H04L63/1491 - CPC Classification

Classification description:

Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic; Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment

Recent Application in this class:
#1
20240291864
2024-08-29

INTRUSION DETECTION BASED ON IMPLICIT ACTIVE LEARNING

#2
20240283823
2024-08-22

ELECTRONIC APPARATUS FOR IMPLEMENTING HONEYPOT CONTROL SYSTEM AND CONTROL METHOD THEREOF

#3
20240283822
2024-08-22

LAYERED CYBERSECURITY USING SPURIOUS DATA SAMPLES

#4
20240275815
2024-08-15

SYSTEMS, METHODS, AND APPARATUSES FOR ACTIVATING A DECOY RESOURCE BASED ON DURESS TRIGGERS IN AN ELECTRONIC NETWORK

#5
20240275811
2024-08-15

CYBER SECURITY SYSTEM AND METHOD USING INTELLIGENT AGENTS

#6
20240267397
2024-08-08

INTERCEPTING WORTHLESS REQUESTS AT THE NETWORK EDGE USING MACHINE LEARNING

#7
20240250988
2024-07-25

DETERMINING UNAUTHORISED REQUESTS FROM SENDERS OF AN ELECTRONIC COMMUNICATION

#8
20240244089
2024-07-18

HONEYPOT ENTITY AND METHOD OF OPERATING THE SAME

#9
20240236148
2024-07-11

Cyber Security Deception System

#10
20240223600
2024-07-04

METHOD AND APPARATUS FOR DDoS ATTACK DETECTION AND MITIGATION IN IoT NETWORK SLICES OF 5G NETWORKS

#11
20240214420
2024-06-27

APPLICATION FIREWALL

#12
20240214404
2024-06-27

System and Method for Detecting and Preventing Model Inversion Attacks

#13
20240205194
2024-06-20

DNS REQUEST OBFUSCATION

#14
20240195837
2024-06-13

DETECTING ANOMALOUS COMMUNICATIONS

#15
20240187452
2024-06-06

NETWORK-BASED SECURITY WITH DECOYS AND DECEPTIVE BALANCING

#16
20240187445
2024-06-06

METHOD, APPARATUS, AND SYSTEM TO MAP NETWORK REACHABILITY

#17
20240179156
2024-05-30

TECHNIQUES FOR INCENTIVIZED INTRUSION DETECTION SYSTEM

#18
20240163312
2024-05-16

Calculation of Security Risk Score of Network Security Services

#19
20240160502
2024-05-16

SYSTEM, METHOD, AND COMPUTER-ACCESSIBLE MEDIUM FOR EVALUATING MULTI-DIMENSIONAL SYNTHETIC DATA USING INTEGRATED VARIANTS ANALYSIS

#20
20240155002
2024-05-09

ATTACK DETECTION SYSTEM

#21
20240129338
2024-04-18

Risk Mitigation Effectiveness Score of Network Security Services

#22
20240121248
2024-04-11

REVEALING BYZANTINE ATTACKERS THROUGH SMART RE-CLUSTERING IN FEDERATED LEARNING

#23
20240104205
2024-03-28

MALWARE DETECTION BASED ON USER INTERACTIONS

#24
20240056482
2024-02-15

EXPEDITED RECOVERY BASED ON DATA STORAGE MANAGEMENT INTEGRATION WITH CYBER THREAT DECEPTION

#25
20240056481
2024-02-15

DATA STORAGE MANAGEMENT SYSTEM INTEGRATING CYBER THREAT DECEPTION

#26
20240054029
2024-02-15

SYSTEMS AND METHODS TO IDENTIFY NEURAL NETWORK BRITTLENESS BASED ON SAMPLE DATA AND SEED GENERATION

#27
20240039954
2024-02-01

Cybersecurity Risk Analysis and Modeling of Risk Data on an Interactive Display

#28
20240031477
2024-01-25

MACHINE LEARNING DATASET GENERATION USING A NATURAL LANGUAGE PROCESSING TECHNIQUE

#29
20240031407
2024-01-25

Honeypot Network Management Based on Probabilistic Detection of Malicious Port Activity

