EC Scheib, A Parandehgheibi, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can determine an optimum number of clusters for the network using the minimum description …
A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Flow data can be augmented with features or attributes from other domains, such as attributes from a source host and/or destination host of a flow, a process initiating the flow …
A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can determine whether certain nodes form a cluster of a tier of an application. The network can …
P Kahn, A Kinsolving - US Patent 8,285,344, 2012 - Google Patents
US8285344B2 - Method and apparatus for adjusting audio for a user environment - Google Patents US8285344B2 - Method and apparatus for adjusting audio for a user environment …
A Kulshreshtha, N Yadav, HT Vu, MS Watts… - US Patent …, 2021 - Google Patents
(57) ABSTRACT A monitoring device/module monitors a plurality of nodes in a data center network, and determines one or more latency distributions of response times for messages …
A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping can be automated in a network. The network can capture traffic data for flows passing through the network using a sensor network that provides …
A Sinha, NJ Darrow - US Patent 7,577,424, 2009 - Google Patents
Security vulnerability assessment for wireless networks is provided. Systems and methods for security vulnerability assessment simulate an attack upon the wireless network, capture …
SE Hrastar, S Viswanathan - US Patent 8,196,199, 2012 - Google Patents
US8196199B2 - Personal wireless monitoring agent - Google Patents US8196199B2 - Personal wireless monitoring agent - Google Patents Personal wireless monitoring agent …
An example method can include monitoring a network to identify flows between nodes in the network. Once flows have been identified, the flows can be tagged and labelled according to …