Match Document Document Title Score
US20110054961 Adaptive Risk Analysis Engine  
A method for characterizing risk using an adaptive risk analysis engine. Following a user request for a risk analysis, online and/or offline factual information is retrieved by the engine and is...
1000
7904962 Network attack modeling, analysis, and response  
Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to...
859
9652813 Risk analysis engine  
In a risk analysis system, a risk analysis engine and a related method, incident information or activity information, which may be of a spatiotemporal nature, is analyzed. Behavioral patterns are...
842
US20150339477 RISK ASSESSMENT MODELING  
One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to identify a set of authentication...
840
9396332 Risk assessment modeling  
One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to identify a set of authentication...
832
8844029 Risk model correcting system, risk model correcting method, and risk model correcting program  
A risk value is calculated to suit a state and environment of an analysis target system, by presenting data for determining whether or not a calculated risk is correct, and presenting portions for...
824
7984504 Network risk analysis  
Analyzing security risk in a computer network includes receiving an event associated with a selected object in the computer network, and determining an object risk level for the selected object...
820
US20140046863 Risk Analysis Engine  
In a risk analysis system, a risk analysis engine and a related method, incident information or activity information, which may be of a spatiotemporal nature, is analyzed. Behavioral patterns are...
808
7409721 Network risk analysis  
A system and method are disclosed for analyzing security risks in a computer network. The system constructs asset relationships among a plurality of objects in the computer network and receives an...
803
US20100162401 RISK MODEL CORRECTING SYSTEM, RISK MODEL CORRECTING METHOD, AND RISK MODEL CORRECTING PROGRAM  
A risk value is calculated to suit a state and environment of an analysis target system, by presenting data for determining whether or not a calculated risk is correct, and presenting portions for...
798
US20160379326 RISK MODELING SYSTEM  
The system provides early warning intelligence feeds which analyze risks of potential human caused threats and naturally caused hazards. It includes data mining functions that autonomously search...
796
8495745 Asset risk analysis  
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for asset risk analysis. One method includes receiving threat definition data for threats,...
771
US20040260703 Quantitative property loss risk model and decision analysis framework  
Disclosed is an enterprise risk system which allows improved management of business interruption risks. Business interruption risks are those risks that can significantly disrupt normal business...
765
9021595 Asset risk analysis  
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for asset risk analysis. One method includes receiving threat definition data for threats,...
757
8793151 System and method for organizational risk analysis and reporting by mapping detected risk patterns onto a risk ontology  
A method for characterizing risk using an adaptive risk analysis engine. Following a user request for a risk analysis, online and/or offline factual information is retrieved by the engine and is...
751
9456001 Attack notification  
Systems, methods, and machine-readable and executable instructions are provided for attack notification. Attack notification can include receiving security-related data from a number of computing...
745
US20160359899 SYSTEM AND METHOD FOR CYBER ATTACKS ANALYSIS AND DECISION SUPPORT  
A method for cyber attack risk assessment is disclosed. The method uses at least one hardware processor for: continuously collecting, from a networked resource, cyber attack data having multiple...
742
US20090099885 METHOD FOR RISK ANALYSIS USING INFORMATION ASSET MODELLING  
A method for risk analysis using information asset modeling. The method has the steps of: (a) identifying an information asset which uses or provides a network service; (b) identifying a threat on...
742
7472421 Computer model of security risks  
The security risk associated with a computer system may be quantified by identifying a computer system, identifying a risk associated with the computer system, the risk relating to an event that...
736
9166999 Security risk aggregation, analysis, and adaptive control  
Methods and apparatuses, including computer program products, are described for transaction-based security risk aggregation and analysis. A server computing device receives security risk data...
736
US20110308790 IN SITU METHANOGENESIS MODELING AND RISK ANALYSIS  
This invention generally relates to natural gas and methylotrophic energy generation, bio-generated fuels and microbiology. In alternative embodiments, the invention provides nutrient amendments...
735
US20050144480 Method of risk analysis in an automatic intrusion response system  
The present invention relates to a method of risk analysis in an automatic intrusion response system that provides computer-related security in a large scale dynamic network environment,...
734
9680855 Probabilistic model for cyber risk forecasting  
A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by...
731
9386463 Application risk analysis  
A method of managing the risk of a monitored application installed on a mobile communication device comprises determining a risk profile of the monitored application based on at least one of:...
727
US20160234239 APPARATUS AND METHOD FOR TYING CYBER-SECURITY RISK ANALYSIS TO COMMON RISK METHODOLOGIES AND RISK LEVELS  
This disclosure provides systems and methods for tying cyber-security risk analysis to common risk methodologies and risk levels. A method includes identifying a plurality of connected devices...
