Abstract:
Various embodiments for predicting which software vulnerabilities will be exploited by malicious hackers and hence prioritized by patching are disclosed.
Abstract:
Various embodiments of systems and methods for an at-risk system identification via analysis of discussions from various online hacker communities are disclosed herein.
Abstract:
Embodiments of a system and method for identifying malware tasks using a controlled environment to run malicious software to generate analysis reports, a parser to extract features from the analysis reports and a cognitively inspired learning algorithm to predict tasks associated with the malware are disclosed.
Abstract:
Various embodiments of systems and methods for an at-risk system identification via analysis of discussions from various online hacker communities are disclosed herein.
Abstract:
Various embodiments for predicting which software vulnerabilities will be exploited by malicious hackers and hence prioritized by patching are disclosed.
Abstract:
Embodiments of a system and method for identifying malware tasks using a controlled environment to run malicious software to generate analysis reports, a parser to extract features from the analysis reports and a cognitively inspired learning algorithm to predict tasks associated with the malware are disclosed.