$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
출원번호 US-0107790 (1998-06-30)
발명자 / 주소
  • Gleichauf Robert
  • Shanklin Steven
출원인 / 주소
  • Cisco Technology, Inc.
대리인 / 주소
    Baker Botts L.L.P.
인용정보 피인용 횟수 : 295  인용 특허 : 35

초록

A system and method are disclosed for real-time insertion of data into a multi-dimensional database. The system includes a multi-dimensional database and a user interface operable to access and provide views into the multi-dimensional database. A data insertion engine is coupled to and operable to a

대표청구항

[ What is claimed is:] [1.]1. A system for real-time insertion of data into a multi-dimensional database, comprising:a multi-dimensional database;a user interface operable to access and provide views into the multi-dimensional database, wherein the views comprise any of a slice, a pivot or a zoom vi

이 특허에 인용된 특허 (35)

  1. Mukhopadhyay Pinaki ; Nesamoney Diaz ; Sankaran Mohan ; Suresh Sankaran ; Gupta Sanjeev K., Apparatus and method for capturing and propagating changes from an operational database to data marts.
  2. Chiu Dah-Ming (Lexington MA) Sudama Ram (Concord MA), Apparatus and method for realtime monitoring of network sessions in a local area network.
  3. Williams ; Jr. Billy L. (Sea Bright NJ), Broadcast data distribution system.
  4. Hayashi Yoko (Kawasaki JPX), Data processing system having double supervising functions.
  5. Kraemer Jeffrey A. ; Kirby Alan J. ; Waterman David C., Detecting unauthorized network communication.
  6. Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX), Distributed security auditing subsystem for an operating system.
  7. Lermuzeaux Jean-Marc (St Michel sur Orge FRX) Emery Thierry (St Germain les Arpajon FRX) Gonthier Patrice (Antony FRX), Facility for detecting intruders and suspect callers in a computer installation and a security system including such a f.
  8. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  9. Martin Michael W., Interval-partitioning method for multidimensional data.
  10. Esbensen Daniel, Method and apparatus for automated network-wide surveillance and security breach intervention.
  11. Lipkin Daniel, Method and apparatus for implementing dynamic VRML.
  12. Smaha Stephen E. (Austin TX) Snapp Steven R. (Austin TX), Method and system for detecting intrusion into and misuse of a data processing system.
  13. Rassman William R. (Agoura CA) Berman Bradley M. (Omaha NE) Blau Scott (Yonkers NY) Chiang Andrew (Fort Lee NJ), Method and system for scheduling, monitoring and dynamically managing resources.
  14. Perez Manuel (Berkeley Heights NJ), Method and system for storing and retrieving data from a multidimensional array using database pointers.
  15. Agrawal Rakesh (San Jose CA) Equitz William Robinson (Palo Alto CA) Faloutsos Christos (Silver Spring MD) Flickner Myron Dale (San Jose CA) Swami Arun Narasimha (San Jose CA), Method for high-dimensionality indexing in a multi-media database.
  16. Feigen Ronald Glen (Mesa AZ) Lambert Paul Aerick (Scottsdale AZ), Method for secure network access via message intercept.
  17. Sharif-Askary Jamshid (Palm Bay FL) Garje Shashi (Melbourne FL) Rohela Vijay (Melbourne FL) Roy Ashok I. (Palm Bay FL) Yaseen Irahim (Melbourne FL), Multi-model database system for dynamic creation and maintenance of complex objects in a real time environment.
  18. Anwar Mohammed S., Multidimensional data display and manipulation system and methods for using same.
  19. Radziewicz Clifford J. ; Gregorek Mark R. ; Dillow Jeffrey C., Network communications marketing system.
  20. Hershey Paul C. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Waclawsky John G. (Frederick MD) Wilkins John D. (Somerville VA), Network security system and method using a parallel finite state machine adaptive active monitor and responder.
  21. Conklin David Allen ; Harrison John Reed, Network surveillance system.
  22. Terada Masato,JPX ; Yoshida Kenichi,JPX ; Kayashima Makoto,JPX, Network system having external/internal audit system for computer security.
  23. Trostle Jonathan, Networked workstation intrusion detection system.
  24. Shieh Shiuh-Pyung W. (Hsinchu MD TWX) Gligor Virgil D. (Chevy Chase MD), Pattern-oriented intrusion-detection system and method.
  25. Wainwright Paul F. (Monmouth NJ), Process for integrated traffic data management and network surveillance in communications networks.
  26. Kerrigan Michael (Tewksbury MA) Dempsey Michael A. (Watertown MA), Realtime data feed engine for updating an application with the most currently received data from multiple data feeds.
  27. Unger Sandra S. ; Pagnucco Sibylle ; Cohen Roger W. ; Fiato Rocco A., Relational database system containing a multidimensional hierachical model of interrelated subject categories with recog.
