Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems; Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities Assessing vulnerabilities and evaluating computer system security
METHOD FOR DETECTING VULNERABILITIES OF TARGET APPLICATIONS, DEVICE, AND MEDIUM THEREOF
#2ANALYZING QR CODE RISK
#3AUTOMATED ATTRIBUTE SCRAPING FOR SECURITY FEATURE IMPLEMENTATION PREDICTION
#4CODE DEPLOYMENT
#5RETRAINING MACHINE LEARNING MODEL FOR COMPUTER VULNERABILITY EXPLOITATION DETECTION
#6TECHNIQUES FOR THE UNIFICATION OF RAW CYBER DATA COLLECTED FROM DIFFERENT SOURCES FOR VULNERABILITY MANAGEMENT
#7MODIFICATION OF VULNERABLE PODS
#8SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR REMEDIATING SECURITY VULNERABILITIES
#9Method and Device Relating to Decision-Making Threshold
#10CIRCUIT AND METHOD FOR PROTECTING AN APPLICATION AGAINST A SIDE CHANNEL ATTACK
#11AUTOMATED THREAT MODELING USING APPLICATION RELATIONSHIPS
#12SYSTEMS AND METHODS FOR INDICATING ONLOOKER VULNERABILITY
#13Complex Application Attack Quantification, Testing, Detection and Prevention
#14Custom Patching Automation with Machine Learning Integration
#15FUNCTION ALLOCATION CONTROL APPARATUS, FUNCTION ALLOCATION CONTROL METHOD AND PROGRAM
#16RISK ANALYSIS APPARATUS, METHOD, AND COMPUTER-READABLE MEDIUM
#17SYSTEM AND METHOD FOR DETECTING VULNERABILITIES IN OBJECT-ORIENTED PROGRAM CODE USING AN OBJECT PROPERTY GRAPH
#18SYSTEMS AND METHODS FOR SECURITY STATE OPTIMIZATION OF SPDM-ENABLED DEVICES
#19AUTO-CORRECTING DEFICIENCIES OF A SYSTEM
#20SYSTEMS AND METHODS FOR IN-PROCESS URL CONDEMNATION
#21SYNCHRONOUS INTERFACING WITH UNAFFILIATED NETWORKED SYSTEMS TO ALTER FUNCTIONALITY OF SETS OF ELECTRONIC ASSETS
#22SYSTEMS AND METHODS FOR TRAINING SET OBFUSCATION UTILIZING AN INVERTED THREAT MODEL IN A ZERO-TRUST COMPUTING ENVIRONMENT
#23SYSTEMS AND METHODS FOR MEASURING DATA EXFILTRATION VULNERABILITY AND DYNAMIC DIFFERENTIAL PRIVACY IN A ZERO-TRUST COMPUTING ENVIRONMENT
#24Security Configuration Optimizer Systems and Methods
#25INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT
#26SYSTEM AND METHOD FOR CREATING AND EXECUTING BREACH SCENARIOS UTILIZING VIRTUALIZED ELEMENTS
#27ARTIFICIAL-INTELLIGENCE-BASED SYSTEM AND METHOD FOR QUESTIONNAIRE / SECURITY POLICY CROSS-CORRELATION AND COMPLIANCE LEVEL ESTIMATION FOR CYBER RISK ASSESSMENTS
#28SYSTEMS AND METHODS FOR MODEL OVERFITTING REDUCTION UTILIZING DATA SUBSET TRAINING IN A ZERO-TRUST COMPUTING ENVIRONMENT
#29SECURITY VULNERABILITY DETECTION FOR IMAGE FILES
#30INTELLIGENT APPARATUS TO MONITOR AND AUTO DEPLOY SECURITY POLICY RULES ON CONTAINER BASED CLOUD INFRASTRUCTURE LEVERAGING NFT & QUANTUM KNOWLEDGE GRAPH
#31Systems and Methods for Detecting Attack Vectors to Application Data
#32SECURITY POLICIES FOR SOFTWARE CALL STACKS
#33STATIC ANALYSIS CORRELATION SCANNERS
#34ARCHITECTURE OF A MULTI-CLOUD INSPECTOR FOR ANY COMPUTE TYPE
