摘要:
A method comprises receiving one or more images of a person from one or more image capture devices in response to an input, identifying one or more items of personal protective equipment in the one or more images, determining the positioning of the one or more items of personal protective equipment relative to the person in the one or more images, and verifying compliance with personal protective equipment standards based on the one or more identified items of personal protective equipment and the positioning of the one or more items of personal protective equipment.
摘要:
A method comprises receiving one or more images of a person from one or more image capture devices in response to an input, identifying one or more items of personal protective equipment in the one or more images, determining the positioning of the one or more items of personal protective equipment relative to the person in the one or more images, and verifying compliance with personal protective equipment standards based on the one or more identified items of personal protective equipment and the positioning of the one or more items of personal protective equipment.
摘要:
A system and method include obtaining data related to accessing cyber assets and accessing physical assets from a combined cyber access and physical access control system that protects cyber and physical assets of an organization from both authorized and unauthorized access with malicious intent. The system and method compare the data to known patterns of expected behavior, and identify patterns of suspicious behavior as a function of comparing the data to the patterns of expected behavior. The comparison is utilized to identify potentially malicious insider behavior toward the cyber and physical assets.
摘要:
Campaign messages may be prioritized for a given potential recipient by generating one or more learning structures associated with the campaign message. The learning structure(s) is then evaluated relative to the potential recipient to determine potential effectiveness of the campaign messages for the potential recipient. One such learning structure is a decision tree comprising a hierarchy of attributes associated with past recipients of the campaign message. Attributes associated with the potential recipient are then applied to the decision tree to obtain a metric of potential value of the campaign message to the potential recipient.
摘要:
A system and method include obtaining data related to accessing cyber assets and accessing physical assets from a combined cyber access and physical access control system that protects cyber and physical assets of an organization from both authorized and unauthorized access with malicious intent. The system and method compare the data to known patterns of expected behavior, and identify patterns of suspicious behavior as a function of comparing the data to the patterns of expected behavior. The comparison is utilized to identify potentially malicious insider behavior toward the cyber and physical assets.