$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Adaptive statistical regression and classification of data strings, with application to the generic detection of compute 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06E-001/00
  • G06F-015/18
출원번호 US-0242757 (1994-05-13)
발명자 / 주소
  • Kephart Jeffrey Owen (Yorktown Heights NY) Sorkin Gregory Bret (New York NY) Tesauro Gerald James (Croton-on-Hudson NY) White Steven Richard (New York NY)
출원인 / 주소
  • International Business Machines Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 129  인용 특허 : 4

초록

A data string is a sequence of atomic units of data that represent information. In the context of computer data, examples of data strings include executable programs, data files, and boot records consisting of sequences of bytes, or text files consisting of sequences of bytes or characters. The inve

대표청구항

A method of constructing a classifier of data strings, comprising: providing a labelled set of exemplars from a plurality of classes; augmenting the number of exemplars in the default class with additional exemplars chosen from outside the plurality of classes, wherein the additional exemplars resem

이 특허에 인용된 특허 (4)

  1. Herbert Thomas F. (Rochester NY), Feature classification using supervised statistical pattern recognition.
  2. Tong David W. (Scotia NY) Delano Paul A. (Schenectady NY), Method for using a feed forward neural network to perform classification with highly biased data.
  3. Skapura David M. (Friendswood) McIntire Gary J. (Friendswood TX), Method of implementing a neural network on a digital computer.
  4. Khan Emdadur R. (San Jose CA), Neural network apparatus and method for pattern recognition.

이 특허를 인용한 특허 (129)

