USD926811S1 - Display screen or portion thereof with a graphical user interface - Google Patents
Display screen or portion thereof with a graphical user interface Download PDFInfo
- Publication number
- USD926811S1 USD926811S1 US29/693,948 US201929693948F USD926811S US D926811 S1 USD926811 S1 US D926811S1 US 201929693948 F US201929693948 F US 201929693948F US D926811 S USD926811 S US D926811S
- Authority
- US
- United States
- Prior art keywords
- user interface
- display screen
- graphical user
- ornamental design
- graphical
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Description
The FIGURE is a front view of a display screen or portion thereof with a graphical user interface showing the claimed design.
The broken lines are included for the purpose of illustrating portions of the display screen or portion thereof with a graphical user interface that form no part of the claimed design.
Claims (1)
- The ornamental design for a display screen or portion thereof with a graphical user interface, as shown and described.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US29/693,948 USD926811S1 (en) | 2019-06-06 | 2019-06-06 | Display screen or portion thereof with a graphical user interface |
CA191606F CA191606S (en) | 2019-06-06 | 2019-12-04 | Display screen with a graphical user interface |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US29/693,948 USD926811S1 (en) | 2019-06-06 | 2019-06-06 | Display screen or portion thereof with a graphical user interface |
Publications (1)
Publication Number | Publication Date |
---|---|
USD926811S1 true USD926811S1 (en) | 2021-08-03 |
Family
ID=77040358
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US29/693,948 Active USD926811S1 (en) | 2019-06-06 | 2019-06-06 | Display screen or portion thereof with a graphical user interface |
Country Status (2)
Country | Link |
---|---|
US (1) | USD926811S1 (en) |
CA (1) | CA191606S (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USD947878S1 (en) * | 2019-04-05 | 2022-04-05 | Adp, Inc. | Display screen with graphical user interface |
Citations (308)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USD418495S (en) | 1997-11-05 | 2000-01-04 | The United States Of America As Represented By The Secretary Of The Army | Computer/generated image for a computer monitor |
US6381556B1 (en) | 1999-08-02 | 2002-04-30 | Ciena Corporation | Data analyzer system and method for manufacturing control environment |
US20020087882A1 (en) | 2000-03-16 | 2002-07-04 | Bruce Schneier | Mehtod and system for dynamic network intrusion monitoring detection and response |
US6530024B1 (en) | 1998-11-20 | 2003-03-04 | Centrax Corporation | Adaptive feedback security system and method |
US20040010697A1 (en) | 2002-03-13 | 2004-01-15 | Conor White | Biometric authentication system and method |
US20040193598A1 (en) | 2000-06-30 | 2004-09-30 | Masataka Kan | Method and system for display data in a database system |
US20040193912A1 (en) | 2003-03-31 | 2004-09-30 | Intel Corporation | Methods and systems for managing security policies |
US20050055330A1 (en) | 2001-05-15 | 2005-03-10 | Britton Colin P. | Surveillance, monitoring and real-time events platform |
US20050125694A1 (en) | 2003-12-05 | 2005-06-09 | Fakes Thomas F. | Security policy update supporting at least one security service provider |
US20050165631A1 (en) | 2004-01-28 | 2005-07-28 | Microsoft Corporation | Time management representations and automation for allocating time to projects and meetings within an online calendaring system |
US20050235206A1 (en) * | 2004-04-15 | 2005-10-20 | Udo Arend | User interface for a quick activity window |
