060792A1 (en) 2015-09-01 2017-03-02 The Boeing Company Platform Management System, Apparatus, and Method
USD788165S1 (en) 2015-09-04 2017-05-30 Chargepoint Technology Ltd. Display screen with transitional icon
US20170093910A1 (en) 2015-09-25 2017-03-30 Acalvio Technologies, Inc. Dynamic security mechanisms
US20170118239A1 (en) 2015-10-26 2017-04-27 Microsoft Technology Licensing, Llc. Detection of cyber threats against cloud-based applications
US20170118245A1 (en) 2015-10-27 2017-04-27 Xypro Technology Corporation Method and system for gathering and contextualizing multiple security events
US20170140293A1 (en) 2015-11-13 2017-05-18 Accenture Global Solutions Limited Analytics platform using telematics data
USD783046S1 (en) * 2015-11-24 2017-04-04 Microsoft Corporation Display screen with graphical user interface
US20170154382A1 (en) 2015-11-30 2017-06-01 Hartford Fire Insurance Company Processing system for data elements received via source inputs
US20170154026A1 (en) 2015-12-01 2017-06-01 Business Objects Software Ltd. Interaction relationship building and explorer for dashboard
US20170171231A1 (en) 2015-12-11 2017-06-15 Brightpoint Security, Inc. Computer Network Threat Assessment
US20170177641A1 (en) 2015-12-19 2017-06-22 Viktor Charles Von Drakk Method and device for correlating multiple tables in a database environment
US20170192952A1 (en) 2015-12-30 2017-07-06 Sap Se Systems and methods for tracking and modifying actions in an action history
US10775988B2 (en) 2016-01-22 2020-09-15 Johnson Controls Technology Company Building energy management system with ad hoc dashboard
US20170214701A1 (en) 2016-01-24 2017-07-27 Syed Kamran Hasan Computer security based on artificial intelligence
WO2017127850A1 (en) 2016-01-24 2017-07-27 Hasan Syed Kamran Computer security based on artificial intelligence
US20190052665A1 (en) 2016-02-10 2019-02-14 Cortex Insight Limited Security system
US20180357422A1 (en) 2016-02-25 2018-12-13 Sas Institute Inc. Simulated attack generator for testing a cybersecurity system
US20170251013A1 (en) 2016-02-26 2017-08-31 Oracle International Corporation Techniques for discovering and managing security of applications
US20170249461A1 (en) 2016-02-26 2017-08-31 Cylance Inc. Retention and accessibility of data characterizing events on an endpoint computer
US20190158525A1 (en) 2016-02-29 2019-05-23 Palo Alto Networks, Inc. Automatically grouping malware based on artifacts
US20170251002A1 (en) 2016-02-29 2017-08-31 Palo Alto Networks, Inc. Malware analysis platform for threat intelligence made actionable
US20170264588A1 (en) 2016-03-08 2017-09-14 Tanium Inc. System and Method for Performing Event Inquiries in a Network
US20170264589A1 (en) 2016-03-08 2017-09-14 Tanium Inc. System and Method for Performing Event Inquiries in a Network
US20170263092A1 (en) 2016-03-10 2017-09-14 Pinpoint, Inc. Systems and methods for threat monitoring
US20170279835A1 (en) 2016-03-28 2017-09-28 Cisco Technology, Inc. Adaptive capture of packet traces based on user feedback learning
USD804497S1 (en) 2016-04-19 2017-12-05 Minebea Co., Ltd. Display screen with graphical user interface
US20170322959A1 (en) 2016-05-09 2017-11-09 FactorChain Inc. Searchable investigation history for event data store
US20170331816A1 (en) 2016-05-12 2017-11-16 Bank Of America Corporation Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
US20170331817A1 (en) 2016-05-12 2017-11-16 Bank Of America Corporation Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques
US20180060253A1 (en) 2016-05-20 2018-03-01 Faraday&Future Inc. Pairing of input device and display in vehicle infotainment systems
US20170346824A1 (en) 2016-05-31 2017-11-30 Tracker Networks Inc. Methods and systems for mobile device risk management