#35AN APPARATUS AND METHOD FOR ENHANCING CYBERSECURITY OF AN ENTITY
#36Systems and Methods to Determine Attack Paths to Application Assets
#37Systems and Methods to Map Attack Paths to Applications Assets in a Visualization Interface
#38METHODS AND SYSTEMS FOR INTELLIGENT DATA SLICE MONITORING
#39SYSTEM FOR INTENT-BASED WORKLOAD ORCHESTRATION
#40PROCESS TREE AND TAGS
#41GENERATING SECURITY REPORTS
#42SYSTEMS AND METHODS FOR PROTECTION MODELING
#43COMPARATIVE REAL-TIME END-TO-END SECURITY VULNERABILITIES DETERMINATION AND VISUALIZATION
#44METHOD FOR IDENTIFYING ONE OR MORE EXPLOITABLE VULNERABILITIES IN DEVICE FIRMWARE OF AN IOT DEVICE
#45System and method for security threat identification and resolution
#46Detecting and Preventing Installation and Execution of Malicious Browser Extensions
#47CONTAINER SECURITY IN A CLOUD ENVIRONMENT
#48DETECTING OUT-OF-DISTRIBUTION DATA SAMPLE IN A MACHINE LEARNING OPERATION
#49SYSTEMS AND METHODS FOR SUBORDINATE WORKSPACES
#50BROWSER SESSION SECURITY SYSTEM
#51WORKSPACE INSTANTIATION USING CONTINUOUS VULNERABILITY INTELLIGENCE FEEDBACK LOOPS
#52SECURITY VULNERABILITY LIFECYCLE SCOPE IDENTIFICATION
#53TRANSPORTATION SECURITY APPARATUS, SYSTEM, AND METHOD TO ANALYZE IMAGES TO DETECT A THREAT CONDITION
#54SYSTEM AND METHOD FOR OBJECTIVE QUANTIFICATION AND MITIGATION OF PRIVACY RISK
#55METHOD TO INTELLIGENTLY MANAGE THE END TO END CONTAINER COMPLIANCE IN CLOUD ENVIRONMENTS
#56REMEDIATION OF REGULATORY NON-COMPLIANCE
#57TELEMETRY COLLECTION AUTO-TUNING FOR WORKSPACES
#58DEPICTING A RELATIVE EXTENT OF VULNERABILITY ASSOCIATED WITH A WEB APPLICATION DEPLOYED ON A DOMAIN
#59LEARNING BASED IDENTIFICATION OF VULNERABLE FUNCTIONS IN RELATION TO COMMON VULNERABILITIES AND EXPOSURES (CVE)
#60PREVENTING VULNERABLE CODE UPLOAD/DOWNLOAD
#61ADVANCED DATA COLLECTION BLOCK IDENTIFICATION
#62APPLICATION AND INFRASTRUCTURE TEMPLATE MANAGEMENT TO EASILY CREATE SECURE APPLICATIONS FOR ENTERPRISES
#63SYSTEM AND METHOD FOR OBJECTIVE QUANTIFICATION AND MITIGATION OF PRIVACY RISK
#64A SCENARIO-BASED CYBER SECURITY SYSTEM AND METHOD
#65METHOD FOR ASCERTAINING A RELEVANCE OF SECURITY-RELEVANT VULNERABILITIES OF A PRODUCT
#66SEMICONDUCTOR DEVICE AND METHOD OF MANAGING SECRET INFORMATION
#67INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM
#68SYSTEMS AND METHODS FOR CONDUCTING BLOCKCHAIN ACTIONS BASED ON NETWORK MAPPINGS OF SELF-EXECUTING PROGRAM CHARACTERISTICS
#69METHOD AND DEVICE FOR BUILDING VULNERABILITY DATABASE
#70SYSTEMS AND METHODS FOR AGGREGATED VULNERABILITY PROOFING OF AN IHS
#71SYSTEMS AND METHODS FOR VULNERABILITY PROOFING MACHINE LEARNING RECOMMENDATIONS
#72SYSTEMS AND METHODS FOR VULNERABILITY PROOFING INTERDEPENDENT IHS COMPONENTS
#73SYSTEMS AND METHODS FOR VULNERABILITY PROOFING DURING IHS PROVISIONING
#74SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN CONFIGURING AN IHS
#75SYSTEMS AND METHODS FOR VALIDATED VULNERABILITY PROOFING
