Match Document Document Title Score
US20110054961 Adaptive Risk Analysis Engine  
A method for characterizing risk using an adaptive risk analysis engine. Following a user request for a risk analysis, online and/or offline factual information is retrieved by the engine and is...
1000
7904962 Network attack modeling, analysis, and response  
Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to...
859
9652813 Risk analysis engine  
In a risk analysis system, a risk analysis engine and a related method, incident information or activity information, which may be of a spatiotemporal nature, is analyzed. Behavioral patterns are...
845
9779236 Risk assessment modeling  
One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to identify a set of authentication...
841
US20150339477 RISK ASSESSMENT MODELING  
One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to identify a set of authentication...
840
9396332 Risk assessment modeling  
One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to identify a set of authentication...
832
8844029 Risk model correcting system, risk model correcting method, and risk model correcting program  
A risk value is calculated to suit a state and environment of an analysis target system, by presenting data for determining whether or not a calculated risk is correct, and presenting portions for...
822
7984504 Network risk analysis  
Analyzing security risk in a computer network includes receiving an event associated with a selected object in the computer network, and determining an object risk level for the selected object...
821
US20140046863 Risk Analysis Engine  
In a risk analysis system, a risk analysis engine and a related method, incident information or activity information, which may be of a spatiotemporal nature, is analyzed. Behavioral patterns are...
811
7409721 Network risk analysis  
A system and method are disclosed for analyzing security risks in a computer network. The system constructs asset relationships among a plurality of objects in the computer network and receives an...
805
US20100162401 RISK MODEL CORRECTING SYSTEM, RISK MODEL CORRECTING METHOD, AND RISK MODEL CORRECTING PROGRAM  
A risk value is calculated to suit a state and environment of an analysis target system, by presenting data for determining whether or not a calculated risk is correct, and presenting portions for...
800
US20160379326 RISK MODELING SYSTEM  
The system provides early warning intelligence feeds which analyze risks of potential human caused threats and naturally caused hazards. It includes data mining functions that autonomously search...
799
8495745 Asset risk analysis  
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for asset risk analysis. One method includes receiving threat definition data for threats,...
774
US20040260703 Quantitative property loss risk model and decision analysis framework  
Disclosed is an enterprise risk system which allows improved management of business interruption risks. Business interruption risks are those risks that can significantly disrupt normal business...
767
9021595 Asset risk analysis  
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for asset risk analysis. One method includes receiving threat definition data for threats,...
759
8793151 System and method for organizational risk analysis and reporting by mapping detected risk patterns onto a risk ontology  
A method for characterizing risk using an adaptive risk analysis engine. Following a user request for a risk analysis, online and/or offline factual information is retrieved by the engine and is...
754
9456001 Attack notification  
Systems, methods, and machine-readable and executable instructions are provided for attack notification. Attack notification can include receiving security-related data from a number of computing...
749
US20160359899 SYSTEM AND METHOD FOR CYBER ATTACKS ANALYSIS AND DECISION SUPPORT  
A method for cyber attack risk assessment is disclosed. The method uses at least one hardware processor for: continuously collecting, from a networked resource, cyber attack data having multiple...
746
US20090099885 METHOD FOR RISK ANALYSIS USING INFORMATION ASSET MODELLING  
A method for risk analysis using information asset modeling. The method has the steps of: (a) identifying an information asset which uses or provides a network service; (b) identifying a threat on...
744
9166999 Security risk aggregation, analysis, and adaptive control  
Methods and apparatuses, including computer program products, are described for transaction-based security risk aggregation and analysis. A server computing device receives security risk data...
738
US20050144480 Method of risk analysis in an automatic intrusion response system  
The present invention relates to a method of risk analysis in an automatic intrusion response system that provides computer-related security in a large scale dynamic network environment,...
737
US20110308790 IN SITU METHANOGENESIS MODELING AND RISK ANALYSIS  
This invention generally relates to natural gas and methylotrophic energy generation, bio-generated fuels and microbiology. In alternative embodiments, the invention provides nutrient amendments...
735
7472421 Computer model of security risks  
The security risk associated with a computer system may be quantified by identifying a computer system, identifying a risk associated with the computer system, the risk relating to an event that...
734
9386463 Application risk analysis  
A method of managing the risk of a monitored application installed on a mobile communication device comprises determining a risk profile of the monitored application based on at least one of:...
730
9680855 Probabilistic model for cyber risk forecasting  
A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by...