USD813884S1 (en) * 2016-06-01 2018-03-27 Innovation 360 Group AB Display screen with graphical user interface
US20170359366A1 (en) 2016-06-10 2017-12-14 General Electric Company Threat detection and localization for monitoring nodes of an industrial asset control system
US20170366582A1 (en) 2016-06-21 2017-12-21 International Business Machines Corporation Incident Response Plan based on Indicators of Compromise
US20180007060A1 (en) 2016-06-30 2018-01-04 Amazon Technologies, Inc. Multi-Factor Authentication to Access Services
USD802001S1 (en) 2016-07-08 2017-11-07 Ge Aviation Systems Llc Portion of a display panel with a graphical user interface component for flight operations management
USD840427S1 (en) 2016-07-08 2019-02-12 Ge Aviation Systems Llc Portion of a display panel with a graphical user interface component for flight operations management
USD882583S1 (en) * 2016-07-12 2020-04-28 Google Llc Display screen with graphical user interface
US20180032914A1 (en) 2016-07-26 2018-02-01 Gamalon, Inc. Machine learning data analysis system and method
US20180033279A1 (en) 2016-07-27 2018-02-01 Accenture Global Solutions Limited Providing predictive alerts for workplace safety
USD811425S1 (en) 2016-07-29 2018-02-27 Neurotrack Technologies, Inc. Display screen or portion thereof with graphical user interface
US20180041537A1 (en) 2016-08-02 2018-02-08 Sophos Limited Identifying and remediating phishing security weaknesses
US20180069885A1 (en) 2016-09-06 2018-03-08 Accenture Global Solutions Limited Graph database analysis for network anomaly detection systems
US20180077195A1 (en) 2016-09-12 2018-03-15 Qualcomm Incorporated Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs
US20180077188A1 (en) 2016-09-12 2018-03-15 Qualcomm Incorporated Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs
US10284587B1 (en) 2016-09-14 2019-05-07 Symantec Corporation Systems and methods for responding to electronic security incidents
US10242187B1 (en) 2016-09-14 2019-03-26 Symantec Corporation Systems and methods for providing integrated security management
US20180091559A1 (en) 2016-09-26 2018-03-29 Splunk Inc. Managing the collection of forensic data from endpoint devices
US20190095618A1 (en) 2016-10-24 2019-03-28 Certis Cisco Security Pte Ltd Quantitative unified analytic neural networks
US20180115578A1 (en) 2016-10-26 2018-04-26 Elastic Beam, Inc. Methods and systems for deep learning based api traffic security
US20180115523A1 (en) 2016-10-26 2018-04-26 Elastic Beam, Inc. Methods and systems for api deception environment and api traffic control and security
USD831697S1 (en) * 2016-10-31 2018-10-23 Agile Transformation, Inc. Display screen or portion thereof with icon
US20180124096A1 (en) 2016-10-31 2018-05-03 Armis Security Ltd. Detection of vulnerable devices in wireless networks
US20180129978A1 (en) 2016-11-09 2018-05-10 Gamalon, Inc. Machine learning data analysis system and method
US20180137277A1 (en) 2016-11-15 2018-05-17 General Electric Company Dynamic normalization of monitoring node data for threat detection in industrial asset control system
US20180144110A1 (en) 2016-11-22 2018-05-24 International Business Machines Corporation Multi-input user interaction and behavioral based authentication system for context aware applications
US20180157831A1 (en) 2016-12-06 2018-06-07 General Electric Company Automated attack localization and detection
US20180159877A1 (en) 2016-12-07 2018-06-07 General Electric Company Multi-mode boundary selection for threat detection in industrial asset control system
USD809530S1 (en) 2016-12-20 2018-02-06 Smartorg, Inc. Display screen or portion thereof with an animated graphical user interface
USD808988S1 (en) 2016-12-20 2018-01-30 Abbott Laboratories Display screen with graphical user interface
