2023
|
Invention
|
Clustering analysis for deduplication of training set samples for machine learning based computer... |
2022
|
G/S
|
Recorded and downloadable computer software for providing cyber-security, endpoint security and d... |
|
G/S
|
Recorded and downloadable computer software for providing
cyber-security, endpoint security and ... |
|
G/S
|
Technology consultation in the field of cybersecurity; Design and development of computer softwar... |
|
G/S
|
Providing online non-downloadable software for use in
preventing unauthorized access to computer... |
|
G/S
|
Endpoint detection and response software. Providing online non-downloadable endpoint detection an... |
|
G/S
|
Providing online non-downloadable software for use in preventing unauthorized access to computer ... |
2021
|
Invention
|
Methods and systems for fingerprinting malicious behavior. Methods and systems for fingerprinting... |
|
Invention
|
Methods and systems for training a neural network based on impure data.
Methods and systems for ... |
|
Invention
|
Computer user authentication using machine learning. Systems and methods are described herein for... |
|
Invention
|
Methods for converting hierarchical data.
Systems, methods, and software can be used for securin... |
|
Invention
|
Clustering software codes in scalable manner. Systems, methods, and software can be used to clust... |
2020
|
Invention
|
Statistical data fingerprinting and tracing data similarity of documents. A method and computing ... |
|
Invention
|
Machine learning model for analysis of instruction sequences. A system is provided for classifyin... |
|
Invention
|
Prevention of hash-based api importing. Hash-based application programming interface (API) import... |
|
Invention
|
Machine learning model score obfuscation using step function, position-dependent noise. An artefa... |
|
Invention
|
Bayesian continuous user authentication. Bayesian continuous user authentication can be obtained ... |
|
Invention
|
Memory space protection. Executable memory space is protected by receiving, from a process, a req... |
|
Invention
|
Endpoint detection and response system with endpoint-based artifact storage. Each of a plurality ... |
|
Invention
|
Centroid for improving machine learning classification and info retrieval. Centroids are used for... |
|
Invention
|
Communications bus signal fingerprinting. Systems are provided herein for communications bus sign... |
|
Invention
|
Protecting devices from malicious files based on n-gram processing of sequential data.
Under one... |
|
Invention
|
Detecting malware with deep generative models. Features are extracted from an artifact so that a ... |
|
Invention
|
Endpoint detection and response utilizing machine learning. A plurality of events associated with... |
|
Invention
|
Machine learning model for malware dynamic analysis. In some implementations there may be provide... |
|
Invention
|
Password-less software system user authentication. Data is received as part of an authentication ... |
|
Invention
|
Machine learning model score obfuscation using step-function, position-dependent noise. An artefa... |
|
Invention
|
System abnormality detection using signal fingerprinting. Systems, methods, and devices are descr... |
|
Invention
|
Container file analysis using machine learning model. A system is provided for training a machine... |
|
Invention
|
Projected vector modification as mitigation for machine learning model string stuffing. An artifa... |
|
Invention
|
Malware detection. In one respect, there is provided a system for training a neural network adapt... |
|
Invention
|
Deployment of machine learning models for discernment of threats. A mismatch between model-based ... |
|
Invention
|
Machine learning classification using markov modeling. Systems, methods, and articles of manufact... |
|
Invention
|
Detection of malware using feature hashing. Data is analyzed using feature hashing to detect malw... |
|
Invention
|
Projected vector overflow penalty as mitigation for machine learning model string stuffing. An ar... |
|
Invention
|
Indicator centroids for malware handling. An artifact is received and features are extracted ther... |
2019
|
Invention
|
Training a machine learning model for container file analysis. In one respect, there is provided ... |
|
Invention
|
Anomaly based malware detection. In one respect, there is provided a system for training a neural... |
|
Invention
|
Shellcode detection. Identifying shellcode in a sequence of instructions by identifying a first i... |
|
G/S
|
Consulting services in the field of implementation of computer hardware for preventing unauthoriz... |
|
Invention
|
Avoidance of malicious content in nested files. A nested file having a primary file and at least ... |
|
Invention
|
Advanced malware classification. In one respect, there is provided a system for classifying malwa... |
|
Invention
|
Icon based malware detection. In one respect, there is provided a system for training a neural ne... |
|
Invention
|
Retention and accessibility of data characterizing events on an endpoint computer. An endpoint co... |
|
Invention
|
Machine learning model score obfuscation using multiple classifiers. An artefact is received. The... |
|
Invention
|
Machine learning model score obfuscation using time-based score oscillations. An artefact is rece... |
|
Invention
|
Machine learning model score obfuscation using coordinated interleaving. An artefact is received.... |
|
Invention
|
Machine learning model score obfuscation using vector modification techniques. An artefact is rec... |
|
G/S
|
providing online non-downloadable software for use in preventing unauthorized access to computer ... |
2018
|
Invention
|
Artefact classification using xenospace centroids. An artefact is received and parsed into a plur... |
|
Invention
|
Verifying user identity through human / computer interaction. An identity of a user on a first co... |
|
G/S
|
Internet security software; software for identifying and authenticating users; downloadable softw... |
|
G/S
|
Internet security software; software for preventing unauthorized access to computers and electron... |
|
G/S
|
consulting services in the field of downloadable and non-downloadable Internet security software;... |
|
G/S
|
downloadable software accessible via a web interface for preventing unauthorized access to comput... |
|
G/S
|
Downloadable software accessible via a web interface for preventing unauthorized access to comput... |
2017
|
G/S
|
Endpoint detection and response software Providing online non-downloadable endpoint detection and... |
|
G/S
|
Downloadable software for use in preventing unauthorized access to computers and electronics syst... |
|
G/S
|
Downloadable software for enabling testing of malware detection by antivirus software applications. |
2016
|
G/S
|
Downloadable internet security software; downloadable
software for preventing unauthorized acces... |
|
G/S
|
Downloadable software for use in preventing unauthorized access to computer and electronics syste... |
|
G/S
|
Downloadable software for use in preventing unauthorized
access to computers and electronics sys... |
|
G/S
|
Downloadable security software accessible via a web interface for preventing unauthorized access ... |
2015
|
G/S
|
downloadable software for use in preventing unauthorized access to computers and electronics syst... |
|
G/S
|
Providing consulting services regarding Internet security software and for preventing unauthorize... |
|
G/S
|
providing non-downloadable software for use in preventing unauthorized access to computer and ele... |
|
G/S
|
Downloadable software for for use in preventing unauthorized access to computer and electronics s... |
2014
|
G/S
|
Providing online non-downloadable Internet security software; Providing online non-downloadable s... |