  1. Brisebois, Michel; Aylesworth, Jason; Johnstone, Curtis; Leach, Andrew John; Vinogradov, Elena; Blaiberg, Joel Stacy; Pope, Stephen; Holmesdale, Shawn Donald; Hu, Guangning, Aggregation and classification of secure data.
  2. van der Made, Peter A. J., Analytical virtual machine.
  3. van der Made,Peter A. J., Analytical virtual machine.
  4. Stolfo, Salvatore J., Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data.
  5. Straforini Marco L. ; Lavagnino Sherrill E. ; Badger John C.,FRX ; Wolinsky Jeffrey M. ; Tilson Bret R., Automatic classifier for real time inspection and classification.
  6. Ivanov,Oleg; Ivanov,Sergei, Automatic detection and patching of vulnerable files.
  7. Kohavi Ron, Bayes rule based and decision tree hybrid classifier.
  8. Wheeler, Thomas T., Calling a second functionality by a first functionality.
  9. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  10. van der Made, Peter A. J., Computer immune system and method for detecting unwanted code in a computer system.
  11. van der Made,Peter A. J, Computer immune system and method for detecting unwanted code in a computer system.
  12. Ruff, Eric J.; Raymond, Robert S., Computer virus detection and removal.
  13. Sang'udi, Gerald P.; Bott, Ross A.; Tesler, Joel D.; Hawkes, John R.; Xiong, Rebecca W.; Schkolnick, Mario, Computer-related method and system for controlling data visualization in external dimension(s).
  14. Gerald P. Sang'udi ; Ross A. Bott ; Joel D. Tesler ; John R. Hawkes ; Rebecca W. Xiong ; Mario Schkolnick, Computer-related method, system, and program product for controlling data visualization in external dimension(s).
  15. Patoskie, John P., Construction of an agent that utilizes as-needed canonical rules.
  16. Butchart, Kate, Data classifier output interpretation.
  17. Book, Neil; Hoffman, Daniel V., Detecting malware on mobile devices.
  18. Book, Neil; Hoffman, Daniel V., Detecting malware on mobile devices.
  19. Mei, Shiqu; Wu, Weiguo, Device and method for multiclass object detection.
  20. Pennello,Thomas J., Difference engine method and apparatus.
  21. Hauser, Robert R., Dynamic determination of needed agent rules.
  22. Munson, John C.; Elbaum, Sebastian G., Dynamic software system intrusion detection.
  23. Narayanaswamy, Krishna; Iyer, Subramanian, Dynamic threat protection in mobile networks.
  24. Kephart Jeffrey Owen ; Morin Alexandre Guy Georges,FRX ; Sorkin Gregory Bret ; Wells Joseph Warreb, Efficient detection of computer viruses and other data traits.
  25. Hauser, Robert R., Execution of a canonical rules based agent.
  26. Liu,Tongwei; Beyer,Dirk M., Generalized segmentation method for estimation/optimization problem.
  27. Hauser, Robert R, Initiating construction of an agent in a first execution environment.
  28. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  29. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  30. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  31. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  32. Edery, Yigal Mordechai; Vered, Nirmrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  33. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  34. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  35. Feeney, Bryan; Poulson, Steven; Edwards, John, Malware detection.
  36. Tuvell, George; Venugopal, Deepak, Malware detection system and method for compressed data on mobile platforms.
  37. Tuvell, George; Venugopal, Deepak, Malware detection system and method for compressed data on mobile platforms.
  38. Tuvell, George; Lee, Charles, Malware detection system and method for limited access mobile platforms.
  39. Tuvell, George; Venugopal, Deepak, Malware detection system and method for mobile platforms.
  40. Tuvell, George; Venugopal, Deepak, Malware detection system and method for mobile platforms.
  41. Tuvell, George; Venugopal, Deepak; Hu, Guoning, Malware modeling detection system and method for mobile platforms.
  42. Dube, Thomas E.; Raines, Richard A.; Rogers, Steven K., Malware target recognition.
  43. Hammond, Nicolas J., Method and apparatus for auditing network security.
  44. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  45. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  46. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  47. Rubin, Moshe; Matitya, Moshe; Melnick, Artem; Touboul, Shlomo; Yermakov, Alexander; Shaked, Amit, Method and system for adaptive rule-based content scanners.
  48. Rubin, Moshe; Matitya, Moshe; Melnick, Artem; Touboul, Shlomo; Yermakov, Alexander; Shaked, Amit, Method and system for adaptive rule-based content scanners for desktop computers.
  49. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  50. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  51. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  52. Munson,John C., Method and system for establishing normal software system behavior and departures from normal behavior.
