N Yadav, AR Singh, S Gandham, EC Scheib… - US Patent …, 2018 - Google Patents
An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and …
F Xue, BB Zhu, W Chu - US Patent 9,178,901, 2015 - Google Patents
The techniques described herein use training data to train classification models to detect malicious Uniform Resource Locators (URLs) that target authentic resources (eg, Web page …
FI Hsiao, W Jiang, VA Shcherbakov… - US Patent …, 2019 - Google Patents
The disclosed embodiments provide a system that facilitates the processing of network data. During operation, the system causes for display a graphical user interface (GUI) for …
EC Scheib, A Parandehgheibi, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can determine an optimum number of clusters for the network using the minimum description …
A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Flow data can be augmented with features or attributes from other domains, such as attributes from a source host and/or destination host of a flow, a process initiating the flow …
A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can determine whether certain nodes form a cluster of a tier of an application. The network can …
The Ant Colony Optimization (ACO) algorithms have been well‐studied by the Operations Research community for solving combinatorial optimization problems. A handful of …
SK Gupta, N Yadav, MS Watts… - US Patent …, 2018 - Google Patents
A network can achieve compliance by defining and enforcing a set of network policies to secure protected electronic information. The network can monitor network data …
AS Sallam - US Patent 9,087,199, 2015 - Google Patents
In one embodiment, a system for launching a security archi tecture includes an electronic device comprising a processor and one or more operating systems, a security agent, and a …