Processing network traffic based on assessed security weaknesses

SMV Epple, J Jesse - US Patent 10,924,517, 2021 - Google Patents
(57) ABSTRACT A threat management facility generates a simulated phishing threat based
on one or more characteristics of users of an enterprise network and transmits the simulated …

Identifying and remediating phishing security weaknesses

B Bloxham, SMV Epple, JP Albert - US Patent 10,986,122, 2021 - Google Patents
(57) ABSTRACT A threat management facility generates a simulated phishing threat based
on one or more characteristics of a network user. Based on whether the user fails to respond …

Software assurance system for runtime environments

RA Joyce, MP Donovan - US Patent 10,558,809, 2020 - Google Patents
An example method includes monitoring execution of one or more applications on a runtime
computing system that includes a plurality of processing units, receiving, from the runtime …

System and method for validating program execution at run-time

K Ghose - US Patent 9,767,271, 2017 - Google Patents
(57) ABSTRACT A pipelined processor comprising a cache memory system, fetching
instructions for execution from a portion of said cache memory system, an instruction …

Private ethernet overlay networks over a shared ethernet in a virtual environment

A Dalal - US Patent 10,951,744, 2021 - Google Patents
(57) ABSTRACT A system for private networking within a virtual infrastruc ture is presented.
The system includes a virtual machine (VM) in a first host, the VM being associated with a …

Private ethernet overlay networks over a shared ethernet in a virtual environment

A Dalal - US Patent 9,900,410, 2018 - Google Patents
A system for private networking within a virtual infrastructure is presented. The system
includes a virtual machine (VM) in a first host, the VM being associated with a first virtual …

Adaptive training system, method and apparatus

M Falash, E Pollak, M Barnoske, G Rovny… - US Patent …, 2017 - Google Patents
A system and method for training a student employ a simulation station that displays output
to the student and receives input. The computer system has a rules engine operating on it …

System and method for evaluating cyber-attacks on aircraft

D Nguyen, JW Shelton, TM Mitchell - US Patent 9,836,990, 2017 - Google Patents
A system for evaluating a cyber-attack on an aircraft may include a display associated with
the aircraft, a sensor system configured to generate sensor data for a pilot, and a data …

Virtual laboratory smart agent

TM Elesseily, AS Farghal - US Patent 8,406,682, 2013 - Google Patents
BACKGROUND A virtual machine (VM) is a software implementation of a 5 physical
machine (ie a computer) that executes programs in essentially the same manner as the …

Automated execution and evaluation of network-based training exercises

SK Brueckner, FN Adelstein, HY Bar… - US Patent …, 2016 - Google Patents
This disclosure generally relates to automated execution and evaluation of computer
network training exercises, such as in a virtual machine environment. An example …