725
9426169 System and method for cyber attacks analysis and decision support  
A method for cyber attack risk assessment, the method including operating at least one hardware processor for: collecting global cyber attack data from a networked resource; collecting...
716
US20130227697 SYSTEM AND METHOD FOR CYBER ATTACKS ANALYSIS AND DECISION SUPPORT  
A method for cyber attack risk assessment, the method comprising operating at least one hardware processor for: collecting global cyber attack data from a networked resource; collecting...
715
US20140200953 QUALITATIVE AND QUANTITATIVE MODELING OF ENTERPRISE RISK MANAGEMENT AND RISK REGISTERS  
The present invention is applicable in the field of corporate finance, corporate capital investments, economics, math, business risk analysis, simulation, decision analysis, qualitative risk...
707
US20150381649 Probabilistic Model For Cyber Risk Forecasting  
A system and method are presented for forecasting the risk of cyber-attacks on targeted networks. The described technology quantifies linear and non-linear damages to network-dependent assets by...
705
8712596 Malicious attack detection and analysis  
A system for characterizing malicious activity in an intelligent utility grid system includes a system storage in which to store a database including a plurality of rules. A collector is operable...
694
7514592 Inducible heart attack animal model  
An animal model of coronary heart disease has been developed where myocardial infarct can be induced by altering the animal's diet. In all embodiments, this animal model is a result of reduced...
689
US20160226893 METHODS FOR OPTIMIZING AN AUTOMATED DETERMINATION IN REAL-TIME OF A RISK RATING OF CYBER-ATTACK AND DEVICES THEREOF  
This technology extracts threat data in real time from received incident data on each of one or more current cyber-attacks. Classified data associated with one of a plurality of prior...
685
US20090083695 Enterprise Threat Analysis and Modeling  
Systems and methods relating to a method for generating a threat analysis and modeling tool are described. In an implementation, aggregate analysis is performed upon applications of an enterprise...
683
US20060265324 Security risk analysis systems and methods  
Security risk analysis systems and methods are disclosed. Vulnerabilities affecting assets of a communication network are associated with other assets of the communication network according to...
673
US20110288692 MALICIOUS ATTACK DETECTION AND ANALYSIS  
A system for characterizing malicious activity in an intelligent utility grid system includes a system storage in which to store a database including a plurality of rules. A collector is operable...
669
7552480 Method and system of assessing risk using a one-dimensional risk assessment model  
A quantitative model combines a one-dimensional risk-assessment approach with expert knowledge to enable calculation of a probability or likelihood of exploitation of a threat to an information...
668
8438643 Information system service-level security risk analysis  
Information system service-level security risk analysis systems, methods, and Graphical User Interfaces are disclosed. Assets of an information system that have relationships with a service...
665
US20050223420 Inducible heart attack animal model  
An animal model of coronary heart disease has been developed where myocardial infarct can be induced by altering the animal's diet. In all embodiments, this animal model is a result of reduced...
664
7464407 Attack defending system and attack defending method  
An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall...
660
US20090228316 RISK PROFILING FOR ENTERPRISE RISK MANAGEMENT  
A risk profile element is created and associated with a control element within a risk hierarchy associated with an organization. A risk attribute is updated automatically within the risk profile...
660
9398038 Collaborative phishing attack detection  
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals...
659
9591017 Collaborative phishing attack detection  
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals...
658
8683584 Risk assessment  
Performing a risk assessment of a website is disclosed. A plurality of elements included in the website is categorized. The risk posed by the presence of at least some of the plurality of elements...
656
9317692 System and method for vulnerability risk analysis  
Embodiments of the present invention are directed to a method and system for automated risk analysis. The method includes accessing host configuration information of a host and querying a...
652
US20050066195 Factor analysis of information risk  
The invention is a method of measuring and representing security risk. The method comprises selecting at least one object within an environment and quantifying the strength of controls of at least...
650
9325730 Collaborative phishing attack detection  
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals...
649
9230102 Apparatus and method for detecting traffic flooding attack and conducting in-depth analysis using data mining  
Provided is an apparatus and method for detecting a traffic flooding attack and conducting an in-depth analysis using data mining that may rapidly detect a distributed denial of service (DDoS)...
645
9674221 Collaborative phishing attack detection  
Described herein are methods, network devices and machine-readable storage media for detecting whether a message is a phishing attack based on the collective responses from one or more individuals...
642
US20040172557 Attack defending system and attack defending method  
An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall...
641
US20090030751 Threat Modeling and Risk Forecasting Model  
A system and method for determining residual business risks by correlating threats, controls, business continuity factors, and other general risk considerations is described. Requirements of an...
637


Search
« search again