#30
20240031406
2024-01-25

METHODS AND SYSTEMS FOR HONEYFILE CREATION, DEPLOYMENT AND MANAGEMENT

#31
20240028717
2024-01-25

Deception-Based Responses to Security Attacks

#32
20240022589
2024-01-18

RISK ANALYSIS DEVICE, ANALYSIS TARGET ELEMENT DETERMINATION DEVICE, AND METHOD

#33
20240015183
2024-01-11

DECEPTION-BASED FIREWALL ENHANCEMENT

#34
20240007503
2024-01-04

Deceiving Attackers Accessing Network Data

#35
20230421576
2023-12-28

HIGHLY COLLABORATIVE DECEPTIVE NETWORK ALLIANCE

#36
20230388344
2023-11-30

DECEIVING ATTACKERS ACCESSING ACTIVE DIRECTORY DATA

#37
20230379362
2023-11-23

HONEYPOTS FOR INFRASTRUCTURE-AS-A-SERVICE SECURITY

#38
20230379361
2023-11-23

SYSTEM AND METHOD FOR GENERATING CYBER THREAT INTELLIGENCE

#39
20230376362
2023-11-23

SYSTEMS AND METHODS FOR SYNTHETIC DATA GENERATION FOR TIME-SERIES DATA USING DATA SEGMENTS

#40
20230370495
2023-11-16

Breach prediction via machine learning

#41
20230370494
2023-11-16

QUANTUM SECURE DIRECT COMMUNICATION WITH MUTUAL AUTHENTICATION VIA ROTATION OF AN ARBITRARY BASIS

#42
20230362194
2023-11-09

Method for ransomware strike detection and defense, and ransomware security operations center (SOC)

#43
20230351014
2023-11-02

METHOD TO PREVENT ROOT LEVEL ACCESS ATTACK AND MEASURABLE SLA SECURITY AND COMPLIANCE PLATFORM

#44
20230344870
2023-10-26

EDGE-BASED DECENTRALIZED INTRUSION AND ANOMALY DETECTION

#45
20230308482
2023-09-28

Enhancing network security

#46
20230308481
2023-09-28

Enhancing network security

#47
20230308480
2023-09-28

Enhancing network security

#48
20230308274
2023-09-28

Enhancing network security

#49
20230297446
2023-09-21

DATA MODEL GENERATION USING GENERATIVE ADVERSARIAL NETWORKS

#50
20230283635
2023-09-07

Deceiving attackers accessing network data

#51
20230283634
2023-09-07

DETERMINING INTENT OF PHISHERS THROUGH ACTIVE ENGAGEMENT

#52
20230281062
2023-09-07

Systems and methods for motion correction in synthetic images

#53
20230273841
2023-08-31

REAL-TIME SYNTHETICALLY GENERATED VIDEO FROM STILL FRAMES

#54
20230267201
2023-08-24

Method to prevent root level access attack and measurable SLA security and compliance platform