US20180189697A1 (en) 2016-12-30 2018-07-05 Lookingglass Cyber Solutions, Inc. Methods and apparatus for processing threat metrics to determine a risk of loss due to the compromise of an organization asset
US20180191758A1 (en) 2017-01-03 2018-07-05 General Electric Company Cluster-based decision boundaries for threat detection in industrial asset control system
US20190124104A1 (en) 2017-01-30 2019-04-25 Splunk Inc. Graph-Based Network Anomaly Detection Across Time and Entities
US20180219875A1 (en) 2017-01-31 2018-08-02 Hewlett Packard Enterprise Development Lp Grouping alerts into bundles of alerts
US20180219876A1 (en) 2017-01-31 2018-08-02 Hewlett Packard Enterprise Development Lp Determining contextual information for alerts
US20180219911A1 (en) 2017-01-31 2018-08-02 Hewlett Packard Enterprise Development Lp Responding to alerts
US20180219891A1 (en) 2017-02-02 2018-08-02 Aetna Inc. Individualized cybersecurity risk detection using multiple attributes
US20180232528A1 (en) 2017-02-13 2018-08-16 Protegrity Corporation Sensitive Data Classification
US20180248904A1 (en) 2017-02-24 2018-08-30 LogRhythm Inc. Analytics for processing information system data
US20180248863A1 (en) 2017-02-24 2018-08-30 Fmr Llc Systems and methods for user authentication using pattern-based risk assessment and adjustment
US20180253676A1 (en) 2017-03-01 2018-09-06 Accenture Global Solutions Limited Automatic analysis of a technical capability
US20180260572A1 (en) 2017-03-08 2018-09-13 Wipro Limited Method and device for software risk management within information technology (it) infrastructure
US20180268506A1 (en) 2017-03-15 2018-09-20 Exari Group, Inc. Machine evaluation of contract terms
USD854561S1 (en) 2017-03-17 2019-07-23 Health Management Systems, Inc. Display screen with animated graphical user interface
US20180275845A1 (en) 2017-03-23 2018-09-27 International Business Machines Corporation Dashboard Creation With Popular Patterns and Suggestions Using Analytics
US20180288078A1 (en) 2017-04-03 2018-10-04 Juniper Networks, Inc. Tracking and mitigation of an infected host device
US20180309752A1 (en) 2017-04-20 2018-10-25 Adp, Llc Enhanced security authentication system
USD894944S1 (en) * 2017-04-20 2020-09-01 Palantir Technologies, Inc. Display screen or portion thereof with transitional graphical user interface
USD863338S1 (en) * 2017-04-20 2019-10-15 Palantir Technologies Inc. Display screen or portion thereof with transitional graphical user interface
USD822705S1 (en) * 2017-04-20 2018-07-10 Palantir Technologies, Inc. Display screen or portion thereof with graphical user interface
US20180308026A1 (en) 2017-04-21 2018-10-25 Accenture Global Solutions Limited Identifying risk patterns in a multi-level network structure
US20180316701A1 (en) 2017-04-26 2018-11-01 General Electric Company Threat detection for a fleet of industrial assets
US20180324207A1 (en) 2017-05-05 2018-11-08 Servicenow, Inc. Network security threat intelligence sharing
US20190205511A1 (en) 2017-05-17 2019-07-04 Forescout Technologies, Inc. Account monitoring
US20180337941A1 (en) 2017-05-18 2018-11-22 Qadium, Inc. Correlation-driven threat assessment and remediation
USD866576S1 (en) 2017-06-02 2019-11-12 Sap Se Display screen or portion thereof with graphical user interface
US20180348979A1 (en) 2017-06-02 2018-12-06 Oracle International Corporation Inter-application sharing
US20180359272A1 (en) 2017-06-12 2018-12-13 ARIM Technologies Pte Ltd. Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management
US20180367561A1 (en) 2017-06-14 2018-12-20 International Business Machines Corporation Threat disposition analysis and modeling using supervised machine learning
US20190007447A1 (en) 2017-06-29 2019-01-03 Webroot Inc. Peer Device Protection