  28. Mayes John C. ; Coile Brantley W., Security system for network address translation systems.
  29. Holloway Malcolm H. ; Prorock Thomas Joseph, System and method for detecting and preventing security.
  30. Castelli Vittorio ; Jhingran Anant Deep ; Li Chung-Sheng ; Robinson John Timothy, System and method for generating multi-representations of a data cube.
  31. Perez Manuel (Berkeley Heights NJ), System and method for storing and retrieving information from a multidimensional array.
  32. Shwed Gil (Jerusalem ILX), System for securing inbound and outbound data packet flow in a computer network.
  33. Miller John A. (Wilmette IL) Cleven David R. (Algonquin IL) Wall Robert J. (Highland Park IL), User specific intelligent interface which intercepts and either replaces or passes commands to a data identity and the f.
  34. Marshall Paul Steven, Virtual reality generator for use with financial information.
  35. Chen Archin,TWX ; Chen Yu-Ning,TWX ; Chien Chiu-Fang,TWX ; Chieh Chung I.,TWX, WIP/move management tool for semiconductor manufacturing plant and method of operation thereof.

이 특허를 인용한 특허 (295)

  1. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  2. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  3. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  4. Guru,Parthibhan Parama, Action based termination of multidimensional lookup.
  5. Lynn, Michael T.; Hrastar, Scott E., Active defense against wireless intruders.
  6. Dapp,Michael C., Active intrusion resistant environment of layered object and compartment keys (airelock).
  7. Stute, Michael, Adaptive behavioral intrusion detection systems and methods.
  8. Stute, Michael, Adaptive behavioral intrusion detection systems and methods.
  9. Amir Netz, Aggregations performance estimation in database systems.
  10. Poletto, Massimiliano Antonio; Ratin, Andrew; Gorelik, Andrew, Aggregator for connection based anomaly detection.
  11. Smith, Michael R.; Janczura, Mark S., Analysis for network intrusion detection.
  12. VanGilder, James William; Healey, Christopher M.; Zhang, Xuanhang, Analysis of effect of transient events on temperature in a data center.
  13. van der Made, Peter A. J., Analytical virtual machine.
  14. van der Made,Peter A. J., Analytical virtual machine.
  15. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  16. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  17. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  18. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  19. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  20. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  21. Hrabik,Michael; Guilfoyle,Jeffrey J.; Beaver,Edward "Mac", Apparatus for verifying the integrity of computer networks and implementation of countermeasures.
  22. Danford,Robert William; Farmer,Kenneth M.; Jeffries,Clark Debs; Sisk,Robert B.; Walter,Michael A., Applying blocking measures progressively to malicious network traffic.
  23. Kaashoek,Marinus Frans; Kohler, Jr.,Edward W.; Poletto,Massimiliano Antonio, Architecture to thwart denial of service attacks.
  24. Poletto,Massimiliano Antonio; Vlachos,Dimitri Stratton, Architecture to thwart denial of service attacks.
  25. Piesco,Albert L.; Walsh,Julia H., Attack impact prediction system.
  26. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  27. Bromwich, Adam, Automatic training of a database intrusion detection system.
  28. Davis, John Fred; Himberger, Kevin David; Jeffries, Clark Debs; Jeremiah, Garreth Joseph, Blocking of spam e-mail at a firewall.
  29. Durham, Roderick Harold, Centralized data transformation.
  30. Durham, Roderick Harold, Centralized data transformation.
  31. Durham, Roderick Harold, Centralized data transformation.
  32. Cosquer, Francois J. N.; Marquet, Bertrand; MacIntosh, Robert W.; Leclerc, Yvon; D'Souza, Scott David, Communication network security risk exposure management systems and methods.
  33. Guru, Parthibhan Parama; Kumar, Vinodh; McRae, Andrew, Compilation of access control lists.
  34. Nachenberg,Carey, Computer code intrusion detection system based on acceptable retrievals.
  35. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  36. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  37. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  38. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  39. Heidenreich, James Ralph; Higgins, Linda Shawn, Computer-implemented system and method for facilitating the development and documentation of user thinking about an arbitrary problem.
  40. Poletto, Massimiliano Antonio; Kohler, Jr., Edward W.; Ratin, Andrew; Gorelik, Andrew, Connection based anomaly detection.
  41. Gandhi, Amar S.; Praitis, Edward J.; Kim, Jane T.; Lyndersay, Sean O.; von Koch, Walter V.; Gould, William; Morgan, Bruce A.; Kwan, Cindy, Content syndication platform.
  42. Gandhi, Amar S.; Praitis, Edward J.; Kim, Jane T.; Lyndersay, Sean O.; von Koch, Walter V.; Gould, William; Morgan, Bruce A.; Kwan, Cindy, Content syndication platform.