#76SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN USING A BOOTABLE IMAGE
#77SYSTEMS AND METHODS FOR CONTEXT-AWARE VULNERABILITY RISK SCORES
#78SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN GENERATING IHS UPDATES
#79SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN UPDATING AN IHS
#80SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN BOOTING AN IHS
#81SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN ADDING AND REPLACING IHS HARDWARE
#82MONITORING AND REMEDIATION OF CYBERSECURITY RISK BASED ON CALCULATION OF CYBER-RISK DOMAIN SCORES
#83Systems and Methods for API Security Integration
#84Software Composition Analysis on Target Source Code
#85CONVERGED MODEL BASED RISK ASSESSMENT AND AUDIT GENERATION
#86MANAGING THE LOADING OF SENSITIVE MODULES
#87SECURITY DESIGN FLAW DETECTION METHOD BASED ON UNIT TEST CASE, RECORDING MEDIUM AND DEVICE FOR PERFORMING THE SAME
#88Systems And Methods For Assessing Security In A Computing Device Environment
#89ENHANCING APPLICATION SECURITY BY PERFORMING APPLICATION VULNERABILITY REDUCTION BASED ON STATIC ANALYSIS OF DYNAMICALLY LOADED SYMBOLS AND SYSTEM CALL BLOCKING
#90ENHANCING CONTAINER SECURITY BY PERFORMING CONTAINER VULNERABILITY REDUCTION BASED ON STATIC AND DYNAMIC ANALYSIS OF DYNAMICALLY LOADED SYMBOLS AND SYSTEM CALL BLOCKING
#91ENHANCING CONTAINER SECURITY BY PERFORMING CONTAINER VULNERABILITY REDUCTION BASED ON STATIC ANALYSIS OF DYNAMICALLY LOADED SYMBOLS AND SYSTEM CALL BLOCKING
#92SYSTEMS AND METHODS FOR CYBERSECURITY RISK ASSESSMENT
#93TYPOSQUATTING DETECTION VIA METADATA-BASED TRUSTWORTHINESS SCORING AND PACKAGE IDENTIFIER SIMILARITY
#94INCIDENT CONFIDENCE LEVEL
#95HOLISTIC EVALUATION OF VULNERABILITIES IN A VULNERABILITY CHAIN
#96METHOD FOR EXTRACTING ARTIFICIAL NEURAL NETWORK BY USING MELTDOWN VULNERABILITY
#97ENHANCING CONTAINER SECURITY BY PERFORMING CONTAINER VULNERABILITY REDUCTION BASED ON LIBRARY AND/OR FUNCTION REMOVAL AND SYSTEM CALL BLOCKING
#98DYNAMIC CROSS-STANDARD COMPLIANCE COVERAGE
#99SYSTEMS AND METHODS FOR MANAGING SOFTWARE SECURITY
#100METHOD AND DEVICE FOR IDENTIFYING RISKS OF CYBERATTACKS
#101INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM
#102Automation Platform for Pentest Collaboration
#103BINDING CONFIGURATION STATE TO A BLOCKCHAIN
#104METHOD AND SYSTEM FOR INFERRING DOCUMENT SENSITIVITY
#105ATTACK SCENARIO GENERATION APPARATUS, ATTACK SCENARIO GENERATION METHOD, AND COMPUTER READABLE MEDIUM
#106USE OF WORD EMBEDDINGS TO LOCATE SENSITIVE TEXT IN COMPUTER PROGRAMMING SCRIPTS
#107SUPPRESSING A VULNERABILITY OF A CONTINUOUS INTEGRATION PIPELINE WITH AUDIT FUNCTIONALITY
#108TRUSTED ACCESS CONTROL FOR SECURE BOOT PROCESS FOR STORAGE CONTROLLERS OR DRIVERS
#109Cloud Data Security Posture Detection Based On Network Communication Paths And Sensitivity Data
#110RISK SCORING SYSTEM FOR VULNERABILITY MITIGATION