US20190019432A1 (en) 2017-07-12 2019-01-17 Electronics And Telecommunications Research Institute Apparatus and method for cyber-crisis response training based on augmented reality
US20190021004A1 (en) 2017-07-13 2019-01-17 Sophos Limited Threat index based wlan security and quality of service
US20190020667A1 (en) 2017-07-14 2019-01-17 Guavus, Inc. Non-rule based security risk detection
US20190028498A1 (en) 2017-07-24 2019-01-24 Sap Se Threat Modeling Tool Using Machine Learning
US20190037081A1 (en) 2017-07-25 2019-01-31 Vail Systems, Inc. Adaptive, multi-modal fraud detection system
US20190068616A1 (en) 2017-08-25 2019-02-28 Ecrime Management Strategies, Inc., d/b/a PhishLabs Security system for detection and mitigation of malicious communications
USD889490S1 (en) 2017-08-29 2020-07-07 3M Innovative Properties Company Display screen with graphical user interface
US20190068620A1 (en) 2017-08-30 2019-02-28 International Business Machines Corporation Detecting malware attacks using extracted behavioral features
US20190104140A1 (en) 2017-09-29 2019-04-04 AO Kaspersky Lab System and method of cloud detection, investigation and elimination of targeted attacks
US20190121977A1 (en) 2017-10-19 2019-04-25 AO Kaspersky Lab System and method of detecting a malicious file
USD859441S1 (en) 2017-11-09 2019-09-10 Veriphy Analytics, Inc. Display screen with graphical user interface
US20190163914A1 (en) 2017-11-30 2019-05-30 Bank Of America Corporation System for information security threat assessment and event triggering
USD857749S1 (en) 2017-12-01 2019-08-27 Agco Corporation Display screen or portion thereof with graphical user interface
US20190188389A1 (en) 2017-12-14 2019-06-20 Forescout Technologies, Inc. Contextual risk monitoring
US20190199739A1 (en) 2017-12-22 2019-06-27 Cisco Technology, Inc. Leveraging endpoint and network environment inferences for malware traffic classification
US20190199744A1 (en) 2017-12-22 2019-06-27 Kpmg Llp System and method for identifying cybersecurity threats
US20190254634A1 (en) * 2017-12-27 2019-08-22 Canon Medical Systems Corporation Analysis apparatus
US20190207966A1 (en) 2017-12-28 2019-07-04 Fireeye, Inc. Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data Store
US20190207967A1 (en) 2017-12-28 2019-07-04 Fireeye, Inc. Platform and method for retroactive reclassification employing a cybersecurity-based global data store
US20190207953A1 (en) 2017-12-29 2019-07-04 Square, Inc. Logical Validation of Devices Against Fraud and Tampering
US20190222596A1 (en) 2018-01-18 2019-07-18 General Electric Company Reliable cyber-threat detection in rapidly changing environments
US20190230099A1 (en) 2018-01-19 2019-07-25 General Electric Company Learning method and system for separating independent and dependent attacks
US20190230098A1 (en) 2018-01-22 2019-07-25 T-Mobile Usa, Inc. Indicator of compromise calculation system
USD845344S1 (en) 2018-01-30 2019-04-09 Citrix Systems, Inc. Display screen or portion thereof with icon group
US20190266297A1 (en) 2018-02-26 2019-08-29 Noblis, Inc. Multi-layer cyber-physical systems simulation platform
US20200243178A1 (en) 2018-04-10 2020-07-30 Mobile Innovations Llc Advanced health monitoring system and method
USD905733S1 (en) 2018-04-25 2020-12-22 Adp, Llc Display screen with an animated graphical user interface
US20200037919A1 (en) * 2018-08-06 2020-02-06 Siemens Healthcare Gmbh Protocol parameter selection method, apparatus and magnetic resonance imaging system
US20200110803A1 (en) 2018-10-08 2020-04-09 Tableau Software, Inc. Determining Levels of Detail for Data Visualizations Using Natural Language Constructs
USD905704S1 (en) 2019-03-25 2020-12-22 Magnifi Llc Display screen or portion thereof with a graphical user interface

Non-Patent Citations (58)

* Cited by examiner, † Cited by third party
Title
