Anomaly scoring using collaborative filtering

I Argoeti, R Levin, JM Monsonego - US Patent 11,310,257, 2022 - Google Patents
(57) ABSTRACT A machine learning model is trained using tuples that identify an actor, a
resource, and a rating based on a normalized count of the actor's attempts to access the …

Systems and methods for cyber security alert triage

J Trost, B Stoy - US Patent 11,165,815, 2021 - Google Patents
The present disclosure is directed to systems, apparatuses and methods for mitigating cyber-
attacks. For example, the method includes receiving, from one or more network devices …

System and method for unauthorized activity detection

N Djosic, B Nokovic, S Sharieh, B Zheng - US Patent 12,058,135, 2024 - Google Patents
An authorization access system and method of minimizing unauthorized access to a
resource are provided. The authorization access system comprises at least one processor …

Automated discovery of security policy from design data

AL Nicoll, K Crum, TJ Jasper, MA Bush… - US Patent …, 2021 - Google Patents
An industrial security policy configuration system generates and implements security
policies for industrial automation systems based on design data for the industrial systems …

Clustering enhanced analysis

A Raghuramu, AK Das, Y Zhang - US Patent 11,601,445, 2023 - Google Patents
US11601445B2 - Clustering enhanced analysis - Google Patents US11601445B2 - Clustering
enhanced analysis - Google Patents Clustering enhanced analysis Download PDF Info …

Anomaly detection over high-dimensional space

BE Harris, M Khan, J Heinlein - US Patent 11,943,244, 2024 - Google Patents
One or more computer processors create a binary cluster of events by bootstrapping a set of
ground truths contained with a rule engine applied to a set of high-dimensional datapoints …

Caching optimization with accessor clustering

A Harar, T Haimovich, I Argoety - US Patent 11,436,149, 2022 - Google Patents
Distributed computing system (DCS) performance is enhanced by caching optimizations.
The DCS includes nodes with local caches. Resource accessors such as users are …

Analyzing an event enacted by a data entity when performing a security operation

R Marty, NC Fischbach - US Patent 11,621,964, 2023 - Google Patents
(*) Notice: Subject to any disclaimer, the term of this () THER PUP3 I_I (ATI (I) NS patent is
extended or adjusted under 35 Sanjeev Goyal et al., Attack, Defence and Contagion in …

Method for determining to grant or deny a permission request based on empirical data aggregation

J Salehpour, S Kruayatidee, K Dahlin - US Patent 11,321,481, 2022 - Google Patents
Empirical data concerning user responses to permission requests by applications are
collected over time. The collected empirical data is aggregated and analyzed to determine …

Using human factors when calculating a risk score

R Marty, NC Fischbach - US Patent 11,902,294, 2024 - Google Patents
A system, method, and computer-readable medium are disclosed for performing a security
operation. The security operation includes: monitoring an entity, the monitoring observing at …