Detecting network entities that pose a cybersecurity risk to a private computer network
A risk knowledge graph is created from information on risk events involving network entities of a private computer network. Each of the risk events is represented as a node in the risk knowledge graph. The nodes are connected by edges that represent the risk events. The nodes are grouped into commun...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
30.04.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | A risk knowledge graph is created from information on risk events involving network entities of a private computer network. Each of the risk events is represented as a node in the risk knowledge graph. The nodes are connected by edges that represent the risk events. The nodes are grouped into communities of related nodes. A response action is performed against a community to mitigate a cybersecurity risk posed by the community. |
---|---|
AbstractList | A risk knowledge graph is created from information on risk events involving network entities of a private computer network. Each of the risk events is represented as a node in the risk knowledge graph. The nodes are connected by edges that represent the risk events. The nodes are grouped into communities of related nodes. A response action is performed against a community to mitigate a cybersecurity risk posed by the community. |
Author | Zhang, ZhengBao Diao, Lili Li, Zhijie |
Author_xml | – fullname: Li, Zhijie – fullname: Diao, Lili – fullname: Zhang, ZhengBao |
BookMark | eNqNjDsOwjAQBV1Awe8OywEorBRRWn6iB0QZGesRrIDX8m5AuT0poKcaaTSaqRlFjpiYyxYKryE2FKFvzi0hatAAIb07pcQCcuT7K7LAdzloTzlIS8qDTzm8nII8P1OnyL_L3Ixv7iFYfDkzy_3utDmskLiGJOcxlPX5aG1VFmVl17b4p_kA7jY8hw |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
ExternalDocumentID | US11973791B1 |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_US11973791B13 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 12:50:42 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_US11973791B13 |
Notes | Application Number: US202117493494 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240430&DB=EPODOC&CC=US&NR=11973791B1 |
ParticipantIDs | epo_espacenet_US11973791B1 |
PublicationCentury | 2000 |
PublicationDate | 20240430 |
PublicationDateYYYYMMDD | 2024-04-30 |
PublicationDate_xml | – month: 04 year: 2024 text: 20240430 day: 30 |
PublicationDecade | 2020 |
PublicationYear | 2024 |
RelatedCompanies | Trend Micro Incorporated |
RelatedCompanies_xml | – name: Trend Micro Incorporated |
Score | 3.5354514 |
Snippet | A risk knowledge graph is created from information on risk events involving network entities of a private computer network. Each of the risk events is... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
Title | Detecting network entities that pose a cybersecurity risk to a private computer network |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240430&DB=EPODOC&locale=&CC=US&NR=11973791B1 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB5Kfd60KlofrCC5BU2zTdJDEJq0FKEPbKO9ld3t4uOQhGZF_PfObhPrRa-TMGwGZme-zMw3ADctxnnb4QxBDmITiim7HQQ0sD0qhImBTOrZ4eHIGyT0Yd6e1-C9moUxPKGfhhwRPUqgvytzX-ebn1ix6a0sbvkbirL7_iyMrRIdtzRXzJ0Vd8PeZByPIyuKwmRqjR5DXS1z_Y7TRaS0pdNozbPfe-rqqZT8d0jpH8D2BLWl6hBqMm3AXlRtXmvA7rAseDdgx3RoigKFpRcWR_CMZ9P3VPpC0nUXN6moUYl6ZYrkWSEJI-KLY3JXLqgjuomcqAzl-UqvNJNElBsdKi3HcN3vzaKBjWdd_BhmkUw3n-WeQD3NUnkKhAk0g7-kTsAY7bicO_i-6Milj2DNpd4ZNP_W0_zv4TnsayOvqykXUFerD3mJQVnxK2PNb2makmQ |
link.rule.ids | 230,309,786,891,25594,76906 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8JAEJ4QfOBNUaP4WhPTG9HShZZDY0ILQeUVAeVGdpeNj0Pb0DXGf-_s0ooXvU6byXaS2ZmvM_MNwFWNcV63OUOQg9iEYspe9TzqVRtUCBMDmdSzw_1Bozul97P6rADv-SyM4Qn9NOSI6FEC_V2Z-zpZ_8QKTW9les3fUBTfdiZ-aGXouKa5Ym6ssOW3R8NwGFhB4E_H1uDR19Uyx23aLURKG65m59Wp01NLT6Ukv0NKZxc2R6gtUntQkFEZSkG-ea0M2_2s4F2GLdOhKVIUZl6Y7sMznk3fU9ELiVZd3CSnRiXqlSmSxKkkjIgvjsldtqCO6CZyomKUJ0u90kwSkW10yLUcwGWnPQm6VTzr_Mcw8-l4_VnOIRSjOJJHQJhAM7gLanuM0abDuY3vi6ZcuAjWHNo4hsrfeir_PbyAUnfS7817d4OHE9jRBl9VVk6hqJYf8gwDtOLnxrLfa76VUQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Detecting+network+entities+that+pose+a+cybersecurity+risk+to+a+private+computer+network&rft.inventor=Li%2C+Zhijie&rft.inventor=Diao%2C+Lili&rft.inventor=Zhang%2C+ZhengBao&rft.date=2024-04-30&rft.externalDBID=B1&rft.externalDocID=US11973791B1 |