Cyber vulnerability scan analyses with actionable feedback
GY Ng, F Zhang, F Tancioco - US Patent 9,699,209, 2017 - Google Patents
Embodiments of the present technology relate to cyber attack vulnerability analyzes. In one
embodiment, a method includes determining an external infrastructure of an entity, the …
embodiment, a method includes determining an external infrastructure of an entity, the …
Context-based priors for object detection in images
DHF Dijkman, RB Towal… - US Patent 10,410,096, 2019 - Google Patents
Context-based priors are utilized in machine learning networks (eg, neural networks) for
detecting objects in images. The likely locations of objects are estimated based on context …
detecting objects in images. The likely locations of objects are estimated based on context …
Inferential analysis using feedback for extracting and combining cyber risk information
GY Ng, B Wu, M Yang, P Yang, F Tancioco - US Patent 10,230,764, 2019 - Google Patents
Various embodiments of the present technology include methods of assessing risk of a
cyber security failure in a computer network of an entity. Some embodiments involve using …
cyber security failure in a computer network of an entity. Some embodiments involve using …
Image classification by brain computer interface
AB Geva, LY Deouell, S Vaisman, O Harish… - US Patent …, 2019 - Google Patents
A method of classifying an image is disclosed. The method comprises: applying a computer
vision procedure to the image to detect therein candidate image regions suspected as being …
vision procedure to the image to detect therein candidate image regions suspected as being …
Diversity analysis with actionable feedback methodologies
GY Ng, PA Rosace III - US Patent 9,373,144, 2016 - Google Patents
Various embodiments of the present technology relate to diversity and similarity analysis. In
some exemplary embodiments, a method includes, for each of a plurality of entities …
some exemplary embodiments, a method includes, for each of a plurality of entities …
Extracting salient features from video using a neurosynaptic system
A Andreopoulos, SK Esser, DS Modha - US Patent 9,195,903, 2015 - Google Patents
Embodiments of the invention provide a method of visual saliency estimation comprising
receiving an input sequence of image frames. Each image frame has one or more channels …
receiving an input sequence of image frames. Each image frame has one or more channels …
Cyber risk analysis and remediation using network monitored sensors and methods of use
A Parthasarathi, GY Ng, M Honea - US Patent 10,404,748, 2019 - Google Patents
Abstract Systems and methods for cyber risk analysis and remediation using network
monitored sensors are provided herein. An example system includes one or more data …
monitored sensors are provided herein. An example system includes one or more data …
Inferential analysis using feedback for extracting and combining cyber risk information including proxy connection analyses
GY Ng, D Ma, YT Ooi, F Zhang, F Tancioco - US Patent 10,050,989, 2018 - Google Patents
Various embodiments of the present technology include methods of assessing risk of a
cyber security failure in one or more computer networks for an entity. Various embodiments …
cyber security failure in one or more computer networks for an entity. Various embodiments …
Cyber vulnerability scan analyses with actionable feedback
GY Ng, F Zhang, F Tancioco - US Patent 10,218,736, 2019 - Google Patents
Embodiments of the present technology relate to cyber attack vulnerability analyses. In one
embodiment, a method includes determining an external infrastructure of an entity, the …
embodiment, a method includes determining an external infrastructure of an entity, the …
Inferential analysis using feedback for extracting and combining cyber risk information
GY Ng, F Zhang, F Tancioco - US Patent 9,521,160, 2016 - Google Patents
Various embodiments of the present technology include methods of assessing risk of a
cyber security failure in a computer network of an entity. Various embodiments also include …
cyber security failure in a computer network of an entity. Various embodiments also include …