COMPUTATION OF TOP-K PAIRWISE CO-OCCURRENCE STATISTICS
    1.
    发明申请
    COMPUTATION OF TOP-K PAIRWISE CO-OCCURRENCE STATISTICS 审中-公开
    TOP-K配对协同统计的计算

    公开(公告)号:US20130204883A1

    公开(公告)日:2013-08-08

    申请号:US13364328

    申请日:2012-02-02

    IPC分类号: G06F17/30

    CPC分类号: G06F16/951

    摘要: Various technologies described herein pertain to computing top-K pairwise co-occurrence statistics using an upper bounding heuristic. Upper bound values of a co-occurrence statistic for items in a set can be computed based on a query item, and items can be sorted into an order. The items and the query item are represented by respective portions of a tensor. An item from the order associated with a highest upper bound value can be selected, an actual value of the co-occurrence statistic can be computed for the selected item, the upper bound value for the selected item can be replaced with the actual value for the selected item, and the selected item can be repositioned in the order. When the top-K items in the order lack an item associated with an upper bound value, the top-K items and actual values of the co-occurrence statistic for the top-K items can be outputted.

    摘要翻译: 本文描述的各种技术涉及使用上限启发式计算top-K成对共生统计。 可以基于查询项目来计算集合中的项目的同现统计量的上限值,并且可以将项目排序成顺序。 项目和查询项目由张量的相应部分表示。 可以选择与最高上限值相关联的订单项,可以为所选项目计算同现统计的实际值,所选项目的上限值可以替换为 所选项目,并且所选项目可以按顺序重新定位。 当订单中的顶部K个项目缺少与上限值相关联的项目时,可以输出顶部K项目的同现统计的顶部K项目和实际值。

    MANAGING SECURITY CONFIGURATION THROUGH MACHINE LEARNING, COMBINATORIAL OPTIMIZATION AND ATTACK GRAPHS
    2.
    发明申请
    MANAGING SECURITY CONFIGURATION THROUGH MACHINE LEARNING, COMBINATORIAL OPTIMIZATION AND ATTACK GRAPHS 有权
    通过机器学习管理安全配置,组合优化和攻击格局

    公开(公告)号:US20100192195A1

    公开(公告)日:2010-07-29

    申请号:US12359422

    申请日:2009-01-26

    IPC分类号: G06F21/00

    CPC分类号: G06F21/577

    摘要: The claimed subject matter provides systems and/or methods that combat identity follow-on attacks. The system can include components for receiving a plurality of security configuration changes, selecting which of the changes included in the plurality of security changes to approve or disapprove, and based on which of the changes are approved or disapproved by an administrator, generating a further plurality of security configuration changes that the administrator can once again approve or disapprove until the administrator is satisfied with the security configuration changes.

    摘要翻译: 所要求保护的主题提供了打击身份后续攻击的系统和/或方法。 系统可以包括用于接收多个安全配置更改的组件,选择包括在多个安全更改中的哪些更改以批准或不批准,并且基于哪个更改被管理员批准或被拒绝,生成另外的多个 的安全配置更改,管理员可以再次批准或不批准,直到管理员对安全配置更改感到满意。

    Managing security configuration through machine learning, combinatorial optimization and attack graphs
    3.
    发明授权
    Managing security configuration through machine learning, combinatorial optimization and attack graphs 有权
    通过机器学习,组合优化和攻击图来管理安全配置

    公开(公告)号:US08683546B2

    公开(公告)日:2014-03-25

    申请号:US12359422

    申请日:2009-01-26

    IPC分类号: G06F21/00

    CPC分类号: G06F21/577

    摘要: The claimed subject matter provides systems and/or methods that combat identity follow-on attacks. The system can include components for receiving a plurality of security configuration changes, selecting which of the changes included in the plurality of security changes to approve or disapprove, and based on which of the changes are approved or disapproved by an administrator, generating a further plurality of security configuration changes that the administrator can once again approve or disapprove until the administrator is satisfied with the security configuration changes.

    摘要翻译: 所要求保护的主题提供了打击身份后续攻击的系统和/或方法。 系统可以包括用于接收多个安全配置更改的组件,选择包括在多个安全更改中的哪些更改以批准或不批准,并且基于哪个更改被管理员批准或被拒绝,生成另外的多个 的安全配置更改,管理员可以再次批准或不批准,直到管理员对安全配置更改感到满意。