US20060095967A1 (en) | 2004-10-29 | 2006-05-04 | David Durham | Platform-based identification of host software circumvention |
US20060123022A1 (en) | 2003-03-12 | 2006-06-08 | Intotality Pty Ltd, Australia | Automated application discovery and analysis system and method |
US7152240B1 (en) | 2000-07-25 | 2006-12-19 | Green Stuart D | Method for communication security and apparatus therefor |
US20070143827A1 (en) | 2005-12-21 | 2007-06-21 | Fiberlink | Methods and systems for intelligently controlling access to computing resources |
US20070180509A1 (en) | 2005-12-07 | 2007-08-02 | Swartz Alon R | Practical platform for high risk applications |
US20070199070A1 (en) | 2006-02-17 | 2007-08-23 | Hughes William A | Systems and methods for intelligent monitoring and response to network threats |
USD552121S1 (en) | 2006-07-20 | 2007-10-02 | Xerion Avionix, Llc | Computer-generated icon for a portion of an engine instrument display |
US20070245238A1 (en) | 2006-03-22 | 2007-10-18 | Fugitt Jesse A | Timeline visualizations linked with other visualizations of data in a thin client |
US7487544B2 (en) | 2001-07-30 | 2009-02-03 | The Trustees Of Columbia University In The City Of New York | System and methods for detection of new malicious executables |
US20090077666A1 (en) | 2007-03-12 | 2009-03-19 | University Of Southern California | Value-Adaptive Security Threat Modeling and Vulnerability Ranking |
US20090089701A1 (en) | 2007-09-27 | 2009-04-02 | Rockwell Automation Technologies, Inc. | Distance-wise presentation of industrial automation data as a function of relevance to user |
US20090178139A1 (en) | 2008-01-09 | 2009-07-09 | Global Dataguard, Inc. | Systems and Methods of Network Security and Threat Management |
US20090208910A1 (en) | 2008-02-19 | 2009-08-20 | Architecture Technology Corporation | Automated execution and evaluation of network-based training exercises |
US20090220929A1 (en) | 2006-03-17 | 2009-09-03 | Daniel Warren C | Pc-based simulator training system and methods |
US20090320137A1 (en) | 2008-06-18 | 2009-12-24 | Eads Na Defense Security And Systems Solutions Inc. | Systems and methods for a simulated network attack generator |
US20090328219A1 (en) | 2008-06-27 | 2009-12-31 | Juniper Networks, Inc. | Dynamic policy provisioning within network security devices |
US20100067390A1 (en) | 2008-05-21 | 2010-03-18 | Luis Filipe Pereira Valente | System and method for discovery of network entities |
US20100077078A1 (en) | 2007-06-22 | 2010-03-25 | Fortisphere, Inc. | Network traffic analysis using a dynamically updating ontological network description |
US20100156630A1 (en) | 2008-12-18 | 2010-06-24 | Robert Ainsbury | Contextual Risk Indicators in Connection with Threat Level Management |
US20100169948A1 (en) | 2008-12-31 | 2010-07-01 | Hytrust, Inc. | Intelligent security control system for virtualized ecosystems |
US20100205136A1 (en) | 2009-02-09 | 2010-08-12 | Southwest Research Institute | System and Method for Modeling and Predicting Security Threats |
US7818797B1 (en) | 2001-10-11 | 2010-10-19 | The Trustees Of Columbia University In The City Of New York | Methods for cost-sensitive modeling for intrusion detection and response |
US20110029450A1 (en) | 2009-07-31 | 2011-02-03 | Accenture Global Services Gmbh | Computer-implemented method, system, and computer program product for connecting contract management and claim management |
USD636779S1 (en) * | 2009-10-07 | 2011-04-26 | Dfs Services Llc | Graphical user interface for a spending analysis tool for a computer display |
US20110288692A1 (en) | 2010-05-20 | 2011-11-24 | Accenture Global Services Gmbh | Malicious attack detection and analysis |