#111Vetting and/or Functional Validation of Software Components
#112VULNERABILITY ANALYSIS OF A COMPUTER DRIVER
#113AI BASED PATCH MANAGEMENT
#114Comprehensive Software Supply Chain Analysis
#115COMPUTER-BASED SYSTEMS CONFIGURED FOR DETECTING AND SANDBOXING EXTERNAL RESOURCES AND METHODS OF USE THEREOF
#116INTERACTIVE SHELL EVENT DETECTION
#117METHOD FOR DEPLOYING CONTAINERIZED SECURITY TECHNOLOGIES ON EMBEDDED DEVICES
#118SYSTEM AND METHOD FOR IDENTIFYING CYBERTHREATS FROM UNSTRUCTURED SOCIAL MEDIA CONTENT
#119DIRECTED FUZZING FOR VULNERABILITY DETECTION
#120DIRECTED FUZZING FOR VULNERABILITY DETECTION
#121Privacy Border for a Portion of Resources on a Computing Machine
#122A CRITICAL INFRASTRUCTURE SIMULATION AND EMULATION SYSTEM AND METHOD
#123BROWSER EXTENSION ANALYSIS
#124AUTOMATED APPLICATION PROGRAMMING INTERFACE (API) TESTING
#125COMPARATIVE ANALYSIS OF BINARIES FOR SOFTWARE SUPPLY CHAIN SECURITY
#126SYSTEMS AND METHODS FOR AN AT-RISK SYSTEM IDENTIFICATION VIA ANALYSIS OF ONLINE HACKER COMMUNITY DISCUSSIONS
#127HISTORICAL RISK ASSESSMENT FOR RISK MITIGATION IN ONLINE ACCESS CONTROL
#128METHOD OF DETECTING VULNERABILITIES OF CONTAINER IMAGES AT RUNTIME
#129Generating Simulated Spear Phishing Messages and Customized Cybersecurity Training Modules Using Machine Learning
#130PRESERVING DLL HOOKS
#131REDUCING THE SIZE OF IMAGE FILES USABLE FOR DEPLOYING SOFTWARE IN COMPUTING ENVIRONMENTS
#132ENTITY IP MAPPING
#133Using an Entity Behavior Profile When Performing Human-Centric Risk Modeling Operations
#134DEVICE RISK-BASED TRUSTED DEVICE VERIFICATION AND REMOTE ACCESS PROCESSING SYSTEM
#135INFORMATION ANALYSIS APPARATUS, INFORMATION ANALYSIS METHOD, AND COMPUTER-READABLE RECORDING MEDIUM
#136METHOD AND SYSTEM FOR IDENTIFYING AN OPTIMIZED SET OF CODE COMMITS TO PERFORM VULNERABILITY REMEDIATION
#137A CYBERSECURITY VULNERABILITY MANAGEMENT SYSTEM AND METHOD THEREOF
#138TESTING DEVICE, TESTING METHOD, AND TESTING PROGRAM
#139Method And System For Data Flow Monitoring To Identify Application Security Vulnerabilities And To Detect And Prevent Attacks
#140SYSTEMS AND METHODS FOR IDENTIFYING DATA PROCESSING ACTIVITIES BASED ON DATA DISCOVERY RESULTS
#141ANALYSIS CONDITION GENERATING APPARATUS, ANALYSIS SYSTEM, ANALYSIS CONDITION GENERATING PROGRAM, ANALYSIS PROGRAM, ANALYSIS CONDITION GENERATING METHOD, AND ANALYSIS METHOD
#142TESTING OF SECURITY SYSTEMS IN INTEGRATED CIRCUITS
#143IDENTIFYING AND ASSESSING COSTS ASSOCIATED WITH CORRECTING VULNERABILITIES IN MACHINE LEARNING MODELS
#144Detecting anomalous Application Programming Interface (API) behaviors
#145RESOURCE CONSERVATION SYSTEM FOR SCALABLE IDENTIFICATION OF A SUBSET OF INPUTS FROM AMONG A GROUP OF INPUTS THAT CONTRIBUTED TO AN OUTPUT
#146SYSTEMS AND METHODS FOR IDENTIFYING AND MAPPING SENSITIVE DATA ON AN ENTERPRISE
#147Method for Determining the Integrity of a Data Processing Operation, Device, and Data Processing Installations
