Cyber vulnerability scan analyses with actionable feedback

GY Ng, F Zhang, F Tancioco - US Patent 9,699,209, 2017 - Google Patents
Embodiments of the present technology relate to cyber attack vulnerability analyzes. In one
embodiment, a method includes determining an external infrastructure of an entity, the …

Context-based priors for object detection in images

DHF Dijkman, RB Towal… - US Patent 10,410,096, 2019 - Google Patents
Context-based priors are utilized in machine learning networks (eg, neural networks) for
detecting objects in images. The likely locations of objects are estimated based on context …

Inferential analysis using feedback for extracting and combining cyber risk information

GY Ng, B Wu, M Yang, P Yang, F Tancioco - US Patent 10,230,764, 2019 - Google Patents
Various embodiments of the present technology include methods of assessing risk of a
cyber security failure in a computer network of an entity. Some embodiments involve using …

Image classification by brain computer interface

AB Geva, LY Deouell, S Vaisman, O Harish… - US Patent …, 2019 - Google Patents
A method of classifying an image is disclosed. The method comprises: applying a computer
vision procedure to the image to detect therein candidate image regions suspected as being …

Diversity analysis with actionable feedback methodologies

GY Ng, PA Rosace III - US Patent 9,373,144, 2016 - Google Patents
Various embodiments of the present technology relate to diversity and similarity analysis. In
some exemplary embodiments, a method includes, for each of a plurality of entities …

Extracting salient features from video using a neurosynaptic system

A Andreopoulos, SK Esser, DS Modha - US Patent 9,195,903, 2015 - Google Patents
Embodiments of the invention provide a method of visual saliency estimation comprising
receiving an input sequence of image frames. Each image frame has one or more channels …

Cyber risk analysis and remediation using network monitored sensors and methods of use

A Parthasarathi, GY Ng, M Honea - US Patent 10,404,748, 2019 - Google Patents
Abstract Systems and methods for cyber risk analysis and remediation using network
monitored sensors are provided herein. An example system includes one or more data …

Inferential analysis using feedback for extracting and combining cyber risk information including proxy connection analyses

GY Ng, D Ma, YT Ooi, F Zhang, F Tancioco - US Patent 10,050,989, 2018 - Google Patents
Various embodiments of the present technology include methods of assessing risk of a
cyber security failure in one or more computer networks for an entity. Various embodiments …

Cyber vulnerability scan analyses with actionable feedback

GY Ng, F Zhang, F Tancioco - US Patent 10,218,736, 2019 - Google Patents
Embodiments of the present technology relate to cyber attack vulnerability analyses. In one
embodiment, a method includes determining an external infrastructure of an entity, the …

Inferential analysis using feedback for extracting and combining cyber risk information

GY Ng, F Zhang, F Tancioco - US Patent 9,521,160, 2016 - Google Patents
Various embodiments of the present technology include methods of assessing risk of a
cyber security failure in a computer network of an entity. Various embodiments also include …