  43. Kaashoek,Marinus Frans; Kohler, Jr.,Edward W.; Poletto,Massimiliano Antonio; Morris,Robert T., Coordinated thwarting of denial of service attacks.
  44. Bakalash, Reuven; Shaked, Guy; Caspi, Joseph, Data aggregation module supporting dynamic query responsive aggregation during the servicing of database query requests provided by one or more client machines.
  45. Bakalash, Reuven; Shaked, Guy; Caspi, Joseph, Data aggregation module supporting dynamic query responsive aggregation during the servicing of database query requests provided by one or more client machines.
  46. Bezilla, Daniel Bailey; Immordino, John Leonard; Le Ogura, James; Ojha, Sachchida Nand, Data structure for policy-based remediation selection.
  47. Bezilla, Daniel Bailey; Immordino, John Leonard; Le Ogura, James; Ojha, Sachchida Nand, Data structure for policy-based remediation selection.
  48. Wittman, Brian Albert, Data traffic filtering indicator.
  49. Bakalash, Reuven; Shaked, Guy; Caspi, Joseph, Database management system (DBMS) employing a relational datastore and a multi-dimensional database (MDDB) for servicing query statements in a manner transparent to client machine.
  50. Lin, Derek, Detection of malware beaconing activities.
  51. D'Mello, Kurt; Tyree, David Spencer; Gandhe, Sudhir; O'Brien, Eric David, Determining technology-appropriate remediation for vulnerability.
  52. D'Mello, Kurt; Tyree, David Spencer; O'Brien, Eric David; Gandhe, Sudhir, Determining technology-appropriate remediation for vulnerability.
  53. Wilkinson,Mark L.; Miller,Ronald J.; McDaniels,Michael J., Deterring network incursion.
  54. John, Peter; Guenther, Martin, Distributed requests on remote data.
  55. Lee, Jang Sun; Kim, June; Lee, Hun Soon; Kim, Myung Joon; Oh, Gil Rok; Yoo, Jae Soo; Song, Seok Il, Efficient recovery method for high-dimensional index structure employing reinsert operation.
  56. Tracy,Richard P.; Barrett,Hugh; Berman,Lon J.; Catlin,Gary M.; Dimtsios,Thomas G., Enhanced system, method and medium for certifying and accrediting requirements compliance.
  57. Tracy, Richard P.; Barrett, Hugh; Catlin, Gary M., Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment.
  58. Tracy,Richard P.; Barrett,Hugh; Catlin,Gary M., Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model.
  59. Joy, Ryan; Primm, Michael R.; Graczyk, Ronald; Smith, David K.; Slade, Boyd E., Environmental monitoring device.
  60. Joy,Ryan; Primm,Michael R.; Graczyk,Ronald; Smith,David K.; Slade,Boyd E., Environmental monitoring device.
  61. Joy,Ryan; Primm,Michael R.; Graczyk,Ronald; Smith,David K.; Slade,Boyd E., Environmental monitoring device.
  62. Hughes, Aaron M., Evaluation node for reporting status via a secure link.
  63. Weber,Daniel; Gopalan,Prem; Poletto,Massimiliano Antonio, Event detection/anomaly correlation heuristics.
  64. Primm,Michael; Jefts, Jr.,Richard, Extensible sensor monitoring, alert processing and notification system and method.
  65. Primm,Michael; Jefts, Jr.,Richard, Extensible sensor monitoring, alert processing and notification system and method.
  66. Sholtis, Steven; LeClair, Terry; Henderson, Kenneth Jerome, Federated system and methods and mechanisms of implementing and using such a system.
  67. Sholtis, Steven; LeClair, Terry; Henderson, Kenneth Jerome, Federated system and methods and mechanisms of implementing and using such a system.
  68. Kim, Jane T; Gandhi, Amar S.; von Koch, Walter V.; Lyndersay, Sean O.; Praitis, Edward J.; Gould, William; Ruzyski, David M., Feed and email content.
  69. Gandhi, Amar S.; Kim, Jane T.; Lueders, John H.; Lyndersay, Sean O.; Stevens, Warren G.; Choi, Wayne WY.; Gould, William; Morgan, Bruce A., Finding and consuming web subscriptions in a web browser.
  70. Gandhi, Amar S.; Kim, Jane T.; Lueders, John H.; Lyndersay, Sean Obafemi; Stevens, Warren G.; Choi, Wayne W Y; Gould, William; Morgan, Bruce A., Finding and consuming web subscriptions in a web browser.
  71. Gandhi, Amar S.; Kim, Jane T; Lueders, John H; Lyndersay, Sean O.; Stevens, Warren G; Choi, Wayne Wy; Gould, William; Morgan, Bruce A, Finding and consuming web subscriptions in a web browser.
  72. Fang, ChunSheng; Lin, Derek; Zadeh, Joseph A., Graph-based method to detect malware command-and-control infrastructure.