#55
20230247052
2023-08-03

SYSTEMS AND METHODS FOR REPORTING BASED SIMULATED PHISHING CAMPAIGN

#56
20230239323
2023-07-27

SYSTEMS AND METHODS FOR AUTOMATED MALICIOUS CODE REPLACEMENT

#57
20230231882
2023-07-20

HONEYPOT IDENTIFICATION METHOD, APPARATUS, DEVICE, AND MEDIUM BASED ON CYBERSPACE MAPPING

#58
20230231881
2023-07-20

METHOD AND SYSTEM FOR GENERATING DECOY FILES USING A DEEP LEARNING ENGINE FOR PROTECTION AGAINST RANSOMWARE ATTACKS

#59
20230231880
2023-07-20

SECURE SENTINEL NETWORK

#60
20230208879
2023-06-29

DETECTING PHISHING ATTACKS

#61
20230208810
2023-06-29

CONTEXT-AWARE SERVICE QUERY FILTERING

#62
20230205610
2023-06-29

SYSTEMS AND METHODS FOR REMOVING IDENTIFIABLE INFORMATION

#63
20230195541
2023-06-22

SYSTEMS AND METHODS FOR SYNTHETIC DATA GENERATION

#64
20230179631
2023-06-08

System and method for detection of malicious interactions in a computer network

#65
20230179630
2023-06-08

UNCHEATABLE FEDERATED LEARNING

#66
20230179606
2023-06-08

TRACKING A POTENTIAL ATTACKER ON AN EXTERNAL COMPUTER SYSTEM

#67
20230171289
2023-06-01

Multiple personality deception systems

#68
20230171227
2023-06-01

Socket transferring for HPC networks using kernel tracing

#69
20230164184
2023-05-25

Cloud-based deception technology with auto-decoy and breadcrumb creation

#70
20230164183
2023-05-25

Cloud-based deception technology with granular scoring for breach detection

#71
20230164182
2023-05-25

Cloud-based deception technology utilizing zero trust to identify threat intelligence, telemetry, and emerging adversary tactics and techniques

#72
20230156037
2023-05-18

METHODS AND SYSTEM FOR PROVIDING SECURITY TO CRITICAL SYSTEMS CONNECTED TO A COMPUTER NETWORK

#73
20230156021
2023-05-18

Network threat prevention

#74
20230153177
2023-05-18

Systems and methods to improve data clustering using a meta-clustering model

#75
20230144947
2023-05-11

Endpoint and remote server protection

#76
20230138200
2023-05-04

SECURITY MANAGEMENT METHOD AND SYSTEM FOR BLENDED ENVIRONMENT

#77
20230136989
2023-05-04

SYSTEMS AND METHODS FOR USING ARTIFICIAL INTELLIGENCE DRIVEN AGENT TO AUTOMATE ASSESSMENT OF ORGANIZATIONAL VULNERABILITIES

#78
20230111771
2023-04-13

Method, apparatus, and system to map network reachability

#79
20230106071
2023-04-06

Method for automatic aggregating and enriching data from honeypots

#80
20230096040
2023-03-30

Artificial virtual machine for preventing malware execution by applying virtual machine characteristics in real computing environments

#81
20230076399
2023-03-09

Migration of traffic flows

#82
20230073695
2023-03-09

SYSTEMS AND METHODS FOR SYNTHETIC DATABASE QUERY GENERATION

#83
20230068346
2023-03-02

Application self-defense through deceptive message transmission

#84
20230065321
2023-03-02

Implementing decoys in a network environment

#85
20230061142
2023-03-02

Methods and systems for deep learning based API traffic security

#86
20230060323
2023-03-02

HOW TO CONFUSE ADVERSARIAL ENVIRONMENT MAPPING TOOLS

#87
20230052452
2023-02-16

Socket transferring for HPC networks using kernel tracing

#88
20230032139
2023-02-02

HIGH SPEED TRUST EVALUATION FOR FILE ACTIVITY

#89
20230026652
2023-01-26

Techniques for incentivized intrusion detection system

#90
20230007044
2023-01-05

CLEANING RECOVERY METHOD AND DEVICE FOR HETEROGENEOUS EXECUTOR IN MIMICRY SWITCH, AND MIMICRY SWITCH

#91
20230004971
2023-01-05

DYNAMIC ONLINE BANKING HONEYPOT ACCOUNT SYSTEM

#92
20220414245
2022-12-29

Dynamic virtual honeypot utilizing honey tokens and data masking

#93
20220394481
2022-12-08

Wireless network that discovers hotspots for cyberattacks based on social media data

