Harnessing artificial intelligence capabilities to improve cybersecurity

S Zeadally, E Adi, Z Baig, IA Khan - Ieee Access, 2020 - ieeexplore.ieee.org
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …

System for monitoring and managing datacenters

N Yadav, AR Singh, S Gandham, EC Scheib… - US Patent …, 2018 - Google Patents
An example method includes detecting, using sensors, packets throughout a datacenter.
The sensors can then send packet logs to various collectors which can then identify and …

Malicious uniform resource locator detection

F Xue, BB Zhu, W Chu - US Patent 9,178,901, 2015 - Google Patents
The techniques described herein use training data to train classification models to detect
malicious Uniform Resource Locators (URLs) that target authentic resources (eg, Web page …

Visualizations of statistics associated with captured network data

FI Hsiao, W Jiang, VA Shcherbakov… - US Patent …, 2019 - Google Patents
The disclosed embodiments provide a system that facilitates the processing of network data.
During operation, the system causes for display a graphical user interface (GUI) for …

MDL-based clustering for application dependency mapping

EC Scheib, A Parandehgheibi, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine an optimum number of clusters for the network using the minimum description …

Augmenting flow data for improved network monitoring and management

A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Flow data can be augmented with features or attributes from other domains, such as
attributes from a source host and/or destination host of a flow, a process initiating the flow …

Cluster discovery via multi-domain fusion for application dependency mapping

A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine whether certain nodes form a cluster of a tier of an application. The network can …

Rule‐Based Classification Based on Ant Colony Optimization: A Comprehensive Review

SKM Hossain, SA Ema, H Sohn - … Intelligence and Soft …, 2022 - Wiley Online Library
The Ant Colony Optimization (ACO) algorithms have been well‐studied by the Operations
Research community for solving combinatorial optimization problems. A handful of …

Policy-driven compliance

SK Gupta, N Yadav, MS Watts… - US Patent …, 2018 - Google Patents
A network can achieve compliance by defining and enforcing a set of network policies to
secure protected electronic information. The network can monitor network data …

System and method for providing a secured operating system execution environment

AS Sallam - US Patent 9,087,199, 2015 - Google Patents
In one embodiment, a system for launching a security archi tecture includes an electronic
device comprising a processor and one or more operating systems, a security agent, and a …