Computer-implemented method for determining computer system security threats, security operations center system and computer program product

B Scheidler, M Illes - US Patent 10,681,060, 2020 - Google Patents
A computer-implemented method for determining computer system security threats, the
computer system including user accounts established on the computer system, the method …

Graph-based network anomaly detection across time and entities

G Apostolopoulos - US Patent 10,609,059, 2020 - Google Patents
The disclosed techniques relate to a graph-based network security analytic framework to
combine multiple sources of information and security knowledge in order to detect risky …

Detecting anomalies in a computer network based on usage similarity scores

S Muddu, C Tryfonas, F Lam… - US Patent …, 2021 - Google Patents
US10911470B2 - Detecting anomalies in a computer network based on usage similarity scores
- Google Patents US10911470B2 - Detecting anomalies in a computer network based on usage …

Model workflow control in a distributed computation system

S Muddu, C Tryfonas, S Kavacheri - US Patent 10,581,881, 2020 - Google Patents
US10581881B2 - Model workflow control in a distributed computation system - Google
Patents US10581881B2 - Model workflow control in a distributed computation system …

Network security anomaly and threat detection using rarity scoring

S Muddu, C Tryfonas, Y Li - US Patent 11,470,096, 2022 - Google Patents
A security platform employs a variety techniques and mechanisms to detect security related
anomalies and threats in a computer network environment. The security platform is “big …

Window-based rarity determination using probabilistic suffix trees for network security analysis

S Muddu, C Tryfonas, M Iliofotou - US Patent 10,560,468, 2020 - Google Patents
US10560468B2 - Window-based rarity determination using probabilistic suffix trees for network
security analysis - Google Patents US10560468B2 - Window-based rarity determination using …

Method and system for generating an interactive kill chain view for training a machine learning model for identifying threats

S Muddu, C Tryfonas - US Patent 10,778,703, 2020 - Google Patents
A security platform employs a variety techniques and mechanisms to detect security related
anomalies and threats in a computer network environment. The security platform is “big …

Method and system for generating an entities view with risk-level scoring for performing computer security monitoring

S Muddu, C Tryfonas - US Patent 10,986,106, 2021 - Google Patents
US10986106B2 - Method and system for generating an entities view with risk-level scoring
for performing computer security monitoring - Google Patents US10986106B2 - Method and …

Interactive geographic representation of network security threats

S Muddu, C Tryfonas - US Patent 10,798,113, 2020 - Google Patents
A security platform employs a variety techniques and mechanisms to detect security related
anomalies and threats in a computer network environment. The security platform is “big …

User assistance coordination in anomaly detection

JP Vasseur, G Mermoud, JC Mota, L Sartran… - US Patent …, 2019 - Google Patents
In one embodiment, a device in a network receives feedback regarding an anomaly
reporting mechanism used by the device to report network anomalies detected by a plurality …