  53. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  54. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Method and system for protecting a computer and a network from hostile downloadables.
  55. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  56. Lotem, Amnon; Cohen, Gideon; Ben Naon, Lior, Method for simulation aided security event management.
  57. Munson, John C.; Elbaum, Sebastian G., Method of and system for detecting an anomalous operation of a computer system.
  58. Munson, John C.; Elbaum, Sebastian G., Method of and system for detecting an anomalous operation of a computer system.
  59. Shipp, Alexander, Method of and system for heuristically detecting viruses in executable code.
  60. Sorkin, Gregory Bret, Method of constructing data classifiers and classifiers constructed according to the method.
  61. Shipp,Alexander, Method of, and system for, heuristically detecting viruses in executable code.
  62. Barry G. Becker ; Ron Kohavi ; Daniel A. Sommerfield ; Joel D. Tesler, Method system and computer program product for visualizing an evidence classifier.
  63. Tesler Joel D., Method, system and computer program product for navigating through partial hierarchies.
  64. Barry Glenn Becker ; Roger A. Crawfis, Method, system and computer program product for visually approximating scattered data using color to represent values of a categorical variable.
  65. Rathmann Peter K. ; Haber Eben M., Method, system, and computer program product for computing histogram aggregations.
  66. Tesler Joel D., Method, system, and computer program product for mapping between an overview and a partial hierarchy.
  67. Becker Barry G., Method, system, and computer program product for visualizing a data structure.
  68. Kohavi Ron ; Tesler Joel D., Method, system, and computer program product for visualizing a decision-tree classifier.
  69. Becker Barry G. ; Kohavi Ron ; Sommerfield Daniel A. ; Tesler Joel D., Method, system, and computer program product for visualizing an evidence classifier.
  70. Tesler Joel D., Method, system, and computer program product for visualizing data using partial hierarchies.
  71. Eskin, Eleazar; Arnold, Andrew Oliver; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore J., Methods of unsupervised anomaly detection using a geometric framework.
  72. Eskin, Eleazar; Arnold, Andrew; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore J., Methods of unsupervised anomaly detection using a geometric framework.
  73. Patoskie, John P.; Hauser, Robert R., Mobile device tracking using mobile agent location breadcrumbs.
  74. Hauser, Robert R., Movement of an agent that utilizes a compiled set of canonical rules.
  75. Tuvell, George; Venugopal, Deepak; Pfefferle, Matthew, Non-signature malware detection system and method for mobile platforms.
  76. Heisele, Bernd; Kim, Gunhee; Meyer, Andrew J., Object recognition with 3D models.
  77. Nachenberg Carey S., Polymorphic virus detection module.
  78. Blume, Matthias; Lazarus, Michael A.; Peranich, Larry S.; Vernhes, Frederique; Caid, William R.; Dunning, Ted E.; Russell, Gerald S.; Sitze, Kevin L., Predictive modeling of consumer financial behavior using supervised segmentation and nearest-neighbor matching.
  79. Lazarus, Michael; Peranich, Larry S.; Vernhes, Frederique; Blume, A. U. Matthias; Caid, William R.; Dunning, Ted E.; Russell, Gerald R.; Sitze, Kevin, Predictive modeling of consumer financial behavior using supervised segmentation and nearest-neighbor matching.
  80. Wheeler, Thomas T, Proxy object creation and use.
  81. Chang, Shih-Fu; Wang, Jun; Sajda, Paul; Pohlmeyer, Eric; Hanna, Barbara; Jangraw, David, Rapid image annotation via brain state decoding and visual pattern mining.
  82. Wheeler, Thomas T.; Patoskie, John P., Survival rule usage by software agents.
  83. Gluck Allen ; Lando Judah L.,ILX, System and method for automated anti-viral file update.
  84. Avasarala, Bhargav R.; Bose, Brock D.; Day, John C.; Steiner, Donald, System and method for automated machine-learning, zero-day malware detection.
  85. Avasarala, Bhargav R.; Bose, Brock D.; Day, John C.; Steiner, Donald, System and method for automated machine-learning, zero-day malware detection.
  86. Brisebois, Michel; Aylesworth, Jason; Johnstone, Curtis; Leach, Andrew John; Vinogradov, Elena; Blaiberg, Joel Stacy; Pope, Stephen; Holmesdale, Shawn Donald; Hu, Guangning, System and method for classifying data.
  87. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  88. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  89. Brisebois, Michel Albert; Aylesworth, Jason; Johnstone, Curtis T.; Leach, Andrew John; Vinogradov, Elena V.; Blaiberg, Joel Stacy; Pope, Stephen; Holmesdale, Shawn Donald; Hu, GuangNing, System and method for data aggregation and analysis.
  90. Brisebois, Michel; Johnstone, Curtis, System and method for data loss prevention across heterogeneous communications platforms.
  91. Brisebois, Michel; Johnstone, Curtis, System and method for managing and identifying subject matter experts.