  73. Dapp,Michael C.; Lett,Eric C.; Ng,Sai Lun, Hardware accelerated validating parser.
  74. Villavicencio, Francisco J., Impersonation in an access system.
  75. Villavicencio,Francisco J., Impersonation in an access system.
  76. McRae,Andrew, Incremental compilation for classification and filtering rules.
  77. McRae,Andrew, Incremental compilation of packet classifications using fragmented tables.
  78. Wiemer, Douglas; Gustave, Christophe; Chow, Stanley TaiHai; McFarlane, Bradley Kenneth, Information system service-level security risk analysis.
  79. Sima, Caleb; Millar, Steve; Kelly, Raymond; Sullivan, Bryan; Sullivan, Gerald; Tillery, David, Integrated crawling and auditing of web applications and web content.
  80. Yadav, Satyendra, Integrated network intrusion detection.
  81. Yadav, Satyendra, Integrated network intrusion detection.
  82. Yadav,Satyendra, Integrated network intrusion detection.
  83. Flowers, John S.; Stracener, Thomas C., Interoperability of vulnerability and intrusion detection systems.
  84. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  85. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  86. Dapp,Michael C.; Lett,Eric C., Intrusion detection accelerator.
  87. Day,Christopher W., Intrusion detection system.
  88. Day,Christopher W., Intrusion detection system using self-organizing clusters.
  89. Hodges, Jeffrey D., Intrusion threat detection.
  90. Goseva Popstojanova,Katerina; Wang,Feiyi; Wang,Rong; Gong,Fengmin; Vaidyanathan,Kalyanaraman; Trivedi,Kishor; Muthusamy,Balamurugan, Intrusion tolerant communication networks and associated methods.
  91. Rayes, Mark Ammar; Cheung, Michael; Droms, Ralph; Dini, Petre, Isolation approach for network users associated with elevated risk.
  92. Joshi, Vrinda S.; Ramamurthy, Srinivasagapala, Logging access system events.
  93. Wilkinson, Mark L.; Miller, Ronald J.; McDaniels, Michael J., Logical / physical address state lifecycle management.
  94. Wilkinson, Mark L.; Miller, Ronald J.; McDaniels, Michael J., Logical / physical address state lifecycle management.
  95. Goldfeder, Aaron R.; Hawkins, John M.; Khorun, Sergey A.; Ramdatmisier, Viresh N.; Farro, Joseph Thomas; Fee, Gregory Darrell; Epling, Jeremiah S.; Bybee, Andrew G.; Xu, Jingyang; Schreiner, Tony Edward; Cool, Jamie L., Mechanism for evaluating security risks.
  96. Ng, Rondy; Zwiebach, Robert C.; Haimes, David; Siauw, Djiao Mei; Roth, Gregory David; Banerjee, Arunesh; Matam, Santosh Kumar; Kosuri, Venkata Ramana Murthy, Mechanism for synchronizing OLAP system structure and OLTP system structure.
  97. Ng, Rondy; Zwiebach, Robert; Haimes, David; Siauw, Djiao Mei; Roth, Gregory David; Banerjee, Arunesh; Matam, Santosh Kumar; Kosuri, Venkata Ramana Murthy, Mechanism for updating OLAP system structure and OLTP system structure.
  98. Hammond, Nicolas J., Method and apparatus for auditing network security.
  99. Hammond,Nicolas J., Method and apparatus for auditing network security.
  100. Faulkner, Gary; Martinek, Joshua Thomas, Method and apparatus for collecting and displaying network device information.
  101. Faulkner, Gary; Martinek, Joshua Thomas, Method and apparatus for collecting and displaying network device information.
  102. Faulkner, Gary; Martinek, Joshua Thomas, Method and apparatus for collecting and displaying network device information.
  103. Kelekar, Samir Gurunath, Method and apparatus for detecting events pertaining to potential change in vulnerability status.
  104. Kelekar, Samir Gurunath, Method and apparatus for detecting vulnerability status of a target.
  105. Childress, Rhonda L.; Gopalan, Prabhakar, Method and apparatus for integration of event monitoring systems.
  106. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  107. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  108. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  109. Childers, Sloan; Moran, Mike; Elderton, John; Medford, Mitch, Method and apparatus for replay of historical data.
  110. Hrabik,Michael; Guilfoyle,Jeffrey J.; Beaver,Edward Mac, Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures.
  111. Chang, Beom Hwan; Jeong, Chi Yoon; Sohn, Seon Gyoung; Lee, Soo Hyung; Bang, Hyo Chan; Kim, Geon Lyang; Kim, Hyun Joo; Park, Won Joo; Ryu, Jong Ho; Kim, Jong Hyun; Na, Jung Chan; Jang, Jong Soo; Sohn, Sung Won, Method and apparatus for visualizing network security state.