US20110289308A1 (en) | 2010-05-18 | 2011-11-24 | Sobko Andrey V | Team security for portable information devices |
US20110320307A1 (en) | 2010-06-18 | 2011-12-29 | Google Inc. | Context-influenced application recommendations |
US20120072968A1 (en) | 2007-02-16 | 2012-03-22 | Wysopal Christopher J | Assessment and analysis of software security flaws in virtual machines |
US8146146B1 (en) | 2005-12-23 | 2012-03-27 | At&T Intellectual Property Ii, L.P. | Method and apparatus for integrated network security alert information retrieval |
US20120079596A1 (en) | 2010-08-26 | 2012-03-29 | Verisign, Inc. | Method and system for automatic detection and analysis of malware |
US20120079433A1 (en) | 2010-09-28 | 2012-03-29 | J-MEX, Inc. | Device and system and method for interacting with target in operation area |
US20120083706A1 (en) | 2009-02-26 | 2012-04-05 | Draeger Medical Systems, Inc. | Ecg data display method for rapid detection of myocardial ischemia |
US8191147B1 (en) | 2008-04-24 | 2012-05-29 | Symantec Corporation | Method for malware removal based on network signatures and file system artifacts |
US20120154169A1 (en) | 2010-12-15 | 2012-06-21 | Edo Vincent Hoekstra | Toilet management systems, methods, and techniques |
USD665412S1 (en) | 2011-03-09 | 2012-08-14 | Microsoft Corporation | Display screen with graphical user interface |
US8253747B2 (en) | 2004-04-16 | 2012-08-28 | Apple Inc. | User interface for controlling animation of an object |
US20120240233A1 (en) | 2011-03-17 | 2012-09-20 | Skunk Worx B.V. | Method and system for detecting malicious web content |
US8291500B1 (en) | 2012-03-29 | 2012-10-16 | Cyber Engineering Services, Inc. | Systems and methods for automated malware artifact retrieval and analysis |
US20130014264A1 (en) | 2005-01-27 | 2013-01-10 | Scott Cruickshanks Kennedy | Systems and Methods For Implementing and Scoring Computer Network Defense Exercises |
USD674404S1 (en) | 2011-10-26 | 2013-01-15 | Mcafee, Inc. | Computer having graphical user interface |
US20130031555A1 (en) | 2011-07-26 | 2013-01-31 | Salesforce.Com, Inc. | System, method and computer program product for conditionally executing related reports in parallel based on an estimated execution time |
US20130081141A1 (en) | 2010-05-25 | 2013-03-28 | Hewlett-Packard Development Company, L.P. | Security threat detection associated with security events and an actor category model |
USD681662S1 (en) | 2012-01-05 | 2013-05-07 | Flextronics Ap, Llc | Display panel with graphical user interface for analyzing and presenting supply, fabrication, and logistics data |
US20130117847A1 (en) | 2011-11-07 | 2013-05-09 | William G. Friedman | Streaming Method and System for Processing Network Metadata |
USD685391S1 (en) | 2011-06-27 | 2013-07-02 | Specialty Minerals (Michigan) Inc. | Graphical user interface for a display screen or a portion thereof for evaluating refractory data |
USD685813S1 (en) * | 2011-05-19 | 2013-07-09 | Nxn Tech, Llc | Display screen with a results graphical user interface |
US20130179938A1 (en) | 2012-01-09 | 2013-07-11 | International Business Machines Corporation | Security policy management using incident analysis |
US8490149B1 (en) | 2008-08-20 | 2013-07-16 | Juniper Networks, Inc. | Secure session handling in a device after a policy update |
US8539385B2 (en) | 2010-01-26 | 2013-09-17 | Apple Inc. | Device, method, and graphical user interface for precise positioning of objects |
US8549626B1 (en) | 2009-03-20 | 2013-10-01 | Symantec Corporation | Method and apparatus for securing a computer from malicious threats through generic remediation |