#94
20220394060
2022-12-08

LOOKALIKE DOMAIN IDENTIFICATION

#95
20220394049
2022-12-08

Detecting threat pathways using sequence graphs

#96
20220385677
2022-12-01

CLOUD-BASED SECURITY FOR IDENTITY IMPOSTER

#97
20220385676
2022-12-01

INJECTING COMPUTING CODE FOR DETECTION OF MALICIOUS COMPUTING ATTACKS DURING SUSPICIOUS DEVICE BEHAVIOR

#98
20220358245
2022-11-10

Coordinated privacy for targeted communications and reporting

#99
20220353278
2022-11-03

Procedures for Improving Security in an Electronic Communications Network

#100
20220329627
2022-10-13

TUNNELING FOR NETWORK DECEPTIONS

#101
20220318078
2022-10-06

System, method, and computer-accessible medium for evaluating multi-dimensional synthetic data using integrated variants analysis

#102
20220311784
2022-09-29

Methods for protecting pattern classification node from malicious requests and related networks and nodes

#103
20220309158
2022-09-29

Method to prevent root level access attack and measurable SLA security and compliance platform

#104
20220308942
2022-09-29

SYSTEMS AND METHODS FOR CENSORING TEXT INLINE

#105
20220303309
2022-09-22

METHOD AND COMPUTER PROGRAM PRODUCT FOR HACKING DETECTION

#106
20220294822
2022-09-15

Systems and methods for building a honeypot system

#107
20220294781
2022-09-15

Preventing network discovery by untrusted devices

#108
20220290397
2022-09-15

CONCRETE FOUNDATION FORM

#109
20220286478
2022-09-08

METHODS AND SYSTEMS FOR HONEYFILE CREATION, DEPLOYMENT, AND MANAGEMENT

#110
20220269781
2022-08-25

Intelligent Friction for Authentication Methods and Systems

#111
20220255962
2022-08-11

Systems and methods for creation, management, and storage of honeyrecords

#112
20220239695
2022-07-28

DECEPTION SYSTEM

#113
20220239694
2022-07-28

SYSTEM AND METHOD FOR DETECTION AND DEFLECTION OF ATTACKS ON IN-VEHICLE CONTROLLERS AND NETWORKS

#114
20220232033
2022-07-21

Method and system for generating stateful attacks

#115
20220232026
2022-07-21

Intrusion detection system enrichment based on system lifecycle

#116
20220217177
2022-07-07

Intrusion management with threat type clustering

#117
20220201038
2022-06-23

CONTAINING COMPROMISED CREDENTIALS USING DECEPTION SYSTEMS

#118
20220191246
2022-06-16

High-fidelity model-driven deception platform for cyber-physical systems

#119
20220182412
2022-06-09

SYSTEMS AND METHODS OF EVALUATING PROBE ATTRIBUTES FOR SECURING A NETWORK

#120
20220166796
2022-05-26

Using cloned accounts to track attacks on user accounts

#121
20220166795
2022-05-26

Defense of targeted database attacks through dynamic honeypot database response generation

#122
20220166794
2022-05-26

Application firewall

#123
20220166793
2022-05-26

Systems and methods for polluting phishing campaign responses

#124
20220159011
2022-05-19

CREDENTIAL RENEWAL CONTINUITY FOR APPLICATION DEVELOPMENT

#125
20220147405
2022-05-12

AUTOMATICALLY SCALABLE SYSTEM FOR SERVERLESS HYPERPARAMETER TUNING

#126
20220141253
2022-05-05

Large scale high-interactive honeypot farm

#127
20220141194
2022-05-05

Smart proxy for a large scale high-interaction honeypot farm

#128
20220141183
2022-05-05

Detecting and Preventing Transmission of Spam Messages Using Modified Source Numbers

#129
20220131898
2022-04-28

Dynamic honeypots

#130
20220131897
2022-04-28

MEMORY DECOYS

#131
20220116421
2022-04-14

Network intrusion counter-intelligence

#132
20220109702
2022-04-07

Monitoring system for securing networks from hacker drones

#133
20220109692
2022-04-07

Automatic generation of deceptive API endpoints

#134
20220109691
2022-04-07

Systems and methods for AIDA based grouping

#135
20220107851
2022-04-07

Automated honeypot creation within a network

#136
20220083402
2022-03-17

Dataset connector and crawler to identify data lineage and segment data

#137
20220075872
2022-03-10

METHOD AND SYSTEM FOR DETECTING MALICIOUS INFRASTRUCTURE

#138
20220075670
2022-03-10

SYSTEMS AND METHODS FOR REPLACING SENSITIVE DATA

#139
20220070673
2022-03-03

Wireless network that discovers hotspots for cyberattacks based on social media data