#148Security Event Modeling and Threat Detection Using Behavioral, Analytical, and Threat Intelligence Attributes
#149Locating Potentially-Exploitable Software Dependencies
#150VULNERABILITY REDUCTION FOR SYNTACTICALLY INCOMPLETE CODE
#151System and Method for Evaluating Penetration Testing Tools
#152SYSTEM AND METHOD FOR SCORING SECURITY ALERTS INCORPORATING ANOMALY AND THREAT SCORES
#153SYSTEMS AND METHODS FOR MANAGING MULTIPLE VALID ONE TIME PASSWORD (OTP) FOR A SINGLE IDENTITY
#154SELF-HEALING LEARNING SYSTEM FOR ONE OR MORE CONTROLLERS
#155SYSTEM AND METHOD FOR IMPLEMENTING TECHNOLOGY INFRASTRUCTURE UPGRADES USING AN AUTOMATED ELECTRONIC DATA AGGREGATION TOOL
#156MODULAR SECURITY EVALUATION OF SOFTWARE ON DEVICES
#157MATCHING SOFTWARE SYSTEMS WITH USERS FOR IDENTIFYING SYSTEM DEFECTS
#158SOURCE CODE CLUSTERING FOR AUTOMATICALLY IDENTIFYING FALSE POSITIVES GENERATED THROUGH STATIC APPLICATION SECURITY TESTING
#159SYSTEM AND METHOD FOR EVALUATING AN ORGANIZATION'S RISK FOR EXPOSURE TO CYBER SECURITY EVENTS
#160METHOD, APPARATUS, SYSTEM, AND COMPUTER PROGRAM FOR MANAGING SOFTWARE COMPONENT
#161SYSTEMS, DEVICES, AND METHODS FOR ANALYZING RANSOMWARE THREAT INTELLIGENCE
#162SUPPORTING SECURE WORKSPACES IN HETEROGENOUS ENVIRONMENTS
#163SECURE PEER-TO-PEER FILE DISTRIBUTION IN AN ENTERPRISE ENVIRONMENT
#164Input validation using mathematical expressions
#165INSTRUMENTING OBSERVABILITY CONTROLS
#166VULNERABILITY MANAGEMENT FOR DISTRIBUTED SOFTWARE SYSTEMS
#167AUTOMATED GENERATION OF ADAPTIVE-SECURITY AND COMPLIANCE-AWARE DISTRIBUTED SOFTWARE DELIVERY PIPELINES
#168ATTRIBUTE BASED DATA ACCESS CONTROL
#169APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTION
#170INTELLIGENT OBFUSCATION OF MOBILE APPLICATIONS
#171DATA MANAGEMENT USING SECURE BROWSERS
#172SYSTEM AND METHOD FOR OBJECTIVE QUANTIFICATION AND MITIGATION OF PRIVACY RISK
#173SEMICONDUCTOR DEVICE AND METHOD OF MANAGING SECRET INFORMATION
#174SYSTEMS AND METHODS FOR CYBERTHREAT-RISK EDUCATION AND AWARENESS
#175METHOD AND DEVICE FOR BUILDING VULNERABILITY DATABASE
#176SYSTEMS AND METHODS FOR AGGREGATED VULNERABILITY PROOFING OF AN IHS
#177SYSTEMS AND METHODS FOR VULNERABILITY PROOFING MACHINE LEARNING RECOMMENDATIONS
#178SYSTEMS AND METHODS FOR VULNERABILITY PROOFING INTERDEPENDENT IHS COMPONENTS
#179SYSTEMS AND METHODS FOR VULNERABILITY PROOFING DURING IHS PROVISIONING
#180SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN CONFIGURING AN IHS
#181SYSTEMS AND METHODS FOR VALIDATED VULNERABILITY PROOFING
#182SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN USING A BOOTABLE IMAGE
#183SYSTEMS AND METHODS FOR CONTEXT-AWARE VULNERABILITY RISK SCORES
#184SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN GENERATING IHS UPDATES
#185SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN UPDATING AN IHS
#186SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN BOOTING AN IHS
