TRAINING A SECURITY SCAN CLASSIFIER TO LEARN AN ISSUE PREFERENCE OF A HUMAN AUDITOR

    公开(公告)号:US20210073383A1

    公开(公告)日:2021-03-11

    申请号:US15751614

    申请日:2015-08-12

    Abstract: A technique includes receiving data representing an output of a security scan of an application and an audit of the security scan by a human auditor. The output represents a security issue with the application, which is identified by the security scan, and the audit represents an analysis of the security issue by the human auditor. The technique includes training a security scan classifier to learn a classification preference of the human auditor. Training the security scan classifier includes, processing the data in a processor-based machine to, based at least in part on the output of the security scan and the analysis of the security scan by the human auditor, learn the classification preference of the human auditor to the issue to build a classification model for the issue.

    Remote session information based on process identifier

    公开(公告)号:US10915383B2

    公开(公告)日:2021-02-09

    申请号:US15327599

    申请日:2014-07-31

    Abstract: A virtual desktop infrastructure (VDI) server is to receive a request from a client device to access an application on an application server, establish a session between the VDI server and the application server to allow the client device to access the application on the application server via the VDI server, obtain a process identifier of the session, obtain identity information of a user of the client device associated with a communication of the session based on the process identifier, and provide identity details of the user of the client device associated with the communication of the session to a monitor device that monitors access to the application on the application server.

    Threat score determination
    83.
    发明授权

    公开(公告)号:US10896259B2

    公开(公告)日:2021-01-19

    申请号:US15763253

    申请日:2015-09-28

    Abstract: In one example in accordance with the present disclosure, a method for threat score determination includes detecting a change in malicious activity for a security object. The method also includes identifying an indicator that provides contextual information for the security object and determining a linked resource that is associated with a database record of the security object. The method also includes determining a first threat score associated with the security object and determining a relationship between the linked resource and the security object. The method also includes determining a second threat score associated with the linked resource based on the indicator, the threat score of the linked object and the relationship between the linked resource and the security object.

    Trend correlations
    84.
    发明授权

    公开(公告)号:US10437910B2

    公开(公告)日:2019-10-08

    申请号:US15564910

    申请日:2015-04-29

    Abstract: Examples disclosed herein relate, among other things, to determining a trend correlation. In one aspect, a method is disclosed. The method may include, for example, receiving a first data set associated with a first parameter of an electronic device and a second data set associated with a second parameter of the electronic device. The method may also include generating a first trend set based on the first data set, and generating a second trend set based on the second data set. The method may further include detecting, based on the first trend set and the second trend set, a trend correlation between the first parameter of the electronic device and the second parameter of the electronic device, and providing for display correlation information describing the trend correlation.

    Parameter suggestion based on user activity

    公开(公告)号:US10430424B2

    公开(公告)日:2019-10-01

    申请号:US15033174

    申请日:2013-10-30

    Abstract: A non-transitory, computer readable storage device includes software that, while being executed by a processor, causes the processor to choose, based on user activity, a plurality of candidate parameters to be monitored from a plurality of event messages. Further, the processor executes the software to estimate a level of similarity between the chosen plurality of candidate parameters by computing a similarity score for at least two of the chosen candidate parameters. Still further, the processor executes the software to determine a plurality of parameters from the chosen candidate parameters if the similarity score for the plurality of parameters is greater than a threshold.

    Application thread visualization
    86.
    发明授权

    公开(公告)号:US10430316B2

    公开(公告)日:2019-10-01

    申请号:US15573967

    申请日:2015-05-21

    Abstract: Examples herein involve designating a first dimension of a thread visualization based on timing of a duration of a user action, the user action corresponding to a user interaction with an application; designating a second dimension of the thread visualization based on a number of threads of the application utilized for running tasks in response to the user action, the second dimension comprising a number of parallel timelines corresponding to the number of threads; determining locations for representations of the tasks within the appropriate parallel timelines of the thread visualization based on the timing of the tasks and the threads running the tasks; and rendering the thread visualization on a display.

    Event log analysis
    87.
    发明授权

    公开(公告)号:US10423624B2

    公开(公告)日:2019-09-24

    申请号:US15511940

    申请日:2014-09-23

    Abstract: Method and systems for analyzing event log elements are provided. In one example, a method includes receiving an event log element in a computer. A similarity index is calculated between the event log element and a text element. A threshold of similarity is calculated. The similarity index is compared to the threshold. If the similarity index is greater than the threshold, the event log element is grouped into a cluster with the text element to create a file of cluster assignments.

Patent Agency Ranking