  112. Datla, Krishnam Raju; Beereddy, Srinivasa; Somepalli, Prasanthi; Venkatavaradhan, Parthasarathy, Method and apparatus providing unified compliant network audit.
  113. Kotler, Hilik; Suchowski, Ron Shay, Method and device for questioning a plurality of computerized devices.
  114. Suchowski, Ron Shay; Kotler, Hilik, Method and device for questioning a plurality of computerized devices.
  115. Suchowski, Ron Shay; Kotler, Hilik, Method and device for scanning a plurality of computerized devices connected to a network.
  116. Primm, Michael; Fowler, John J.; Faulkner, Gary, Method and system for a set of network appliances which can be connected to provide enhanced collaboration, scalability, and reliability.
  117. Primm,Michael; Fowler,John J.; Faulkner,Gary, Method and system for a set of network appliances which can be connected to provide enhanced collaboration, scalability, and reliability.
  118. Lynn, Michael T.; Hrastar, Scott, Method and system for actively defending a wireless LAN against attacks.
  119. Lynn,Michael T.; Hrastar,Scott, Method and system for actively defending a wireless LAN against attacks.
  120. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  121. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  122. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  123. Flowers,John S.; Stracener,Thomas C., Method and system for detecting a vulnerability in a network.
  124. Hrastar,Scott; Lynn,Michael T.; Sale,Edwin L.; Hollingsworth,Dawn M., Method and system for encrypted network management and intrusion detection.
  125. Caillau, Olivier; Daude, Olivier, Method and system for evaluating network security.
  126. Dodd, Timothy D.; Mewett, Scott; Ide, Curtis E.; Overcash, Kevin A.; Dennerline, David A.; Williams, Bobby J.; Sells, Martin D., Method and system for identifying, fixing, and updating security vulnerabilities.
  127. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  128. Primm, Michael, Method and system for journaling and accessing sensor and configuration data.
  129. Primm, Michael, Method and system for journaling and accessing sensor and configuration data.
  130. Fowler, John J.; Cullen, Gerard L., Method and system for monitoring computer networks and equipment.
  131. Fowler, John J.; Cullen, Gerard L., Method and system for monitoring computer networks and equipment.
  132. Fowler, John J.; Cullen, Gerard L., Method and system for monitoring computer networks and equipment.
  133. Pietrowicz, Stanley; Youzwak, Jason; Haluska, John, Method and system for packet acquistion, analysis and intrusion detection in field area networks.
  134. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  135. Rowland, Craig H., Method and system for reducing the false alarm rate of network intrusion detection systems.
  136. Rowland, Craig H.; Rhodes, Aaron L., Method and system for reducing the false alarm rate of network intrusion detection systems.
  137. Emerick, Gregory M.; Cowan, David S.; Politte, Maureen C.; Denis, Arnaud J. R., Method and system for remote monitoring of a power supply device with user registration capability.
  138. Lynn, Michael T.; Hrastar, Scott, Method and system for securing wireless local area networks.
  139. Khandekar, Pramod, Method and system of deploying server-based applications.
  140. Khandekar,Pramod, Method and system of deploying server-based applications.
  141. Li,Liang; Dao,Thanh Trung; McRae,Andrew A.; Nhan,Hugh, Method for classifying packets using multi-class structures.
  142. Li,Liang; Dao,Thanh Trung; McRae,Andrew A.; Nhan,Hugh, Method for classifying packets using multi-class structures.
  143. Lotem, Amnon; Cohen, Gideon; Ben Naon, Lior, Method for simulation aided security event management.
  144. Carpenter,Brian Edward; Himberger,Kevin David; Jeffries,Clark Debs; Peyravian,Mohammad, Method of responding to a truncated secure session attack.
  145. Bakalash, Reuven; Shaked, Guy; Caspi, Joseph, Method of servicing query statements from a client machine using a database management system (DBMS) employing a relational datastore and a multi-dimensional database (MDDB).
  146. Li, Hong C.; Sahita, Ravi; Yadav, Satyendra, Methods and systems for managing security policies.
  147. Sinha, Amit; Darrow, Nicholas John, Methods and systems for wired equivalent privacy and Wi-Fi protected access protection.
  148. Childers, Sloan K.; Elderton, John; Primm, Michael, Methods for displaying physical network topology and environmental status by location, organization, or responsible party.
  149. Childers, Sloan K.; Elderton, John; Primm, Michael, Methods for displaying physical network topology and environmental status by location, organization, or responsible party.
  150. Lingafelt,Steven; Marko,Gerald, Methods, systems and computer program products for providing status information to a device attached to an information infrastructure.
  151. Grzelak, Cezar P., Multi-dimensional geometry for enhancement of simulations of network devices.
  152. Grzelak, Cezar P., Multi-dimensional geometry for enhancement of simulations of network devices.
  153. Pietrowicz, Stanley, Multi-function electric meter adapter and method for use.
  154. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  155. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  156. Welton,Caleb E.; Hopeman,Albert A.; Goldberg,Andrew H., Multidimensional database storage and retrieval system.