"New ReliaQuest GreyMatter Demos Fuel ReliaQuest's Momentum at Black Hat USA" Aug. 13, 2019, posted at reliaquest.com, [site visited Dec. 22, 2020]. https://www.reliaquest.com/blog/new-greymatter-demos-fuel-reliaquests-momentum-at-black-hat-usa (Year: 2019). *
"Radar Charts in Tableau—part 1" Aug. 5, 2013, posted at theinformationlab.co.uk, [site visited Dec. 22, 2020]. https://www.theinformationlab.co.uk/2013/08/05/radar-charts-in-tableau (Year: 2013). *
Detken, Kai-Oliver et al., "SIEM Approach for a Higher Level of IT Security in Enterprise Networks", The 8th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, Technology and Applications, Sep. 24-26, 2015, Warsaw, Poland, 6 pages.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,488 dated Jan. 24, 2020.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,626 dated Nov. 26, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,671 dated Dec. 11, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,689 dated Dec. 10, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,711 dated Jan. 31, 2020.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,733 dated Dec. 11, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,762 dated Dec. 11, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,772 dated Nov. 26, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,791 dated Jan. 10, 2020.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,791 dated Jan. 27, 2020.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,801 dated Nov. 21, 2019.
Final Office Action issued in counterpart U.S. Appl. No. 16/432,818 filed Jan. 13, 2020.
Final Office Action issued in counterpart U.S. Appl. No. 16/433,006 dated Jan. 10, 2020.
Final Office Action issued in related U.S. Appl. No. 29/693,796 dated Dec. 30, 2020.
Final Office Action issued in related U.S. Appl. No. 29/693,948 dated Dec. 30, 2020.
Final Office Action issued in related U.S. Appl. No. 29/693,951 dated Dec. 30, 2020.
Final Office Action issued in related U.S. Appl. No. 29/693,957 dated Dec. 30, 2020.
Goldstein et al. "Enhancing Security Event Management Systems with Unsupervised Anomaly Detection." in ICPRAM, pp. 530-538, 2013.
International Search Report issued in International Application No. PCT/US2019/035704 dated Oct. 8, 2019.
International Search Report issued in International Application No. PCT/US2019/035715 dated Sep. 4, 2019.
International Search Report issued in International Application No. PCT/US2019/035720 dated Aug. 27, 2019.
International Search Report issued in International Application No. PCT/US2019/035734 dated Aug. 16, 2019.
International Search Report issued in International Application No. PCT/US2019/035738 dated Aug. 16, 2019.
International Search Report issued in International Application No. PCT/US2019/035745 dated Aug. 16, 2019.
International Search Report issued in International Appliction No. PCT/US2019/035748 dated Aug. 26, 2019.
Kotento, I. et al. "The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems" Sep. 2013 International Conference on Availability, Reliability and Security, pp. 638-645.
Murray, Alan, "Howto Create a Radar Chart in Excel" Jan. 30, 2019, posted at howtogeek.com, [site visited Dec. 22, 2020]. https://www.howtogeek.com/402016/how-to-create-a-radar-chart-in-excel (Year: 2019). *
Non-Final Office Aciton issued in related U.S. Appl. No. 29/693,957 dated Aug. 12, 2020.
Non-Final Office Aciton issued in U.S. Appl. No. 16/432,733 dated Aug. 8, 2019.
Non-Final Office Action issued in counterpart U.S. Appl. No. 16/433,032 dated Nov. 18, 2019.
Non-Final Office Action issued in related U.S. Appl. No. 29/693,796 dated Aug. 10, 2020.
Non-Final Office Action issued in related U.S. Appl. No. 29/693,948 dated Aug. 10, 2020.
Non-Final Office Action issued in related U.S. Appl. No. 29/693,951 dated Aug. 12, 2020.
