| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SG10201507051WASG10201507051WA (en) | 2015-09-03 | 2015-09-03 | System and method for high frequency heuristic data acquisition and analytics of information security events |
| TW105102185ATWI720963B (en) | 2015-09-03 | 2016-01-25 | System and method for high frequency heuristic data acquisition and analytics of information security events |
| EP16842424.0AEP3345115A4 (en) | 2015-09-03 | 2016-03-24 | SYSTEM AND METHOD FOR ACQUIRING DATA AND HIGH-FREQUENCY HURISTIC ANALYTICAL PROCESSING OF INFORMATION SECURITY EVENTS |
| CN201680061648.7ACN108351940B (en) | 2015-09-03 | 2016-03-24 | System and method for high frequency heuristic data acquisition and analysis of information security events |
| MYPI2018700803AMY200245A (en) | 2015-09-03 | 2016-03-24 | System and method for high frequency heuristic data acquisition and analytics of information security events |
| US15/757,274US10740458B2 (en) | 2015-09-03 | 2016-03-24 | System and method for high frequency heuristic data acquisition and analytics of information security events |
| AU2016318066AAU2016318066B2 (en) | 2015-09-03 | 2016-03-24 | System and method for high frequency heuristic data acquisition and analytics of information security events |
| HK18109482.6AHK1250180A1 (en) | 2015-09-03 | 2016-03-24 | System and method for high frequency heuristic data acquisition and analytics of information security events |
| PCT/SG2016/050137WO2017039532A1 (en) | 2015-09-03 | 2016-03-24 | System and method for high frequency heuristic data acquisition and analytics of information security events |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SG10201507051WASG10201507051WA (en) | 2015-09-03 | 2015-09-03 | System and method for high frequency heuristic data acquisition and analytics of information security events |
| Publication Number | Publication Date |
|---|---|
| SG10201507051WAtrue SG10201507051WA (en) | 2017-04-27 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| SG10201507051WASG10201507051WA (en) | 2015-09-03 | 2015-09-03 | System and method for high frequency heuristic data acquisition and analytics of information security events |
| Country | Link |
|---|---|
| US (1) | US10740458B2 (en) |
| EP (1) | EP3345115A4 (en) |
| CN (1) | CN108351940B (en) |
| AU (1) | AU2016318066B2 (en) |
| HK (1) | HK1250180A1 (en) |
| MY (1) | MY200245A (en) |
| SG (1) | SG10201507051WA (en) |
| TW (1) | TWI720963B (en) |
| WO (1) | WO2017039532A1 (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11435269B1 (en)* | 2019-01-03 | 2022-09-06 | Honeywell Federal Manufacturings Technologies, Llc | In situ data acquisition and real-time analysis system |
| US10901375B2 (en) | 2019-01-31 | 2021-01-26 | Morgan Stanley Services Group Inc. | Chaotic system anomaly response by artificial intelligence |
| EP4087216B1 (en)* | 2021-05-03 | 2024-10-02 | Aizoon S.r.l. | Method for detecting systematic communications in a communications network, corresponding device, and computer program product |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| AU4950899A (en)* | 1998-07-31 | 2000-02-21 | Cet Technologies Pte Ltd | Automatic freeway incident detection system using artificial neural networks andgenetic algorithms |
| US20020161907A1 (en)* | 2001-04-25 | 2002-10-31 | Avery Moon | Adaptive multi-protocol communications system |
| CN1223941C (en)* | 2003-06-18 | 2005-10-19 | 北京首信股份有限公司 | Hierarchial invasion detection system based on related characteristic cluster |
| CA2532909A1 (en)* | 2003-08-21 | 2005-03-31 | Microsoft Corporation | Systems and methods for interfacing application programs with an item-based storage platform |
| US7287278B2 (en)* | 2003-08-29 | 2007-10-23 | Trend Micro, Inc. | Innoculation of computing devices against a selected computer virus |
| CN100359495C (en)* | 2003-09-04 | 2008-01-02 | 上海格尔软件股份有限公司 | Information system auditing method based on data storehouse |
| US20180146879A9 (en)* | 2004-08-30 | 2018-05-31 | Kalford C. Fadem | Biopotential Waveform Data Fusion Analysis and Classification Method |
| JP2008511934A (en)* | 2004-08-31 | 2008-04-17 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Architecture for enterprise data integration systems |
| TWI252976B (en)* | 2004-12-27 | 2006-04-11 | Ind Tech Res Inst | Detecting method and architecture thereof for malicious codes |
| WO2008011576A2 (en)* | 2006-07-20 | 2008-01-24 | Breach Security, Inc. | System and method of securing web applications across an enterprise |
| TWI331868B (en)* | 2007-06-11 | 2010-10-11 | Univ Nat Pingtung Sci & Tech | Detecting method of network invasion |
| TW201001225A (en)* | 2008-06-24 | 2010-01-01 | Univ Shu Te | Method of detecting intrusion of network hacker |
| CN101923669A (en)* | 2008-07-18 | 2010-12-22 | 史迪芬·凯斯 | Smart Adaptive Design |
| US8949987B2 (en)* | 2010-01-06 | 2015-02-03 | Alcatel Lucent | Computer security process monitor |
| EP2603996A1 (en)* | 2010-08-11 | 2013-06-19 | Rick L. Orsini | Systems and methods for secure multi-tenant data storage |
| US8635682B2 (en)* | 2010-11-24 | 2014-01-21 | Oracle International Corporation | Propagating security identity information to components of a composite application |
| US8621618B1 (en) | 2011-02-07 | 2013-12-31 | Dell Products, Lp | System and method for assessing whether a communication contains an attack |
| US9292682B2 (en) | 2011-05-09 | 2016-03-22 | International Business Machines Corporation | Accessing a second web page from a dispersed storage network memory based on a first web page selection |
| WO2013063474A1 (en)* | 2011-10-28 | 2013-05-02 | Scargo, Inc. | Security policy deployment and enforcement system for the detection and control of polymorphic and targeted malware |
| US20140041032A1 (en)* | 2012-08-01 | 2014-02-06 | Opera Solutions, Llc | System and Method for Detecting Network Intrusions Using Statistical Models and a Generalized Likelihood Ratio Test |
| US9106681B2 (en)* | 2012-12-17 | 2015-08-11 | Hewlett-Packard Development Company, L.P. | Reputation of network address |
| WO2014128253A1 (en)* | 2013-02-22 | 2014-08-28 | Adaptive Mobile Security Limited | System and method for embedded mobile (em)/machine to machine (m2m) security, pattern detection, mitigation |
| US8887285B2 (en)* | 2013-03-14 | 2014-11-11 | Resurgo, Llc | Heterogeneous sensors for network defense |
| US20160174420A1 (en)* | 2013-03-15 | 2016-06-16 | Paul Douglas Cochrane | Formed channels providing electromagnetic shielding in electronics |
| CN103973702A (en)* | 2014-05-23 | 2014-08-06 | 浪潮电子信息产业股份有限公司 | Information security defense rule intelligent deployment method based on improved particle swarm optimization |
| US9699205B2 (en)* | 2015-08-31 | 2017-07-04 | Splunk Inc. | Network security system |
| Publication number | Publication date |
|---|---|
| US20180276376A1 (en) | 2018-09-27 |
| AU2016318066A1 (en) | 2018-03-22 |
| HK1250180A1 (en) | 2018-11-30 |
| AU2016318066B2 (en) | 2021-03-25 |
| WO2017039532A1 (en) | 2017-03-09 |
| MY200245A (en) | 2023-12-15 |
| TW201710943A (en) | 2017-03-16 |
| TWI720963B (en) | 2021-03-11 |
| CN108351940A (en) | 2018-07-31 |
| EP3345115A4 (en) | 2019-02-06 |
| CN108351940B (en) | 2021-05-07 |
| US10740458B2 (en) | 2020-08-11 |
| EP3345115A1 (en) | 2018-07-11 |
| Publication | Publication Date | Title |
|---|---|---|
| EP3320440A4 (en) | Secure data management system and method | |
| EP3315179A4 (en) | Smart ball-ground system and data acquisition method thereof | |
| SG11201608945WA (en) | Secure data interaction method and system | |
| EP2972984A4 (en) | Method and system for obtaining and using identification information | |
| EP2974115A4 (en) | System and method of secure remote authentication of acquired data | |
| EP3355189A4 (en) | Data synchronization method and system | |
| GB201404337D0 (en) | System and method for data entity identification and analysi s of maintenance data | |
| EP3074926A4 (en) | Method and system for exacting face features from data of face images | |
| SG10201508390PA (en) | Data security system and method for operation thereof | |
| EP3078011A4 (en) | Asset information system and method of using the same | |
| EP3309740A4 (en) | Management method and management server for using plurality of sim cards | |
| GB201414302D0 (en) | Data security system and method | |
| GB201319056D0 (en) | A method and a system for distributed processing of data records | |
| GB201621895D0 (en) | System and method for providing contextual analytics data | |
| SG11202003580XA (en) | System and method for data management | |
| SG11201701227VA (en) | System and method for management of payee information | |
| SG10201505580VA (en) | Method And System For Generating Map Data | |
| GB201501245D0 (en) | Method and system for generalising topographical map data | |
| GB201503114D0 (en) | Information system and method | |
| GB2573704B (en) | Information linking system and method of operation thereof | |
| GB2545390B (en) | Method and system for generating geophysical data | |
| ZA201800502B (en) | Preprinting method and system of secured information for gaming system | |
| GB201619511D0 (en) | Systems and methods for flexibly securing card data | |
| SG10201507051WA (en) | System and method for high frequency heuristic data acquisition and analytics of information security events | |
| EP3364409A4 (en) | Information management system and information management method |