  157. Childers,Sloan K.; Elderton,John; Primm,Michael, Network appliance management.
  158. Childers,Sloan; Moran,Mike; Elderton,John; Medford,Mitch, Network appliance management.
  159. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste, Network audit and policy assurance system.
  160. Newton, Chris, Network intelligence system.
  161. Dowd,Alan; Markham,Thomas R.; Foote Lennox,Tomo; Apostal,David; Lu,Raymond, Network security modeling system and method.
  162. Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  163. Keanini,Timothy D.; Quiroga,Martin A.; Buchanan,Brian W.; Flowers,John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  164. Rhodes, Lee, Network usage analysis system and method for detecting network congestion.
  165. Heinrich, Nicolas, Overall risk in a system.
  166. Stone, Robert J.; Sibley, Matthew J., Overlay network for tracking denial-of-service floods in unreliable datagram delivery networks.
  167. Stone,Robert J.; Sibley,Matthew J., Overlay network for tracking denial-of-service floods in unreliable datagram delivery networks.
  168. Zinda, Eric K.; Olson, Erik B., Peer assembly inspection.
  169. Keanini, Timothy D.; Molitor, Andrew; Gurney, John-Mark; Cooper, Jeremy; Buchanan, Brian, Persistent host determination.
  170. Hrastar, Scott E.; Viswanathan, Subra, Personal wireless monitoring agent.
  171. Bezilla, Daniel Bailey; Immordina, John Leonard; Le Ogura, James, Policy based selection of remediation.
  172. Rayes,Ammar; Cheung,Michael, Policy-based network security management.
  173. Bezilla, Daniel B.; Immordino, John L.; Le Ogura, James, Policy-based selection of remediation.
  174. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  175. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  176. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  177. Bezilla, Daniel Bailey; Immordino, John Leonard; Ogura, James Le, Policy-based selection of remediation.
  178. Knouse,Charles W.; Thiyagarajan,Lakshmi Velandai, Post data processing.
  179. Von Koch, Walter V.; Lyndersay, Sean O., RSS data-processing object.
  180. Kim, Jane T.; Gandhi, Amar S.; Lyndersay, Sean O., RSS hostable control.
  181. Marcjan, Cezary; Kott, Ryszard K.; Turski, Andrzej, Rapid prototyping, generating and dynamically modifying a schema representing a database.
  182. Dapp,Michael C., Real time active network compartmentalization.
  183. Walsh, James E.; Forbes, Jonathan, Real-time analysis of web browsing behavior.
  184. Nachenberg, Carey; Barajas, Frank, Real-time training for a computer code intrusion detection system.
  185. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  186. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  187. Alexander Berger ; Amir Netz ; Mosha Pasumansky, Record for a multidimensional database with flexible paths.
  188. Alexander Berger ; Amir Netz ; Mosha Pasumansky, Record for multidimensional databases.
  189. Bakalash, Reuven; Shaked, Guy; Caspi, Joseph, Relational database management system (RDBMS) employing multi-dimensional database (MDDB) for servicing query statements through one or more client machines.
  190. Bakalash, Reuven; Shaked, Guy; Caspi, Joseph, Relational database management system having integrated non-relational multi-dimensional data store of aggregated data elements.
  191. Denis, Arnaud; Politte, Maureen; Calabio, Randy; Nguyen, Hoai, Remote monitoring system.
  192. Denis, Arnaud; Politte, Maureen; Calabio, Randy; Nguyen, Hoai, Remote monitoring system.
  193. Epling, Jeremiah Seth; Huang, Li-Hsin; Van Dok, Cornelis K.; Davis, Jeffrey M., Searching and browsing URLs and URL history.
  194. Epling, Jeremiah Seth; Huang, Li-Hsin; Van Dok, Cornelis K.; Davis, Jeffrey M., Searching and browsing URLs and URL history.
  195. Hrabik, Michael; Guilfoyle, Jeffrey J.; Beaver, Edward Mac, Security system for a computer network having a security subsystem and a master system which monitors the integrity of a security subsystem.
  196. Hrabik, Michael; Guilfoyle, Jeffrey J.; Beaver, Edward “Mac”, Security system for a computer network having a security subsystem and a master system which monitors the integrity of a security subsystem.
  197. Gustave, Christophe; Chow, Stanley TaiHai; Wiemer, Douglas, Security vulnerability information aggregation.
  198. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  199. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  200. Poletto, Massimiliano Antonio, Stackable aggregation for connection based anomaly detection.
  201. Chesla, Avi, Stateful attack protection.
  202. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  203. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Ritter, Stephen J.; Nakawatase, Ryan Tadashi; Pelly, John; Rutherford, M. Celeste, System and method for applying a machine-processable policy rule to information gathered about a network.