US20130275770A1 (en) | 2011-12-22 | 2013-10-17 | Michael Berger | Always-available embedded theft reaction subsystem |
US20130291087A1 (en) | 2012-04-30 | 2013-10-31 | Zscaler, Inc. | Systems and methods for integrating cloud services with information management systems |
US20140007264A1 (en) | 2011-12-22 | 2014-01-02 | Michael Berger | Always-available embedded theft reaction subsystem |
USD697080S1 (en) | 2010-02-26 | 2014-01-07 | Draeger Medical Systems, Inc. | Display screen with an icon |
US20140013455A1 (en) | 2011-12-22 | 2014-01-09 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140013454A1 (en) | 2011-12-22 | 2014-01-09 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140009289A1 (en) | 2011-12-22 | 2014-01-09 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140020123A1 (en) | 2011-12-22 | 2014-01-16 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140020122A1 (en) | 2011-12-22 | 2014-01-16 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140020121A1 (en) | 2011-12-22 | 2014-01-16 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140046709A1 (en) | 2012-08-08 | 2014-02-13 | Mark Clement Kwapiszeski | Methods and systems for evaluating technology assets |
US20140053273A1 (en) | 2012-08-18 | 2014-02-20 | Lume Systems, Inc. | System and method for limiting exploitable or potentially exploitable sub-components in software components |
US20140096181A1 (en) | 2012-09-28 | 2014-04-03 | Tripwire, Inc. | Event integration frameworks |
US20140156711A1 (en) | 2011-08-01 | 2014-06-05 | Dhiraj Sharan | Asset model import connector |
US20140172706A1 (en) | 2012-12-18 | 2014-06-19 | Michael Condry | Security broker |
US20140189870A1 (en) | 2011-09-08 | 2014-07-03 | Anurag Singla | Visual component and drill down mapping |
US20140195502A1 (en) | 2011-08-26 | 2014-07-10 | Wei Huang | Multidimension column-based partitioning and storage |
US20140201836A1 (en) | 2012-08-23 | 2014-07-17 | David B. Amsler | Automated Internet Threat Detection and Mitigation System and Associated Methods |
US20140208447A1 (en) | 2011-12-22 | 2014-07-24 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140223555A1 (en) | 2011-02-10 | 2014-08-07 | Telefonica, S.A. | Method and system for improving security threats detection in communication networks |
US20140240122A1 (en) | 2014-02-27 | 2014-08-28 | Fitbit, Inc. | Notifications on a User Device Based on Activity Detected By an Activity Monitoring Device |
US8832148B2 (en) | 2010-06-29 | 2014-09-09 | International Business Machines Corporation | Enterprise evidence repository |
US20140280075A1 (en) | 2011-08-26 | 2014-09-18 | Hewlett-Packard Development Company, L.P. | Multidimension clusters for data partitioning |
US20140297495A1 (en) | 2010-03-18 | 2014-10-02 | Pankaj B. Dalal | Multidimensional risk analysis |
USD716328S1 (en) * | 2012-07-20 | 2014-10-28 | Desire2Learn Incorporated | Display screen with graphical user interface |
US20140330816A1 (en) | 2011-11-18 | 2014-11-06 | Debabrata Dash | Query summary generation using row-column data storage |
USD717328S1 (en) | 2013-03-05 | 2014-11-11 | Xian Qian Lin | Display screen or portion thereof with graphical user interface |
US20150015504A1 (en) | 2013-07-12 | 2015-01-15 | Microsoft Corporation | Interactive digital displays |
US20150033340A1 (en) | 2013-07-23 | 2015-01-29 | Crypteia Networks S.A. | Systems and methods for self-tuning network intrusion detection and prevention |
US8947374B2 (en) | 2011-02-07 | 2015-02-03 | Healthfusion, Inc. | Electronic medical system touch phrase technology |
US20150040233A1 (en) | 2003-07-01 | 2015-02-05 | Securityprofiling, Llc | Sdk-equipped anti-vulnerability system, method, and computer program product |