#187SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN ADDING AND REPLACING IHS HARDWARE
#188MONITORING AND REMEDIATION OF CYBERSECURITY RISK BASED ON CALCULATION OF CYBER-RISK DOMAIN SCORES
#189Systems and Methods for API Security Integration
#190SYSTEMS AND METHODS FOR PREDICTING WHICH SOFTWARE VULNERABILITIES WILL BE EXPLOITED BY MALICIOUS HACKERS TO PRIORITIZE FOR PATCHING
#191Software Composition Analysis on Target Source Code
#192INTEGRATED SECURITY AND THREAT PREVENTION AND DETECTION PLATFORM
#193TECHNIQUES FOR DATA CLASSIFICATION AND FOR PROTECTING CLOUD ENVIRONMENTS FROM CYBERSECURITY THREATS USING DATA CLASSIFICATION
#194AUTOMATED REMEDIATION OF EXPOSED SECRETS
#195PROVIDING A GRAPHICAL REPRESENTATION OF ANOMALOUS EVENTS
#196ACCESS CONTROL METHOD AND RELATED APPARATUS
#197System and Method for Displaying a Scalable Cyber-Risk Assessment of a Computer System
#198Predicting and Quantifying Weaponization of Software Weaknesses
#199APPARATUS FOR VERIFYING SOFTWARE INTEGRITY OF VEHICLE CONTROLLER AND METHOD THEREOF
#200THREAT DETECTION AND MITIGATION IN A NETWORKED ENVIRONMENT
#201SYSTEMS AND METHODS FOR INTRODUCING DATA QUALITY AWARENESS IN SECURITY ANALYTICS SOLUTIONS
#202MEASURING CONTAINERS
#203SCANNING OF PARTIAL DOWNLOADS
#204VULNERABILITY ANALYSIS FOR SOFTWARE PRODUCTS
#205Authoritative Domain Name System (DNS) Server Responding to DNS Requests With IP Addresses Selected from a Larger Pool Of IP Addresses
#206ONE OR MORE DEVICES PROVIDING IMPROVED SECURITY FOR ANY DATABASE INCLUDING DISTRIBUTED APPLICATIONS AND SMART CONTRACTS
#207GENERATING A MULTI-PLATFORM REMEDIATION INFRASTRUCTURE BASED ON INTELLIGENTLY FORECASTING AND CONFIGURING A REMEDIATION SCHEDULE
#208Automated Software Code Validation and Deployment
#209A SYSTEM AND METHODS FOR SANDBOXED SOFTWARE ANALYSIS WITH AUTOMATED VULNERABILITY DETECTION AND PATCH DEVELOPMENT, DEPLOYMENT AND VALIDATION
#210METHOD AND SYSTEM FOR ANALYZING CYBERSECURITY THREATS AND IMPROVING DEFENSIVE INTELLIGENCE
#211EVALUATION OF SECURITY RISK BASED ON COMPARING DATA FOR NEW SOFTWARE APPLICATIONS TO HISTORICAL APPLICATION DATA
#212COMMUNICATION DEVICE, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE, AND METHOD PERFORMED BY COMMUNICATION DEVICE
#213DELIVERING AUGMENTED THREAT ASSESSMENT VALUES TO A SECURITY THREAT MANAGEMENT FACILITY
#214K-ANONYMOUS VULNERABILITY DETECTION
#215TRANSPARENT WEB CONTENT VALIDATION TREE
#216Asset Grouping Rules for Vulnerability Detection and Management in IT Systems
#217Determining Trend Records for Vulnerability Detection and Management in IT Systems
#218Systems and Methods For Protecting Against Malware Attacks
#219METHODS AND APPARATUS TO DISABLE SELECT PROCESSES FOR MALWARE PREVENTION
#220DETECTING AND RESPONDING TO ENVIRONMENTAL CONDITION-INDUCED SECURITY ATTACKS ON SEMICONDUCTOR PACKAGES
#221METHOD FOR GENERATING AND EXECUTING A DATA PROCESSING PIPELINE
