|
2024
|
Invention
|
Detecting unwanted software using a machine learning operation. Systems, methods, and software ca... |
|
|
Invention
|
Determining a priority score of a computer system alert by using a machine learning operation. Sy... |
|
|
Invention
|
Protecting devices from malicious files based on n-gram processing of sequential data.
Under one... |
|
|
Invention
|
Clustering strings for computer system alerts.
Systems, methods, and software can be used to clu... |
|
|
Invention
|
Modifying software code.
Systems, methods, and software can be used to modify a software code. I... |
|
|
Invention
|
Machine learning models that generate diverse embedded vectors, according to an implementation.
... |
|
|
Invention
|
Generating natural language description of a software code.
Systems, methods, and software can b... |
|
|
Invention
|
Determining natural language description of a software code.
Systems, methods, and software can ... |
|
|
Invention
|
Determining source code of a software code.
Systems, methods, and software can be used to determ... |
|
2023
|
Invention
|
Determining similarity samples using a machine learning operation with clustering.
Systems, meth... |
|
|
Invention
|
Determining similarity samples based on user selected feature group.
Systems, methods, and softw... |
|
|
Invention
|
Determining similarity samples using a machine learning operation.
Systems, methods, and softwar... |
|
|
Invention
|
Detecting unwanted software using a machine learning operation.
Systems, methods, and software c... |
|
|
Invention
|
Determining a priority score of a computer system alert by using a machine learning operation.
S... |
|
|
Invention
|
Processing labeled data in a machine learning operation.
Systems, methods, and software can be u... |
|
|
Invention
|
Clustering analysis for deduplication of training set samples for machine learning based computer... |
|
2021
|
Invention
|
Methods and systems for fingerprinting malicious behavior. Methods and systems for fingerprinting... |
|
|
Invention
|
Methods and systems for training a neural network based on impure data.
Methods and systems for ... |
|
|
Invention
|
Computer user authentication using machine learning. Systems and methods are described herein for... |
|
|
Invention
|
Methods for converting hierarchical data. Systems, methods, and software can be used for securing... |
|
|
Invention
|
Clustering software codes in scalable manner. Systems, methods, and software can be used to clust... |
|
2020
|
Invention
|
Statistical data fingerprinting and tracing data similarity of documents. A method and computing ... |
|
|
Invention
|
Machine learning model for analysis of instruction sequences. A system is provided for classifyin... |
|
|
Invention
|
Prevention of hash-based api importing. Hash-based application programming interface (API) import... |
|
|
Invention
|
Machine learning model score obfuscation using step function, position-dependent noise. An artefa... |
|
|
Invention
|
Bayesian continuous user authentication. Bayesian continuous user authentication can be obtained ... |
|
|
Invention
|
Memory space protection. Executable memory space is protected by receiving, from a process, a req... |
|
|
Invention
|
Endpoint detection and response system with endpoint-based artifact storage. Each of a plurality ... |
|
|
Invention
|
Centroid for improving machine learning classification and info retrieval. Centroids are used for... |
|
|
Invention
|
Communications bus signal fingerprinting. Systems are provided herein for communications bus sign... |
|
|
Invention
|
Detecting malware with deep generative models. Features are extracted from an artifact so that a ... |
|
|
Invention
|
Endpoint detection and response utilizing machine learning. A plurality of events associated with... |
|
|
Invention
|
Machine learning model for malware dynamic analysis. In some implementations there may be provide... |
|
|
Invention
|
Password-less software system user authentication. Data is received as part of an authentication ... |
|
|
Invention
|
Machine learning model score obfuscation using step-function, position-dependent noise. An artefa... |
|
|
Invention
|
System abnormality detection using signal fingerprinting. Systems, methods, and devices are descr... |
|
|
Invention
|
Container file analysis using machine learning model. A system is provided for training a machine... |
|
|
Invention
|
Projected vector modification as mitigation for machine learning model string stuffing. An artifa... |
|
|
Invention
|
Malware detection. In one respect, there is provided a system for training a neural network adapt... |
|
|
Invention
|
Deployment of machine learning models for discernment of threats. A mismatch between model-based ... |
|
|
Invention
|
Projected vector overflow penalty as mitigation for machine learning model string stuffing. An ar... |
|
|
Invention
|
Indicator centroids for malware handling. An artifact is received and features are extracted ther... |
|
2019
|
Invention
|
Machine learning model score obfuscation using multiple classifiers. An artefact is received. The... |
|
|
Invention
|
Machine learning model score obfuscation using time-based score oscillations. An artefact is rece... |
|
|
Invention
|
Machine learning model score obfuscation using coordinated interleaving. An artefact is received.... |
|
|
Invention
|
Machine learning model score obfuscation using vector modification techniques. An artefact is rec... |
|
2016
|
G/S
|
Downloadable software for use in preventing unauthorized
access to computers and electronics sys... |