US20150067844A1 (en) | 2002-10-21 | 2015-03-05 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
US20150106867A1 (en) | 2013-10-12 | 2015-04-16 | Fortinet, Inc. | Security information and event management |
US20150120373A1 (en) | 2013-10-25 | 2015-04-30 | Jabil Circuit, Inc. | Systems and methods for risk processing and visualization of supply chain management system data |
US20150128049A1 (en) | 2012-07-06 | 2015-05-07 | Robert S. Block | Advanced user interface |
US20150135262A1 (en) | 2012-05-03 | 2015-05-14 | Shine Security Ltd. | Detection and prevention for malicious threats |
US20150135316A1 (en) | 2013-11-13 | 2015-05-14 | NetCitadel Inc. | System and method of protecting client computers |
US20150142491A1 (en) | 2013-11-15 | 2015-05-21 | Cognito Limited | Management of field-based workers |
USD730925S1 (en) | 2013-02-07 | 2015-06-02 | Esco Technologies (Asia) Pte Ltd | Display screen or portion thereof with graphical user interface |
US20150163199A1 (en) | 2012-04-30 | 2015-06-11 | Zscaler, Inc. | Systems and methods for integrating cloud services with information management systems |
USD732555S1 (en) | 2012-07-19 | 2015-06-23 | D2L Corporation | Display screen with graphical user interface |
US9064210B1 (en) | 2012-03-31 | 2015-06-23 | Emc Corporation | Semantically-aware behavioral security analysis system for security information and event management |
US20150180891A1 (en) | 2013-12-19 | 2015-06-25 | Splunk Inc. | Using network locations obtained from multiple threat lists to evaluate network data or machine data |
US20150178835A1 (en) | 2013-12-20 | 2015-06-25 | David W. Quillian | Supply chain finance system |
US9069930B1 (en) | 2011-03-29 | 2015-06-30 | Emc Corporation | Security information and event management system employing security business objects and workflows |
US20150206245A1 (en) * | 2014-01-20 | 2015-07-23 | Fmr Llc | Dynamic Portfolio Simulator Tool Apparatuses, Methods and Systems |
US20150207813A1 (en) | 2012-02-01 | 2015-07-23 | Vorstack, Inc. | Techniques for sharing network security event information |
US20150215334A1 (en) | 2012-09-28 | 2015-07-30 | Level 3 Communications, Llc | Systems and methods for generating network threat intelligence |
US20150222667A1 (en) | 2013-12-02 | 2015-08-06 | Alex Nayshtut | Protection system including security rule evaluation |
USD736824S1 (en) | 2012-12-28 | 2015-08-18 | P&W Solutions Co., Ltd. | Display screen with graphical user interface |
US20150242619A1 (en) | 2014-02-24 | 2015-08-27 | Northcross Group | Security management system |
US20150242628A1 (en) | 2014-02-23 | 2015-08-27 | Cyphort Inc. | System and Method for Detection of Malicious Hypertext Transfer Protocol Chains |
US20150264011A1 (en) | 2014-03-17 | 2015-09-17 | Fortinet, Inc. | Security information and event management |
US20150281287A1 (en) | 2009-11-20 | 2015-10-01 | Alert Enterprise, Inc. | Policy/rule engine, multi-compliance framework and risk remediation |
US20150286636A1 (en) | 2013-03-15 | 2015-10-08 | Salim Elkhou | Document processing system and method |
US20150332398A1 (en) | 2012-09-04 | 2015-11-19 | Slav Brkic | Risk management system and method for monitoring and controlling of messages in a trading system |
US20150341212A1 (en) * | 2014-04-15 | 2015-11-26 | Splunk Inc. | Visualizations of statistics associated with captured network data |
US20150350161A1 (en) | 2013-07-31 | 2015-12-03 | International Business Machines Corporation | Network Traffic Analysis to Enhance Rule-Based Network Security |
US20150356701A1 (en) | 2014-06-06 | 2015-12-10 | Play-it Health, Inc. | Monitoring and adapting a patient's medical regimen and facilitating communication with a caregiver |