  204. Fox,Kevin L.; Henning,Ronda R.; Farrell,John T.; Miller,Clifford C., System and method for assessing the security posture of a network.
  205. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  206. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  207. Burrill,Garth; Christiansen,Thomas; DellaVilla, Jr.,Salvatore A.; Dunn,Kevin; Steele, Jr.,Robert; Turpin,David, System and method for calculating part life.
  208. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  209. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  210. Heidenreich, James Ralph; Higgins, Linda Shawn, System and method for facilitating and evaluating user thinking about an arbitrary problem using archetype process.
  211. Heidenreich, James Ralph; Higgins, Linda Shawn, System and method for facilitating collaboration and multiple user thinking or cooperation regarding an arbitrary problem.
  212. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpoie, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  213. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  214. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  215. Westerfeld, Kurt Andrew; Warren, Hugh, System and method for managing changes in a network datacenter.
  216. Wilkinson, Mark L.; Miller, Ronald J.; McDaniels, Michael J., System and method for managing network communications.
  217. Westerfeld, Kurt Andrew; Judson, John Ross, System and method for modeling interdependencies in a network datacenter.
  218. Westerfeld, Kurt Andrew; Judson, John Ross, System and method for modeling interdependencies in a network datacenter.
  219. Joy, Ryan; Faulkner, Gary; Primm, Michael R.; Stich, Martin John, System and method for network device communication.
  220. Joy, Ryan; Faulkner, Gary; Primm, Michael; Stich, Martin John, System and method for network device communication.
  221. Pietrowicz, Stanley; Hylkema, Michael M.; Martin, Paul D.; Youzwak, Jason; Naidu, Aditya, System and method for network traffic profiling and visualization.
  222. Pietrowicz, Stanley; Hylkema, Michael M.; Martin, Paul D.; Youzwak, Jason; Naidu, Aditya, System and method for network traffic profiling and visualization.
  223. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  224. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  225. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  226. Cole,David M.; Hanzlik,Dennis J.; Caso,Erik, System and method for network vulnerability detection and reporting.
  227. Keir, Robin M.; Ecker, Stephen A., System and method for network vulnerability detection and reporting.
  228. Keir,Robin M.; Ecker,Stephen A., System and method for network vulnerability detection and reporting.
  229. Kurtz, George R.; Cole, David M.; Caso, Erik; Kuykendall, Dan, System and method for network vulnerability detection and reporting.
  230. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  231. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  232. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  233. McClure,Stuart C.; Kurtz,George; Keir,Robin; Beddoe,Marshall A.; Morton,Michael J.; Prosise,Christopher M.; Cole,David M.; Abad,Christopher, System and method for network vulnerability detection and reporting.
  234. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  235. Cohen, Gideon; Meiseles, Moshe; Reshef, Eran, System and method for risk detection and analysis in a computer network.
  236. Cohen, Gideon; Meiseles, Moshe; Reshef, Eran, System and method for risk detection and analysis in a computer network.
  237. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Pelly, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul, System and method for security information normalization.
  238. Bunker, Eva; Bunker, Nelson; Mitchell, Kevin; Harris, David, System and method for selecting and applying filters for intrusion protection system within a vulnerability management system.
  239. Tanzella,Fred C.; Hrastar,Scott, System and method for sensing wireless LAN activity.
  240. Sima, Caleb, System and method for testing web applications with recursive discovery and analysis.
  241. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  242. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  243. Hrastar,Scott, System and method for wireless LAN dynamic channel change with honeypot trap.
  244. Higgins,Linda S.; Heidenreich,James R., System and method of facilitating and evaluating user thinking about an arbitrary problem.
  245. Higgins,Linda S.; Heidenreich,James R., System and method of facilitating and evaluating user thinking about an arbitrary problem using an archetype problem structure.
  246. Higgins,Linda S.; Heidenreich,James R., System and method of facilitating and evaluating user thinking about an arbitrary problem using an archetype process.
  247. Higgins,Linda S.; Heidenreich,James R., System and method of facilitating and evaluating user thinking about an arbitrary problem using visual feedback.
  248. Andres, Steven G.; Cole, David M.; Cummings, Thomas Gregory; Garcia, Roberto Ramon; Kenyon, Brian Michael; Kurtz, George R.; McClure, Stuart Cartier; Moore, Christopher William; O'Dea, Michael J.; Saruwatari, Ken D., System and method of managing network security risks.
  249. Beddoe, Marshall A.; McClure, Stuart C., System and method of network endpoint security.
  250. Beddoe, Marshall; Keir, Robin, System and method of operating system identification.
  251. Heidenreich, James Ralph; Higgins, Linda Shawn, System and method to provide a customized problem solving environment for the development of user thinking about an arbitrary problem.
  252. Heidenreich, James Ralph; Higgins, Linda Shawn, System and method to provide a customized problem solving environment for the development of user thinking about an arbitrary problem.