#222RECOMMENDING VERSION UPDATES FOR SOFTWARE PACKAGES
#223AUTOMATED TESTING OF OPERATING SYSTEM (OS) KERNEL HELPER FUNCTIONS ACCESSIBLE THROUGH EXTENDED BPF (eBPF) FILTERS
#224COMPUTER SYSTEM AND EVALUATION METHOD FOR CYBER SECURITY INFORMATION
#225CLOUD SCANNER WITH DATABASE SCHEMA DETECTION
#226COMPUTATIONAL RISK ANALYSIS AND INTERMEDIATION
#227OFFLINE PLATFORM INFORMATION TECHNOLOGY CYBER-PHYSICAL RISK MITIGATION
#228INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
#229PROTECTING SOFTWARE DEVELOPMENT ENVIRONMENTS FROM MALICIOUS ACTORS
#230MONITORING SECURITY RISK OF A COMPUTING DEVICE
#231AUTOMATED TRUST CENTER FOR REAL-TIME SECURITY AND COMPLIANCE MONITORING
#232VERIFYING ENCRYPTION OF DATA TRAFFIC
#233COMPUTER IMPLEMENTED METHOD
#234SYSTEM FOR PROCESSING CONTENT IN SCAN AND REMEDIATION PROCESSING
#235SYSTEMS AND METHODS FOR DIGITAL CERTIFICATE SECURITY
#236ANOMALY DETECTION SYSTEM, ANOMALY DETECTION METHOD, AND RECORDING MEDIUM
#237METHOD AND SYSTEM FOR PATCHING WEBSITES RUNNING IN A .NET FRAMEWORK ENVIRONMENT
#238MEDIA PRIVACY WITHOUT COMPROMISING MONITORING EFFECTIVENESS
#239Vertically Integrated Automatic Threat Level Determination For Containers And Hosts In A Containerization Environment
#240CONTEXT PROFILING FOR MALWARE DETECTION
#241METHOD AND APPARATUS OF ANOMALY DETECTION OF SYSTEM LOGS BASED ON SELF-SUPERVISED LEARNING
#242EBPF-BASED HOT PATCH ENGINE DEVICE FOR PROTECTING KERNEL VULNERABILITIES, SYSTEM AND METHOD INCLUDING THE SAME
#243TRANSFER ANOMALY DETECTION USING ONLINE DEEP SETS
#244SYSTEMS AND METHODS FOR MONITORING A PLURALITY OF VEHICLES
#245GENERATION OF A BUSINESS ENVIRONMENT EVALUATION REGARDING A SYSTEM ASPECT OF A SYSTEM
#246ELECTRONIC SYSTEM FOR IDENTIFYING FAULTY CODE AND VULNERABILITIES IN SOFTWARE PROGRAMS USING LINKED EVALUATION TOOLS
#247Computing Platform for the Secure Execution of Penetration Tests and for the Secure Validation of Cybersecurity of Computer Resources of Embedded Systems
#248INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND SYSTEM
#249SOFTWARE VULNERABILITY REMEDIATION
#250MULTI-LAYERED GRAPH MODELING FOR SECURITY RISK ASSESSMENT
#251FASTER WEB APPLICATION SCANS OF WEB PAGE DATA BASED ON DEDUPLICATION
#252SUPERVISED ANOMALY DETECTION IN FEDERATED LEARNING
#253MALWARE SCANS
#254SCANNING A BACKUP FOR VULNERABILITIES
#255THREAT CHANGE ANALYSIS SYSTEM
#256METHODS AND SYSTEMS FOR HARDWARE AND FIRMWARE SECURITY MONITORING
#257Device, System, and Method for Protecting Machine Learning (ML) Units, Artificial Intelligence (AI) Units, Large Language Model (LLM) Units, and Deep Learning (DL) Units
#258BUILD PROCESS SECURITY FRAMEWORK
#259CLOUD-AGNOSTIC CODE ANALYSIS
#260ELECTRONIC SYSTEM FOR SECURITY ANALYSIS AND VALIDATION DURING CONSTRUCTION AND DEPLOYMENT OF DYNAMIC NETWORK COMPONENTS
#261TECHNIQUES FOR DETECTING APPLICATIONS PATHS UTILIZING EXPOSURE ANALYSIS