US20160019388A1 (en) | 2013-03-11 | 2016-01-21 | Hewlett-Packard Development Company, L.P. | Event correlation based on confidence factor |
USD748126S1 (en) | 2013-12-23 | 2016-01-26 | Skyhigh Networks, Inc. | Display screen with a graphical user interface for cloud usage analysis |
US20160034361A1 (en) | 2013-04-16 | 2016-02-04 | Hewlett-Packard Development Company, L.P. | Distributed event correlation system |
US20160044054A1 (en) | 2014-08-06 | 2016-02-11 | Norse Corporation | Network appliance for dynamic protection from risky network activities |
US20160048658A1 (en) | 2014-08-15 | 2016-02-18 | Federal Express Corporation | Research performance framework |
US9282114B1 (en) | 2011-06-30 | 2016-03-08 | Emc Corporation | Generation of alerts in an event management system based upon risk |
US20160094565A1 (en) | 2014-09-29 | 2016-03-31 | Juniper Networks, Inc. | Targeted attack discovery |
US20160092408A1 (en) | 2014-09-26 | 2016-03-31 | Oracle International Corporation | Semantic distance-based assignment of data elements to visualization edges |
USD753134S1 (en) | 2014-04-04 | 2016-04-05 | Adp, Llc | Display screen or portion thereof with graphical user interface |
US20160117466A1 (en) | 2014-10-27 | 2016-04-28 | Jay P. Singh | System and method for risk management |
US20160125535A1 (en) | 2014-10-31 | 2016-05-05 | Trading Technologies International Inc. | Location-aware risk mitigation systems and methods |
USD756371S1 (en) | 2013-12-02 | 2016-05-17 | Symantec Corporation | Display screen with graphical user interface |
USD757075S1 (en) | 2014-02-27 | 2016-05-24 | Robert Bosch Gmbh | Display screen with a graphical user interface |
US20160164907A1 (en) | 2014-12-03 | 2016-06-09 | Phantom Cyber Corporation | Security actions for computing assets based on enrichment information |
US20160164893A1 (en) | 2013-07-17 | 2016-06-09 | Hewlett-Packard Development Company, L.P. | Event management systems |
US9367535B2 (en) * | 2012-11-29 | 2016-06-14 | Business Objects Software, Ltd. | Dashboard formula execution |
US20160170594A1 (en) | 2014-03-26 | 2016-06-16 | Unanimous A. I., Inc. | Dynamic systems for optimization of real-time collaborative intelligence |
US9378361B1 (en) | 2012-12-31 | 2016-06-28 | Emc Corporation | Anomaly sensor framework for detecting advanced persistent threat attacks |
US20160191466A1 (en) | 2014-12-30 | 2016-06-30 | Fortinet, Inc. | Dynamically optimized security policy management |
US20160203883A1 (en) | 2015-01-14 | 2016-07-14 | David W. Richardson | Semi Submersible Nuclear Power Plant and Multi-Purpose Platform |
US20160203319A1 (en) | 2015-01-14 | 2016-07-14 | Leidos, Inc. | System and Method For Providing Technology-Driven End-to-End Managed Security Service Products Through a Security Marketplace |
US9398035B2 (en) | 2013-12-31 | 2016-07-19 | Cisco Technology, Inc. | Attack mitigation using learning machines |
US20160224619A1 (en) | 2015-01-30 | 2016-08-04 | Splunk Inc. | Text-based table manipulation of event data |
US20160232353A1 (en) | 2015-02-09 | 2016-08-11 | Qualcomm Incorporated | Determining Model Protection Level On-Device based on Malware Detection in Similar Devices |
US20160241581A1 (en) | 2014-04-03 | 2016-08-18 | Isight Partners, Inc. | System and Method of Cyber Threat Intensity Determination and Application to Cyber Threat Mitigation |
US20160246849A1 (en) | 2015-02-25 | 2016-08-25 | FactorChain Inc. | Service interface for event data store |
US20160246490A1 (en) | 2015-02-25 | 2016-08-25 | Bank Of America Corporation | Customizable Dashboard |