Non-Final Office Action issued in U.S. Appl. No. 16/432,488 dated Aug. 22, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,556 dated Sep. 30, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,614 dated Sep. 3, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,626 dated Aug. 8, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,649 dated Aug. 21, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,671 dated Aug. 21, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,689 dated Aug. 6, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,711 dated Aug. 29, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,751 dated Aug. 12, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,762 dated Aug. 8, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,772 dated Jul. 23, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,780 dated Oct. 18, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,791 dated Jul. 31, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,801 dated Aug. 1, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/432,818 dated Aug. 21, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/433,006 dated Sep. 5, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/433,022 dated Aug. 22, 2019.
Non-Final Office Action issued in U.S. Appl. No. 16/433,053 dated Aug. 22, 2019.
Notice of Allowance issued in counterpart U.S. Appl. No. 16/432,614 dated Jan. 10, 2020.
Pavlik, J. et al., "Security information and event management in the cloud computing infrastructure", 15th IEEE International Symposium on Computational Intelligence and Informatics, Nov. 19-21, 2014, Budapest, Hungary, 6 pages.
Shabtai, A. et al., "Detection of Malicious Code by Applying Machine Learning Classifers on Static Features: A State-of-the-art survey", Information Security Technical Report l4 (2009), pp. 16-29.
Warnecke, M. P., Master's Thesis, "Examining the Return on Investment of a Security Information and Event Management Solution in a Notional Department of Defense Network Environment", Naval Postgraduate School, Monterey, CA, Jun. 2013, 107 pages.

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USD936697S1 (en) * 2017-09-21 2021-11-23 Yuri Hosokuni Display screen with a graphical interface for an electronic game
USD940741S1 (en) * 2018-04-09 2022-01-11 Covestro Llc Display screen portion with graphical user interface
USD969819S1 (en) * 2019-09-17 2022-11-15 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD947890S1 (en) * 2020-05-13 2022-04-05 Aixis, Inc. Graphical user interface for a display screen or portion thereof
USD943000S1 (en) * 2020-05-20 2022-02-08 Frank Gunnar Vogelbruch Display screen or portion thereof with graphical user interface
USD1003928S1 (en) * 2021-04-29 2023-11-07 Coretech System Co., Ltd. Display screen or portion thereof with graphical user interface

Similar Documents

Publication Publication Date Title
USD986274S1 (en) Display screen or portion thereof with a graphical user interface
USD896264S1 (en) Display screen or portion thereof with a graphical user interface
USD891456S1 (en) Display screen or portion thereof with a graphical user interface
USD902951S1 (en) Display screen or portion thereof with a graphical user interface
USD893532S1 (en) Display screen or portion thereof with graphical user interface
USD926200S1 (en) Display screen or portion thereof with a graphical user interface
USD906363S1 (en) Display screen or portion thereof with a graphical user interface
USD926782S1 (en) Display screen or portion thereof with a graphical user interface
USD941334S1 (en) Display screen or portion thereof with graphical user interface
USD865804S1 (en) Display screen with graphical user interface
USD922418S1 (en) Display screen or portion thereof with graphical user interface
USD949165S1 (en) Portion of a display screen with a graphical user interface
USD892825S1 (en) Display screen or portion thereof with graphical user interface
USD926809S1 (en) Display screen or portion thereof with a graphical user interface
USD969854S1 (en) Portion of a display screen with a graphical user interface
USD926810S1 (en) Display screen or portion thereof with a graphical user interface
USD910059S1 (en) Display screen or portion thereof with a graphical user interface
USD937858S1 (en) Display screen or portion thereof with graphical user interface
USD960170S1 (en) Display screen or portion thereof with a graphical user interface
USD969819S1 (en) Display screen or portion thereof with a graphical user interface
USD891445S1 (en) Display screen or portion thereof with graphical user interface
USD929430S1 (en) Display screen or portion thereof with a graphical user interface
USD932504S1 (en) Display screen or portion thereof with a graphical user interface
USD936073S1 (en) Display screen or portion thereof with a graphical user interface
USD866571S1 (en) Display screen or portion thereof with graphical user interface

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY