| US9330119B2 (en) | 2013-04-11 | 2016-05-03 | Oracle International Corporation | Knowledge intensive data management system for business process and case management |
| CN107211011A (en) | 2014-11-25 | 2017-09-26 | 恩西洛有限公司 | System and method for Malicious Code Detection |
| US20160225652A1 (en) | 2015-02-03 | 2016-08-04 | Applied Materials, Inc. | Low temperature chuck for plasma processing systems |
| US10594731B2 (en)* | 2016-03-24 | 2020-03-17 | Snowflake Inc. | Systems, methods, and devices for securely managing network connections |
| WO2017175158A1 (en)* | 2016-04-06 | 2017-10-12 | Karamba Security | Reporting and processing controller security information |
| WO2017175157A1 (en)* | 2016-04-06 | 2017-10-12 | Karamba Security | Secure controller operation and malware prevention |
| US10467123B2 (en) | 2016-05-09 | 2019-11-05 | Oracle International Corporation | Compression techniques for encoding stack trace information |
| US10348755B1 (en)* | 2016-06-30 | 2019-07-09 | Symantec Corporation | Systems and methods for detecting network security deficiencies on endpoint devices |
| CN106101130B (en)* | 2016-07-08 | 2019-05-17 | 北京易华录信息技术股份有限公司 | A kind of network malicious data detection method, apparatus and system |
| JP2018019207A (en)* | 2016-07-27 | 2018-02-01 | 富士ゼロックス株式会社 | Cooperation management device and communication system |
| RU2634174C1 (en)* | 2016-10-10 | 2017-10-24 | Акционерное общество "Лаборатория Касперского" | System and method of bank transaction execution |
| US10778722B2 (en)* | 2016-11-08 | 2020-09-15 | Massachusetts Institute Of Technology | Dynamic flow system |
| US10169576B2 (en) | 2016-11-15 | 2019-01-01 | International Business Machines Corporation | Malware collusion detection |
| US10298605B2 (en)* | 2016-11-16 | 2019-05-21 | Red Hat, Inc. | Multi-tenant cloud security threat detection |
| TWI617940B (en)* | 2016-12-01 | 2018-03-11 | 財團法人資訊工業策進會 | Data protection method and data protection system |
| US10325108B2 (en)* | 2016-12-30 | 2019-06-18 | Intel Corporation | Method and apparatus for range based checkpoints in a storage device |
| CN106790292A (en)* | 2017-03-13 | 2017-05-31 | 摩贝(上海)生物科技有限公司 | The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis |
| CN108664519B (en)* | 2017-04-01 | 2021-03-30 | 北京京东尚科信息技术有限公司 | Business rule management method and device, electronic equipment and storage medium |
| TWI648650B (en)* | 2017-07-20 | 2019-01-21 | 中華電信股份有限公司 | Gateway device, detection method of malicious domain and host host, and non-transitory computer readable media |
| US11102219B2 (en)* | 2017-08-24 | 2021-08-24 | At&T Intellectual Property I, L.P. | Systems and methods for dynamic analysis and resolution of network anomalies |
| TWI650671B (en)* | 2017-10-17 | 2019-02-11 | 中華電信股份有限公司 | Method and apparatus for analysing malware |
| US10990975B2 (en)* | 2017-11-08 | 2021-04-27 | Paypal, Inc. | Detecting malware by monitoring client-side memory stacks |
| US11017084B2 (en)* | 2017-11-21 | 2021-05-25 | International Business Machines Corporation | Detection of malicious code fragments via data-flow isolation |
| US12058160B1 (en) | 2017-11-22 | 2024-08-06 | Lacework, Inc. | Generating computer code for remediating detected events |
| US11785104B2 (en) | 2017-11-27 | 2023-10-10 | Lacework, Inc. | Learning from similar cloud deployments |
| US11973784B1 (en) | 2017-11-27 | 2024-04-30 | Lacework, Inc. | Natural language interface for an anomaly detection framework |
| US12368745B1 (en) | 2017-11-27 | 2025-07-22 | Fortinet, Inc. | Using natural language queries to conduct an investigation of a monitored system |
| US12355793B1 (en) | 2017-11-27 | 2025-07-08 | Fortinet, Inc. | Guided interactions with a natural language interface |
| US12284197B1 (en) | 2017-11-27 | 2025-04-22 | Fortinet, Inc. | Reducing amounts of data ingested into a data warehouse |
| US12401669B1 (en) | 2017-11-27 | 2025-08-26 | Fortinet, Inc. | Container vulnerability management by a data platform |
| US12355626B1 (en) | 2017-11-27 | 2025-07-08 | Fortinet, Inc. | Tracking infrastructure as code (IaC) asset lifecycles |
| US12309236B1 (en) | 2017-11-27 | 2025-05-20 | Fortinet, Inc. | Analyzing log data from multiple sources across computing environments |
| US12309182B1 (en) | 2017-11-27 | 2025-05-20 | Fortinet, Inc. | Customer onboarding and integration with anomaly detection systems |
| US12407701B1 (en) | 2017-11-27 | 2025-09-02 | Fortinet, Inc. | Community-based generation of policies for a data platform |
| US11765249B2 (en) | 2017-11-27 | 2023-09-19 | Lacework, Inc. | Facilitating developer efficiency and application quality |
| US12095796B1 (en) | 2017-11-27 | 2024-09-17 | Lacework, Inc. | Instruction-level threat assessment |
| US12126643B1 (en) | 2017-11-27 | 2024-10-22 | Fortinet, Inc. | Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment |
| US11792284B1 (en) | 2017-11-27 | 2023-10-17 | Lacework, Inc. | Using data transformations for monitoring a cloud compute environment |
| US11894984B2 (en) | 2017-11-27 | 2024-02-06 | Lacework, Inc. | Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments |
| US12348545B1 (en) | 2017-11-27 | 2025-07-01 | Fortinet, Inc. | Customizable generative artificial intelligence (‘AI’) assistant |
| US20220232024A1 (en) | 2017-11-27 | 2022-07-21 | Lacework, Inc. | Detecting deviations from typical user behavior |
| US12309185B1 (en) | 2017-11-27 | 2025-05-20 | Fortinet, Inc. | Architecture for a generative artificial intelligence (AI)-enabled assistant |
| US12323449B1 (en) | 2017-11-27 | 2025-06-03 | Fortinet, Inc. | Code analysis feedback loop for code created using generative artificial intelligence (‘AI’) |
| US12381901B1 (en) | 2017-11-27 | 2025-08-05 | Fortinet, Inc. | Unified storage for event streams in an anomaly detection framework |
| US12418555B1 (en) | 2017-11-27 | 2025-09-16 | Fortinet Inc. | Guiding query creation for a generative artificial intelligence (AI)-enabled assistant |
| US12335348B1 (en) | 2017-11-27 | 2025-06-17 | Fortinet, Inc. | Optimizing data warehouse utilization by a data ingestion pipeline |
| US12130878B1 (en) | 2017-11-27 | 2024-10-29 | Fortinet, Inc. | Deduplication of monitored communications data in a cloud environment |
| US11741238B2 (en) | 2017-11-27 | 2023-08-29 | Lacework, Inc. | Dynamically generating monitoring tools for software applications |
| US10614071B1 (en) | 2017-11-27 | 2020-04-07 | Lacework Inc. | Extensible query interface for dynamic data compositions and filter applications |
| US12267345B1 (en) | 2017-11-27 | 2025-04-01 | Fortinet, Inc. | Using user feedback for attack path analysis in an anomaly detection framework |
| US20220232025A1 (en) | 2017-11-27 | 2022-07-21 | Lacework, Inc. | Detecting anomalous behavior of a device |
| US11770398B1 (en) | 2017-11-27 | 2023-09-26 | Lacework, Inc. | Guided anomaly detection framework |
| US20220224707A1 (en) | 2017-11-27 | 2022-07-14 | Lacework, Inc. | Establishing a location profile for a user device |
| US12261866B1 (en) | 2017-11-27 | 2025-03-25 | Fortinet, Inc. | Time series anomaly detection |
| US11849000B2 (en) | 2017-11-27 | 2023-12-19 | Lacework, Inc. | Using real-time monitoring to inform static analysis |
| US11979422B1 (en) | 2017-11-27 | 2024-05-07 | Lacework, Inc. | Elastic privileges in a secure access service edge |
| US11818156B1 (en) | 2017-11-27 | 2023-11-14 | Lacework, Inc. | Data lake-enabled security platform |
| US12407702B1 (en) | 2017-11-27 | 2025-09-02 | Fortinet, Inc. | Gathering and presenting information related to common vulnerabilities and exposures |
| US12034754B2 (en) | 2017-11-27 | 2024-07-09 | Lacework, Inc. | Using static analysis for vulnerability detection |
| CN108846287A (en)* | 2018-06-26 | 2018-11-20 | 北京奇安信科技有限公司 | A kind of method and device of detection loophole attack |
| US20190347408A1 (en)* | 2018-05-11 | 2019-11-14 | Npx Usa, Inc. | Process identifier transition monitoring and assessment |