USD765672S1 (en) * | 2014-12-08 | 2016-09-06 | Kpmg Llp | Electronic device with portfolio risk view graphical user interface |
US20160259939A1 (en) | 2015-03-05 | 2016-09-08 | Minerva Labs Ltd. | Systems and methods for malware evasion management |
USD766302S1 (en) | 2015-08-11 | 2016-09-13 | Unified Office | Display screen with call center performance graphical user interface |
US20160286084A1 (en) | 2015-03-26 | 2016-09-29 | Konica Minolta, Inc. | Image processing apparatus, image processing system, method for giving temporary use permission to portable terminal apparatus, and recording medium |
US20160294800A1 (en) | 2015-04-03 | 2016-10-06 | Oracle International Corporation | Aggregated computing infrastructure analyzer |
USD769287S1 (en) | 2015-04-27 | 2016-10-18 | Vericle Corporation | Computer screen with practice health monitor and radar graphical user interface |
US20160306862A1 (en) | 2015-04-16 | 2016-10-20 | Nuix Pty Ltd | Systems and methods for data indexing with user-side scripting |
US9479357B1 (en) | 2010-03-05 | 2016-10-25 | Symantec Corporation | Detecting malware on mobile devices based on mobile behavior analysis |
US20160321664A1 (en) | 2015-04-28 | 2016-11-03 | Ronald R. Erickson | System and method for secure transactions using images |
USD771068S1 (en) | 2014-09-18 | 2016-11-08 | Cheetah Mobile Inc. | Display screen or portion thereof with graphical user interface |
US9516053B1 (en) | 2015-08-31 | 2016-12-06 | Splunk Inc. | Network security threat detection by user/user-entity behavioral analysis |
US20160357418A1 (en) | 2014-03-26 | 2016-12-08 | Unanimous A. I., Inc. | Methods for analyzing decisions made by real-time collective intelligence systems |
US20160366174A1 (en) | 2015-04-17 | 2016-12-15 | Soltra Solutions, Llc | Computerized system and method for securely distributing and exchanging cyber-threat information in a standardized format |
USD774540S1 (en) * | 2014-05-08 | 2016-12-20 | Express Scripts, Inc. | Display screen with a graphical user interface |
USD775180S1 (en) | 2012-07-12 | 2016-12-27 | Mx Technologies, Inc. | Display screen or portion thereof with a graphical user interface |
US20170006058A1 (en) | 2015-07-02 | 2017-01-05 | Reliaquest Holdings, Llc | Threat intelligence system and method |
US20170032279A1 (en) | 2015-07-31 | 2017-02-02 | Acuity Solutions Corporation | System and method for in-situ classifier retraining for malware identification and model heterogeneity |
US20170041036A1 (en) | 2015-08-05 | 2017-02-09 | International Business Machines Corporation | Automatic Self-Protection for a Portable Electronic Device |
US20170041337A1 (en) | 2011-01-26 | 2017-02-09 | Viaforensics, Llc | Systems, Methods, Apparatuses, And Computer Program Products For Forensic Monitoring |
US20170048267A1 (en) | 2014-12-13 | 2017-02-16 | Security Scorecard, Inc. | Calculating and benchmarking an entity's cybersecurity risk score |
US20170048264A1 (en) | 2015-08-01 | 2017-02-16 | Splunk Inc, | Creating Timeline Views of Information Technology Event Investigations |
USD780199S1 (en) | 2014-05-02 | 2017-02-28 | Enigami Systems, Inc. | Display screen or portion thereof with a graphical user interface |
US20170060537A1 (en) | 2015-08-31 | 2017-03-02 | Salesforce.Com, Inc. | Platform provider architecture creation utilizing platform architecture type unit definitions |
US20170061338A1 (en) | 2015-08-31 | 2017-03-02 | Salesforce.Com, Inc. | Quantitative metrics for assessing status of a platform architecture for cloud computing |
US20170060792A1 (en) | 2015-09-01 | 2017-03-02 | The Boeing Company | Platform Management System, Apparatus, and Method |
US20170061348A1 (en) | 2015-08-31 | 2017-03-02 | Salesforce.com. inc. | