Virtual topological queries
    21.
    发明授权

    公开(公告)号:US10380186B2

    公开(公告)日:2019-08-13

    申请号:US12787593

    申请日:2010-05-26

    Abstract: Systems, methods, and other embodiments associated with virtual topological queries are described. One example method includes executing a first topological query on a stored graph to generate a first result graph. The example method may also include manipulating the first result graph to generate a virtual query result graph as a function of a second topological query. The example method may also include providing the virtual query result graph.

    Security indicator linkage determination

    公开(公告)号:US10356109B2

    公开(公告)日:2019-07-16

    申请号:US15328018

    申请日:2014-07-21

    Abstract: According to an example, security indicator linkage determination may include parsing input data that is used to determine a plurality of sequences of steps that are involved in attacks. A linkage selected from temporal, spatial, and/or behavioral linkages may be applied to the parsed input data to determine the plurality of sequences of steps. A security indicator that is related to a potential attack may be received. The plurality of sequences of steps may be used to determine whether the security indicator matches a step in one of the plurality of sequences of steps. In response to a determination that the security indicator matches a step in one of the plurality of sequences of steps, linkage between the security indicator and another security indicator from the one of the plurality of sequences of steps that are involved in the attacks may be identified.

    Generating a feature set
    28.
    发明授权

    公开(公告)号:US10331799B2

    公开(公告)日:2019-06-25

    申请号:US14780707

    申请日:2013-03-28

    Abstract: A technique to generate a feature set. A plurality of samples from a data set can be clustered. Features can be selected based on the clusters. The features can be added to the feature set. Additional samples can be clustered and features selected and added to the feature set until a convergence threshold is reached.

    Decommissioning of source storages
    29.
    发明授权

    公开(公告)号:US10324624B2

    公开(公告)日:2019-06-18

    申请号:US15633149

    申请日:2017-06-26

    Abstract: According to examples, an apparatus may include a processor and a non-transitory computer readable medium storing instructions that cause the processor to classify files stored on a source storage into files for deletion and files for migration based on a storage policy and meta-data, generate aliases to link the files classified for migration to a location on a target storage, copy the files classified for migration from the source storage to the linked location on the target storage, and determine whether the files copied onto the target storage are identical to the files classified for migration on the source storage using a digital key. In response to a determination that the copied files are identical to the files classified for migration, the processor may activate the generated aliases and may decommission the source storage.

    NETWORK TRAFFIC DATA SUMMARIZATION
    30.
    发明申请

    公开(公告)号:US20190182167A1

    公开(公告)日:2019-06-13

    申请号:US15841137

    申请日:2017-12-13

    Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions executable by the processor to: access network traffic data pertaining to data flows among nodes in a network; partition the network traffic data into a plurality of windows; for each of the plurality of windows, aggregate data flows between pairs of nodes; compute a data distribution of each of the aggregated data flows; select a summary structure for each of the aggregated data flows based on the computed data distributions of the aggregated data flows; generate a summary of each of the aggregated data flows using the selected summary structures for the aggregated data flows; and store the generated summaries.

Patent Agency Ranking