#140
20220070219
2022-03-03

Methods and systems for preventing malicious activity in a computer system

#141
20220070218
2022-03-03

Live state transition using deception systems

#142
20220070215
2022-03-03

Method and Apparatus for Evaluating Phishing Sites to Determine Their Level of Danger and Profile Phisher Behavior

#143
20220060515
2022-02-24

User responses to cyber security threats

#144
20220053022
2022-02-17

AUTOMATED PREEMPTIVE POLYMORPHIC DECEPTION

#145
20220046040
2022-02-10

DETECTION DEVICE, DETECTION METHOD, AND DETECTION PROGRAM

#146
20220045990
2022-02-10

Methods and systems for API deception environment and API traffic control and security

#147
20220038499
2022-02-03

BESPOKE HONEYPOT (CHIMAERA) FOR NETWORK SECURITY

#148
20220030014
2022-01-27

Method for detecting intrusion in distributed field bus of a network and system thereof

#149
20220030011
2022-01-27

Demand management of sender of network traffic flow

#150
20220030009
2022-01-27

COMPUTER SECURITY BASED ON ARTIFICIAL INTELLIGENCE

#151
20220021655
2022-01-20

Optimization of redundant usage patterns based on historical data and security constraints

#152
20220007193
2022-01-06

Security system with 5G network traffic incubation

#153
20220006834
2022-01-06

Detection of privilege escalation attempts within a computer network

#154
20220004632
2022-01-06

Malware detection based on user interactions

#155
20210409446
2021-12-30

LEVERAGING NETWORK SECURITY SCANNING TO OBTAIN ENHANCED INFORMATION REGARDING AN ATTACK CHAIN INVOLVING A DECOY FILE

#156
20210385242
2021-12-09

METHODS AND SYTEMS FOR IMPLEMENTING A PHISHING ASSESSMENT

#157
20210377307
2021-12-02

Reinforcement learning for application responses using deception technology

#158
20210377306
2021-12-02

Trend-aware combo-squatting detection

#159
20210365305
2021-11-25

SYSTEMS AND METHODS FOR QUICKLY SEARCHING DATASETS BY INDEXING SYNTHETIC DATA GENERATING MODELS

#160
20210360028
2021-11-18

Protecting from directory enumeration using honeypot pages within a network directory

#161
20210352105
2021-11-11

DECEPTION USING SCREEN CAPTURE

#162
20210352104
2021-11-11

DETECTING MALICIOUS ACTIVITY IN A CLUSTER

#163
20210352103
2021-11-11

Dynamic maze honeypot response system

#164
20210344715
2021-11-04

Intrusion detection with honeypot keys

#165
20210344714
2021-11-04

Cyber threat deception method and system, and forwarding device

#166
20210344713
2021-11-04

Systems and methods for reporting based simulated phishing campaign

#167
20210329459
2021-10-21

SYSTEM AND METHOD FOR ROGUE DEVICE DETECTION

#168
20210329031
2021-10-21

HONEYPOT HOST

#169
20210314356
2021-10-07

Methods and systems for honeyfile creation, deployment and management

#170
20210288999
2021-09-16

Approaches for securing middleware data access

#171
20210288998
2021-09-16

Monitoring and reporting connection attempts in a network

#172
20210288960
2021-09-16

Authentication using client login metrics

#173
20210281602
2021-09-09

Generating action recommendations for courses of action used for incident response

#174
20210281599
2021-09-09

Cyber security system and method using intelligent agents

#175
20210258346
2021-08-19

Tagging network data

#176
20210258283
2021-08-19

Document Tracking Method, Gateway Device, and Server

#177
20210256120
2021-08-19

Utilization of deceptive decoy elements to identify data leakage processes invoked by suspicious entities