| US10997289B2 (en)* | 2018-05-21 | 2021-05-04 | International Business Machines Corporation | Identifying malicious executing code of an enclave |
| US11438357B2 (en) | 2018-06-22 | 2022-09-06 | Senseon Tech Ltd | Endpoint network sensor and related cybersecurity infrastructure |
| GB201810294D0 (en)* | 2018-06-22 | 2018-08-08 | Senseon Tech Ltd | Cybe defence system |
| GB2602254B (en) | 2020-12-15 | 2023-04-05 | Senseon Tech Ltd | Network traffic monitoring |
| GB201812171D0 (en) | 2018-07-26 | 2018-09-12 | Senseon Tech Ltd | Cyber defence system |
| CN110020530B (en)* | 2018-12-24 | 2023-07-04 | 中国银联股份有限公司 | Method for determining security of application program in running time and device thereof |
| US11108790B1 (en)* | 2019-04-30 | 2021-08-31 | Rapid7, Inc. | Attack signature generation |
| US11538038B2 (en)* | 2019-05-31 | 2022-12-27 | Paypal, Inc. | Systems and methods for remote detection of computer device attributes |
| US11178178B2 (en) | 2019-07-29 | 2021-11-16 | Material Security Inc. | Secure communications service for intercepting suspicious messages and performing backchannel verification thereon |
| CN110532768A (en)* | 2019-08-21 | 2019-12-03 | 东软医疗系统股份有限公司 | System safety encryption and device |
| US11463443B2 (en) | 2019-09-19 | 2022-10-04 | Bank Of America Corporation | Real-time management of access controls |
| GB201915265D0 (en) | 2019-10-22 | 2019-12-04 | Senseon Tech Ltd | Anomaly detection |
| US11722520B2 (en)* | 2019-11-21 | 2023-08-08 | Royal Bank Of Canada | System and method for detecting phishing events |
| TWI747093B (en)* | 2019-12-03 | 2021-11-21 | 中華電信股份有限公司 | Method and system for verifying malicious encrypted connection |
| US11201955B1 (en) | 2019-12-23 | 2021-12-14 | Lacework Inc. | Agent networking in a containerized environment |
| US11256759B1 (en) | 2019-12-23 | 2022-02-22 | Lacework Inc. | Hierarchical graph analysis |
| US11627113B2 (en) | 2020-04-01 | 2023-04-11 | The Westem Union Company | Network-based authentication rule cleaning and optimization |
| US11146472B1 (en) | 2020-07-21 | 2021-10-12 | Bank Of America Corporation | Artificial intelligence-based lateral movement identification tool |
| CN112488246A (en)* | 2020-08-06 | 2021-03-12 | 蔡淦祺 | Information processing method and system based on network live broadcast and online e-commerce delivery |
| CN114257386B (en)* | 2020-09-10 | 2023-03-21 | 华为技术有限公司 | Detection model training method, system, device and storage medium |
| US11386197B1 (en) | 2021-01-11 | 2022-07-12 | Bank Of America Corporation | System and method for securing a network against malicious communications through peer-based cooperation |
| US11641366B2 (en) | 2021-01-11 | 2023-05-02 | Bank Of America Corporation | Centralized tool for identifying and blocking malicious communications transmitted within a network |
| US11989188B2 (en) | 2021-08-25 | 2024-05-21 | Bank Of America Corporation | Aggregating access to third party data sources and intelligently managing access through request quotas |
| US20230099241A1 (en)* | 2021-09-27 | 2023-03-30 | Bank Of America Corporation | Systems and methods for identifying malicious events using deviations in user activity for enhanced network and data security |
| SE2151287A1 (en)* | 2021-10-21 | 2023-04-22 | Assa Abloy Ab | Transmitting data for detecting suspicious activity by an electronic device |
| US12335303B2 (en)* | 2023-01-03 | 2025-06-17 | Bank Of America Corporation | System and method for detecting and countering malicious code |
| GB2626375A (en)* | 2023-01-23 | 2024-07-24 | Withsecure Corp | An arrangement and a method of threat detection in a computing device or a computer network |
| US12437060B2 (en) | 2023-10-12 | 2025-10-07 | International Business Machines Corporation | Using hierarchical reinforcement learning (HRL) to identify application programming interfaces (API) vulnerabilities |