729
US20160234239 APPARATUS AND METHOD FOR TYING CYBER-SECURITY RISK ANALYSIS TO COMMON RISK METHODOLOGIES AND RISK LEVELS  
This disclosure provides systems and methods for tying cyber-security risk analysis to common risk methodologies and risk levels. A method includes identifying a plurality of connected devices...
725
US20130227697 SYSTEM AND METHOD FOR CYBER ATTACKS ANALYSIS AND DECISION SUPPORT  
A method for cyber attack risk assessment, the method comprising operating at least one hardware processor for: collecting global cyber attack data from a networked resource; collecting...
718
9426169 System and method for cyber attacks analysis and decision support  
A method for cyber attack risk assessment, the method including operating at least one hardware processor for: collecting global cyber attack data from a networked resource; collecting...
714
9811794 Qualitative and quantitative modeling of enterprise risk management and risk registers  
The present invention is applicable in the field of corporate finance, corporate capital investments, economics, math, business risk analysis, simulation, decision analysis, qualitative risk...
707
US20140200953 QUALITATIVE AND QUANTITATIVE MODELING OF ENTERPRISE RISK MANAGEMENT AND RISK REGISTERS  
The present invention is applicable in the field of corporate finance, corporate capital investments, economics, math, business risk analysis, simulation, decision analysis, qualitative risk...
704
US20150381649 Probabilistic Model For Cyber Risk Forecasting  
A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by...
702
8712596 Malicious attack detection and analysis  
A system for characterizing malicious activity in an intelligent utility grid system includes a system storage in which to store a database including a plurality of rules. A collector is operable...
693
7514592 Inducible heart attack animal model  
An animal model of coronary heart disease has been developed where myocardial infarct can be induced by altering the animal's diet. In all embodiments, this animal model is a result of reduced...
691
US20160226893 METHODS FOR OPTIMIZING AN AUTOMATED DETERMINATION IN REAL-TIME OF A RISK RATING OF CYBER-ATTACK AND DEVICES THEREOF  
This technology extracts threat data in real time from received incident data on each of one or more current cyber-attacks. Classified data associated with one of a plurality of prior...
687
US20090083695 Enterprise Threat Analysis and Modeling  
Systems and methods relating to a method for generating a threat analysis and modeling tool are described. In an implementation, aggregate analysis is performed upon applications of an enterprise...
686
US20060265324 Security risk analysis systems and methods  
Security risk analysis systems and methods are disclosed. Vulnerabilities affecting assets of a communication network are associated with other assets of the communication network according to...
676
US20110288692 MALICIOUS ATTACK DETECTION AND ANALYSIS  
A system for characterizing malicious activity in an intelligent utility grid system includes a system storage in which to store a database including a plurality of rules. A collector is operable...
672
9825989 Cyber attack early warning system  
An early warning system and method for generating an alert regarding a potential attack on a client device is provided for based on real-time analysis. The early warning system and method...
672
7552480 Method and system of assessing risk using a one-dimensional risk assessment model  
A quantitative model combines a one-dimensional risk-assessment approach with expert knowledge to enable calculation of a probability or likelihood of exploitation of a threat to an information...
670
US20170279843 PROBABILISTIC MODEL FOR CYBER RISK FORECASTING  
A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by...
669
8438643 Information system service-level security risk analysis  
Information system service-level security risk analysis systems, methods, and Graphical User Interfaces are disclosed. Assets of an information system that have relationships with a service...
667
US20050223420 Inducible heart attack animal model  
An animal model of coronary heart disease has been developed where myocardial infarct can be induced by altering the animal's diet. In all embodiments, this animal model is a result of reduced...
666
9754256 Variable risk engine  
The invention provides systems and methods for risk assessment using a variable risk engine. A method for risk assessment may comprise setting an amount of real-time risk analysis for an online...
666
7464407 Attack defending system and attack defending method  
An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall...
662
9398038 Collaborative phishing attack detection  
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals...
662
US20090228316 RISK PROFILING FOR ENTERPRISE RISK MANAGEMENT  
A risk profile element is created and associated with a control element within a risk hierarchy associated with an organization. A risk attribute is updated automatically within the risk profile...
660
9591017 Collaborative phishing attack detection  
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals...
657
8683584 Risk assessment  
Performing a risk assessment of a website is disclosed. A plurality of elements included in the website is categorized. The risk posed by the presence of at least some of the plurality of elements...
656
9800605 Risk scoring for threat assessment  
Threat risks to an enterprise are detected and assessed by assembling singular threats identified using both direct and behavioral threat indicators into composite threats to create complex use...
655
9325730 Collaborative phishing attack detection  
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals...
652


Search
« search again