#178
20210255907
2021-08-19

Real-time synthetically generated video from still frames

#179
20210243226
2021-08-05

LIFELONG LEARNING BASED INTELLIGENT, DIVERSE, AGILE, AND ROBUST SYSTEM FOR NETWORK ATTACK DETECTION

#180
20210234894
2021-07-29

Systems and methods for aida based A/B testing

#181
20210226993
2021-07-22

Maintaining interactive session continuity in honeypot deployments

#182
20210226992
2021-07-22

Honeypot opaque credential recovery

#183
20210224142
2021-07-22

Systems and methods for removing identifiable information

#184
20210211466
2021-07-08

Behavior management of deception system fleets

#185
20210211465
2021-07-08

Honeypot deployment based on lifecycle of protected hosts

#186
20210203696
2021-07-01

Ratio-based management of honeypot fleets

#187
20210200604
2021-07-01

Systems and methods for motion correction in synthetic images

#188
20210194926
2021-06-24

Intelligent-interaction honeypot for IoT devices

#189
20210194925
2021-06-24

Large scale high-interactive honeypot farm

#190
20210194853
2021-06-24

Smart proxy for a large scale high-interaction honeypot farm

#191
20210194762
2021-06-24

Honeypot asset cloning

#192
20210185087
2021-06-17

Automated preemptive polymorphic deception

#193
20210185023
2021-06-17

Parallel scheduling of encryption engines and decryption engines to prevent side channel attacks

#194
20210182126
2021-06-17

Systems and methods to identify breaking application program interface changes

#195
20210168237
2021-06-03

Machine learning dataset generation using a natural language processing technique

#196
20210168173
2021-06-03

DETECTION AND REMEDIATION OF MALICIOUS NETWORK TRAFFIC USING TARPITTING

#197
20210166263
2021-06-03

IDENTIFICATION OF SOFTWARE ROBOT ACTIVITY

#198
20210160284
2021-05-27

Systems and methods for detecting a suspicious process in an operating system environment using a file honeypots

#199
20210160283
2021-05-27

Management of botnet attacks to a computer network

#200
20210152598
2021-05-20

Network application firewall

#201
20210152597
2021-05-20

Systems and methods for artificial intelligence driven agent campaign controller

#202
20210152578
2021-05-20

System and method for protecting a communication device against identification outside a computer network by routing traffic through a smart hub

#203
20210144181
2021-05-13

Protecting network-based services using deception in a segmented network environment

#204
20210144175
2021-05-13

COMMUNICATION CONTROL DEVICE

#205
20210136109
2021-05-06

Systems and methods for AIDA based grouping

#206
20210120037
2021-04-22

MONITORING APPARATUS, MONITORING METHOD, AND PROGRAM

#207
20210120022
2021-04-22

Network security blacklist derived from honeypot statistics

#208
20210112096
2021-04-15

Generating false data for suspicious users

#209
20210092224
2021-03-25

Machine learning dataset generation using a natural language processing technique

#210
20210081261
2021-03-18

Systems and methods for synthetic data generation for time-series data using data segments