  253. Higgins, Linda Shawn; Heidenreich, James Ralph, System and method to provide a customized problem solving environment for the development of user thinking about an arbitrary problem.
  254. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., System and methods for adaptive model generation for detecting intrusion in computer systems.
  255. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., System and methods for adaptive model generation for detecting intrusion in computer systems.
  256. Heidenreich, James Ralph; Higgins, Linda Shawn, System and methods for facilitating and documenting user thinking and learning using enhanced interactive constructs.
  257. Childress,Rhonda L.; Laney,Mark Anthony; Pennell,Neil Raymond, System for the tracking of errors in a communication network enabling users to selectively bypass system error logs and make real-time responses to detected errors.
  258. Amnon, Lotem; Cohen, Gideon; Meiseles, Moshe; Horn, Ilan, System, method and computer readable medium for evaluating potential attacks of worms.
  259. Lotem, Amnon; Cohen, Gideon; Meiseles, Moshe; Horn, Ilan, System, method and computer readable medium for evaluating potential attacks of worms.
  260. Tracy, Richard P.; Smith, Peter A.; Berman, Lon J.; Catlin, Gary M.; Wilson, David J.; Barrett, Hugh; Hall, Jr., Larry L., System, method and medium for certifying and accrediting requirements compliance.
  261. Tracy,Richard P.; Barrett,Hugh; Berman,Lon J.; Catlin,Gary M., System, method and medium for certifying and accrediting requirements compliance.
  262. Davis, John Fred; Himberger, Kevin David; Jeffries, Clark Debs; Jeremiah, Garreth Joseph, System, method and program to limit rate of transferring messages from suspected spammers.
  263. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  264. Kleinmann, Amit, System, method, and computer program product for scaleable data collection and audience feedback.
  265. Hrastar, Scott E., Systems and methods for adaptive location tracking.
  266. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., Systems and methods for adaptive model generation for detecting intrusions in computer systems.
  267. Hrastar,Scott E., Systems and methods for adaptive monitoring with bandwidth constraints.
  268. Hrastar,Scott E., Systems and methods for adaptively scanning for wireless communications.
  269. Heidenreich, James Ralph; Higgins, Linda Shawn, Systems and methods for archetype enabled research and search.
  270. Hrastar,Scott E., Systems and methods for automated network policy exception detection and correction.
  271. Hrastar,Scott E.; Haddad,Issam Nadim, Systems and methods for dynamic sensor discovery and selection.
  272. White, Sean, Systems and methods for journaling and executing device control instructions.
  273. Hrastar,Scott; Lynn,Michael T.; Sale,Edwin L.; Hollingsworth,Dawn M., Systems and methods for network security.
  274. Kelekar, Samir Gurunath, Systems and methods for real-time network-based vulnerability assessment.
  275. Wallace, Christopher E., Systems and methods for representing and editing multi-dimensional data.
  276. Chan,Christine Wai Han, Systems and methods for testing whether access to a resource is authorized based on access information.
  277. Sinha, Amit, Systems and methods for wireless intrusion detection using spectral analysis.
  278. Sinha, Amit; Darrow, Nicholas John, Systems and methods for wireless network content filtering.
  279. Hrastar, Scott E., Systems and methods for wireless network site survey.
  280. Sinha, Amit, Systems and methods for wireless security using distributed collaboration of wireless clients.
  281. Sinha, Amit; Darrow, Nicholas John, Systems and methods for wireless vulnerability analysis.
  282. McFarlane, Bradley Kenneth; Wiemer, Douglas; McNamee, Kevin, Systems and methods of associating security vulnerabilities and assets.
  283. Wilkinson,Mark L.; Miller,Ronald J.; McDaniels,Michael J., Tracking communication for determining device states.
  284. Dawson, Christopher J.; DiLuoffo, Vincenzo V.; Fellenstein, Craig W., Tracking the security enforcement in a grid system.
  285. Blaisdell, Russell C.; Lake, John Michael; MacLellan, Scot, Typicality filtering of event indicators for information technology resources.
  286. Blaisdell,Russell C.; Lake,John Michael; MacLellan,Scot, Typicality filtering of event indicators for information technology resources.
  287. Martherus, Robin E.; Ramamurthy, Srinivasagopalan, User authentication.
  288. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  289. Fitzpatrick, Alexander Gordon; Seydnejad, Sasan, User interface for a multi-dimensional data store.
  290. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  291. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  292. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  293. D'Mello, Kurt; Tyree, David Spencer; Gandhe, Sudhir, Vulnerability-based remediation selection.
  294. D'Mello, Kurt; Tyree, David Spencer; Gandhe, Sudhir, Vulnerability-based remediation selection.
  295. Billhartz,Thomas Jay, Wireless local or metropolitan area network with intrusion detection features and related methods.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로