  92. Kaloroumakis, Peter E.; Boyle, Michael P.; Valentino, Christopher C., System and method for network data characterization.
  93. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  94. Brisebois, Michel; Aylesworth, Jason; Johnstone, Curtis; Leach, Andrew John; Vinogradov, Elena; Blaiberg, Joel Stacy; Pope, Stephen; Holmesdale, Shawn Donald; Hu, Guangning, System and method for querying data.
  95. Brisebois, Michel; Aylesworth, Jason; Johnstone, Curtis; Leach, Andrew John; Vinogradov, Elena; Blaiberg, Joel Stacy; Pope, Stephen; Holmesdale, Shawn Donald; Hu, Guangning, System and method for querying data.
  96. Kohavi Ron ; Sommerfield Daniel A., System and method for selection of important attributes.
  97. Hanner,Brian D., System and method for string filtering.
  98. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  99. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  100. Brisebois, Michel Albert; Johnstone, Curtis T., System and method for user-context-based data loss prevention.
  101. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., System and methods for adaptive model generation for detecting intrusion in computer systems.
  102. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., System and methods for adaptive model generation for detecting intrusion in computer systems.
  103. Stolfo, Salvatore J.; Eskin, Eleazar; Herskop, Shlomo; Bhattacharyya, Manasi, System and methods for detecting malicious email transmission.
  104. Stolfo, Salvatore J.; Eskin, Eleazar; Herskop, Shlomo; Bhattacharyya, Manasi, System and methods for detecting malicious email transmission.
  105. Schultz,Matthew G.; Eskin,Eleazar; Zadok,Erez; Bhattacharyya,Manasi; Salvatore,Stolfo J., System and methods for detection of new malicious executables.
  106. Amnon, Lotem; Cohen, Gideon; Meiseles, Moshe; Horn, Ilan, System, method and computer readable medium for evaluating potential attacks of worms.
  107. Lotem, Amnon; Cohen, Gideon; Meiseles, Moshe; Horn, Ilan, System, method and computer readable medium for evaluating potential attacks of worms.
  108. Dubagunta, Saikumar V., System, method, and computer readable medium for integrating an original application with a remote application.
  109. Dubagunta, Saikumar V., System, method, and computer readable medium for integrating an original language application with a target language application.
  110. Cowin, Gregory L., System, method, and computer readable medium for processing a message queue.
  111. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., Systems and methods for adaptive model generation for detecting intrusions in computer systems.
  112. Roundy, Kevin Alejandro; Thonnard, Olivier, Systems and methods for attributing potentially malicious email campaigns to known threat groups.
  113. Roundy, Kevin Alejandro; Bhatkar, Sandeep, Systems and methods for classifying security events as targeted attacks.
  114. Shen, Yun; Thonnard, Olivier, Systems and methods for identifying security threat sources responsible for security events.
  115. Brisebois, Michel Albert; Johnstone, Curtis T.; Goyal, Sawan, Systems and methods for multi-stream performance patternization and interval-based prediction.
  116. Brisebois, Michel Albert; Johnstone, Curtis T.; Goyal, Sawan, Systems and methods for multi-stream performance patternization and optimization of virtual meetings.
  117. Brisebois, Michel Albert; Johnstone, Curtis T.; Goyal, Sawan, Systems and methods of diagnosing down-layer performance problems via multi-stream performance patternization.
  118. Brisebois, Michel Albert; Johnstone, Curtis T., Systems and methods of reporting content-exposure events.
  119. Brisebois, Michel Albert; Johnstone, Curtis T.; Le Rudulier, Olivier, Systems and methods of secure self-service access to content.
  120. Brisebois, Michel Albert; Johnstone, Curtis T.; Le Rudulier, Olivier, Systems and methods of secure self-service access to content.
  121. Brisebois, Michel Albert; Johnstone, Curtis T.; Le Rudulier, Olivier, Systems and methods of secure self-service access to content.
  122. Brisebois, Michel Albert; Johnstone, Curtis T.; Le Rudulier, Olivier, Systems and methods of secure self-service access to content.
  123. Brisebois, Michel Albert; Goyal, Sawan; Hu, GuangNing; Johnstone, Curtis T., Systems and methods of securing network-accessible peripheral devices.
  124. Brisebois, Michel Albert; Johnstone, Curtis T., Systems and methods of tracking content-exposure events.
  125. Hursey, Neil John; McEwan, William Alexander, Tree pattern system and method for multiple virus signature recognition.
  126. Waldon Scott ; Powell Dave ; Tong Siu, User directed heuristic design optimization search.
  127. Luke, James Steven, Viral replication detection using a counter virus.
  128. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  129. DeAnna, Robert, Web service interface for mobile agents.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로