#211
20210075790
2021-03-11

Attacker detection via fingerprinting cookie mechanism

#212
20210067554
2021-03-04

REAL-TIME NOTIFICATIONS ON DATA BREACH DETECTED IN A COMPUTERIZED ENVIRONMENT

#213
20210067553
2021-03-04

Honeypots for infrastructure-as-a-service security

#214
20210067552
2021-03-04

Smart exposure of data to known attacker sessions

#215
20210067551
2021-03-04

Identifier-based application security

#216
20210067540
2021-03-04

Methods, systems and media for evaluating layered computer security products

#217
20210058428
2021-02-25

Disinformation ecosystem for cyber threat intelligence collection

#218
20210056205
2021-02-25

System and method for preventing unwanted bundled software installation

#219
20210051176
2021-02-18

SYSTEMS AND METHODS FOR PROTECTION FROM PHISHING ATTACKS

#220
20210051175
2021-02-18

Software defined networking moving target defense honeypot

#221
20210049054
2021-02-18

Automated honeypot creation within a network

#222
20210037055
2021-02-04

Techniques for incentivized intrusion detection system

#223
20210037054
2021-02-04

Augmented data collection from suspected attackers of a computer network

#224
20210029164
2021-01-28

User responses to cyber security threats

#225
20210021640
2021-01-21

Tunneling for network deceptions

#226
20210021612
2021-01-21

Message platform for automated threat simulation, reporting, detection, and remediation

#227
20210014271
2021-01-14

Systems and methods for AIDA based A/B testing

#228
20210014197
2021-01-14

DYNAMIC ENDPOINT ISOLATION IN A CRYPTOGRAPHICALLY-SEGMENTED NETWORK

#229
20210011985
2021-01-14

Systems and methods for intrusion detection and prevention using software patching and honeypots

#230
20210006594
2021-01-07

Method and apparatus for defending against network attack

#231
20200404016
2020-12-24

Method to prevent root level access attack and measurable SLA security and compliance platform

#232
20200401692
2020-12-24

Method to prevent root level access attack and measurable SLA security and compliance platform

#233
20200396201
2020-12-17

CandC domain name analysis-based botnet detection method, device, apparatus and medium

#234
20200389494
2020-12-10

Smart bits

#235
20200389487
2020-12-10

Methods and systems for reducing unwanted data traffic in a computer network

#236
20200382552
2020-12-03

REPLAYABLE HACKTRAPS FOR INTRUDER CAPTURE WITH REDUCED IMPACT ON FALSE POSITIVES

#237
20200374087
2020-11-26

Deceiving attackers in endpoint systems

#238
20200366714
2020-11-19

REACTIVE AND PRE-EMPTIVE SECURITY SYSTEM FOR THE PROTECTION OF COMPUTER NETWORKS & SYSTEMS

#239
20200359113
2020-11-12

Detecting and monitoring location of wireless-enabled devices in a physical space

#240
20200358738
2020-11-12

Systems and methods for using DNS messages to selectively collect computer forensic data

#241
20200356703
2020-11-12

Method and apparatus for trusted display on untrusted computing platforms to secure applications

#242
20200351306
2020-11-05

CONFIGURING SECURITY POLICIES IN RESPONSE TO DETECTING A PIVOT OF AN INTRUSION

#243
20200351303
2020-11-05

Systems and methods for AIDA based grouping

#244
20200344264
2020-10-29

Malicious data manipulation detection using markers and the data protection layer

#245
20200336510
2020-10-22

Network traffic sending method and apparatus, and hybrid honeypot system

#246
20200336461
2020-10-22

Device, system and method for defending a computer network

#247
20200329070
2020-10-15

Domain specific language for threat-actor deception

#248
20200304470
2020-09-24

Methods and systems for deep learning based API traffic security

#249
20200293427
2020-09-17

Systems and methods to improve data clustering using a meta-clustering model

#250
20200287915
2020-09-10

AUTOMATED GENERATION AND DEPLOYMENT OF HONEY TOKENS IN PROVISIONED RESOURCES ON A REMOTE COMPUTER RESOURCE PLATFORM

#251
20200285740
2020-09-10

Deception-based responses to security attacks

#252
20200285739
2020-09-10

Deception-Based Responses to Security Attacks

#253
20200285735
2020-09-10

Controlling access to external networks by an air-gapped endpoint

#254
20200285734
2020-09-10

OPERATING A SECURITY ZONE ON AN AIR-GAPPED ENDPOINT

#255
20200279042
2020-09-03

Method for rendering virtual desktops on an air-gapped endpoint

#256
20200267168
2020-08-20

Network attack tainting and tracking

#257
20200265358
2020-08-20

Systems and methods for using artificial intelligence driven agent to automate assessment of organizational vulnerabilities

#258
20200252429
2020-08-06

Deceiving attackers accessing network data

#259
20200250071
2020-08-06

METHOD AND SYSTEM FOR SYNTHETIC GENERATION OF TIME SERIES DATA

#260
20200244699
2020-07-30

Method, apparatus, and system to map network reachability

#261
20200244690
2020-07-30

Transient Transaction Server

#262
20200244673
2020-07-30

Multivariate network structure anomaly detector

#263
20200220855
2020-07-09

System and method for determining use of non-human users in a distributed computer network environment

#264
20200218638
2020-07-09

System, method, and computer-accessible medium for evaluating multi-dimensional synthetic data using integrated variants analysis

#265
20200218637
2020-07-09

Systems and methods to identify breaking application program interface changes

#266
20200213356
2020-07-02

MALWARE INSPECTION SUPPORT SYSTEM AND MALWARE INSPECTION SUPPORT METHOD

#267
20200213355
2020-07-02

Security Network Interface Controller (SNIC) Preprocessor with Cyber Data Threat Detection and Response Capability that Provides Security Protection for a Network Device with Memory or Client Device with Memory or Telecommunication Device with Memory

#268
20200208420
2020-07-02

Concrete foundation form

#269
20200204590
2020-06-25

Methods and systems for honeyfile creation, deployment and management

#270
20200204589
2020-06-25

Systems and methods for preventive ransomware detection using file honeypots

#271
20200204585
2020-06-25

Systems and methods for AIDA based A/B testing

#272
20200195671
2020-06-18

Adaptive malicious network traffic response

#273
20200193041
2020-06-18

Virtual trap protection of data elements

#274
20200186567
2020-06-11

Generation of honeypot data

#275
20200177629
2020-06-04

Dynamic honeypots

#276
20200177556
2020-06-04

Methods and systems for API deception environment and API traffic control and security

#277
20200169580
2020-05-28

Identifying and circumventing security scanners

#278
20200162512
2020-05-21

Generating false data for suspicious users

#279
20200162511
2020-05-21

Method and system of mitigating network attacks

#280
20200153861
2020-05-14

DECOY APPARATUS AND METHOD FOR EXPANDING FAKE ATTACK SURFACE USING DECEPTION NETWORK

#281
20200153763
2020-05-14

Cognitive virtual detector

#282
20200145434
2020-05-07

Processing system for providing console access to a cyber range virtual environment

#283
20200145400
2020-05-07

System and method for detecting malicious payment transaction activity using aggregate views of payment transaction data in a distributed network environment

#284
20200137112
2020-04-30

Network security attack detection and mitigation solution using honeypots

#285
20200137111
2020-04-30

Approaches for securing middleware data access

#286
20200134235
2020-04-30

PHYSICAL AND LOGICAL ATTACK RESILIENT POLYMORPHIC HARDWARE

#287
20200125730
2020-04-23

System and method for vetting mobile phone software applications

#288
20200120082
2020-04-16

TECHNIQUES FOR SECURING CREDENTIALS USED BY FUNCTIONS

#289
20200117998
2020-04-16

Systems and methods to identify neural network brittleness based on sample data and seed generation

#290
20200106808
2020-04-02

Intrusion detection with honeypot keys

#291
20200106807
2020-04-02

Moving target defense with network level changes providing substantially continuous access to applications

#292
20200099700
2020-03-26

Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network

#293
20200092327
2020-03-19

Method and system for identifying a preferred set of hierarchically structured items in streaming data

#294
20200092304
2020-03-19

MALWARE DETECTION SYSTEM

#295
20200092165
2020-03-19

Honeypot asset cloning

#296
20200092100
2020-03-19

Authentication apparatus

#297
20200084239
2020-03-12

Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity

#298
20200084238
2020-03-12

GENERATING HIGHLY REALISTIC DECOY EMAIL AND DOCUMENTS

#299
20200076850
2020-03-05

High-fidelity model-driven deception platform for cyber-physical systems

#300
20200076849
2020-03-05

Network security attack misdirection on a transport vehicle