#262TECHNIQUES FOR TECHNOLOGY STACK DISCOVERY USING EXTERNAL EXPOSURE IN CLOUD ENVIRONMENTS
#263IDENTIFICATION OF A RESOURCE ATTACK PATH BY CONNECTING CODE, CONFIGURATION, AND TELEMETRY
#264Hierarchical health index evaluation method and apparatus for intelligent substation
#265INTELLIGENT SERVICE SECURITY ENFORCEMENT SYSTEM
#266DEPLOYABLE CONTAINER SCHEDULING AND EXECUTION ON CLOUD DEVELOPMENT ENVIRONMENT
#267TESTING ADVERSARIAL ROBUSTNESS OF SYSTEMS WITH LIMITED ACCESS
#268SYMBOL NARROWING-DOWN APPARATUS, PROGRAM ANALYSIS APPARATUS, SYMBOL EXTRACTION METHOD, PROGRAM ANALYSIS METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
#269BUILDING MANAGEMENT SYSTEM WITH CYBER HEALTH DASHBOARD
#270SCALABLE SOURCE CODE VULNERABILITY REMEDIATION
#271INFORMATION COLLECTION CONTROL APPARATUS, INFORMATION COLLECTION SYSTEM, INFORMATION COLLECTION CONTROL METHOD, AND INFORMATION COLLECTION CONTROL PROGRAM
#272ORCHESTRATOR REPORTING OF PROBABILITY OF DOWNTIME FROM MACHINE LEARNING PROCESS
#273ACTIVITY-BASED CONTENT OBJECT ACCESS PERMISSIONS
#274ARTIFICIAL INTELLIGENCE ARCHITECTURE FOR MANAGING MULTI-STAGE PROCESSES
#275SYSTEMS, METHODS, AND GRAPHICAL USER INTERFACE FOR BROWSER DATA PROTECTION
#276SYSTEMS AND METHODS FOR COMBATING ONLINE SECURITY RISKS
#277VULNERABILITY RISK PREDICTION ENGINE
#278METHOD FOR PROVIDING SECURITY POSTURE, FUNCTIONAL UPDATES FOR ENTERPRISE ITDM
#279ARTIFICIAL INTELLIGENCE BASED SECURITY REQUIREMENTS IDENTIFICATION AND TESTING
#280INTELLIGENT PRE-BOOT INDICATORS OF VULNERABILITY
#281Systems, Methods and Devices for Memory Analysis and Visualization
#282DETECTING ANOMALIES ONLINE USING CONTROLLER PROCESSING ACTIVITY
#283REAL-TIME SCANNING OF IP ADDRESSES
#284EXPLOIT DETECTION VIA INDUCED EXCEPTIONS
#285SYSTEM AND METHOD FOR HUNT, INCIDENT RESPONSE, AND FORENSIC ACTIVITIES ON AN AGNOSTIC PLATFORM
#286Dynamic network risk predicting method based on a graph neural network
#287CONTROL FLOW INTEGRITY INSTRUCTION POINTER PATCHING
#288LEARNED CONTROL FLOW MONITORING AND ENFORCEMENT OF UNOBSERVED TRANSITIONS
#289CONTROL FLOW INTEGRITY MONITORING BASED INSIGHTS
#290SOURCE CODE VULNERABILITY DETECTION AND REPAIR THROUGH MACHINE LEARNING
#291PRE-OPERATING SYSTEM EMBEDDED CONTROLLER HARDENING BASED ON OPERATING SYSTEM SECURITY AWARENESS
#292METHOD AND APPARATUS FOR CREATING A MALWARE DETECTION DATASET
#293VULNERABILITY DETECTION METHOD AND DEVICE
#294METHOD AND SYSTEM FOR EXECUTING AN APPLICATION UPGRADE USING NETWORK SLICING
#295METHODS AND APPARATUS FOR SYSTEM FIREWALLS
#296SYSTEMS AND METHODS FOR FEDERATED FEEDBACK AND SECURE MULTI-MODEL TRAINING WITHIN A ZERO-TRUST ENVIRONMENT
#297LOG-BASED VULNERABILITIES DETECTION AT RUNTIME
#298VULNERABILITY ASSESSMENT OF MACHINE IMAGES IN DEVELOPMENT PHASE
#299FUZZING GUIDED BINARY HARDENING
#300SYSTEMS AND METHODS FOR MODERNIZING WORKSPACE AND HARDWARE LIFECYCLE MANAGEMENT IN AN ENTERPRISE PRODUCTIVITY ECOSYSTEM