A Nucci, S Saha - US Patent 9,094,288, 2015 - Google Patents
A method for profiling network traffic of a network. The method includes obtaining a signature library comprising a plurality of signatures each representing first data …
MJ Lefebvre, M Carver, E Ellett, W Negm… - US Patent …, 2016 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on computer storage media, for determining network related anomaly scores. One of the methods …
ML Lefebvre, M Carver, E Ellett, W Negm… - US Patent …, 2017 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on computer storage media, for determining network related anomaly scores. One of the methods …
A Nucci, PM Comar, S Saha, L Liu - US Patent 8,418,249, 2013 - Google Patents
(57) ABSTRACT A method for profiling network traffic of a network. The method includes obtaining a signature library comprising a plurality of signatures corresponding to a plurality …
P Mullarkey, MC Johns - US Patent 8,601,575, 2013 - Google Patents
Ananomaly detection method and system determine network status by monitoring network activity. A statistics based pro file for said network over a period is generated to analyze …
CM Mathis - US Patent 9,407,651, 2016 - Google Patents
Methods and apparatus for anomaly detection in network-site metrics using predictive modeling are described. A method comprises obtaining time-series data for a given time …
JA Sipple - US Patent 9,609,010, 2017 - Google Patents
An approach for detecting an insider threat is described. Embodiments include determining one or more features from one or more network transfers among a plurality of network …
Performing adaptive cyber-security analytics including a computer implemented method that includes receiving a report on a network activity. A score responsive to the network activity …
RT Fudge - US Patent 7,962,960, 2011 - Google Patents
According to one aspect, a method for analyZing a network element includes assigning values to each of a plurality of vulnerabilities. The method also includes identifying at least …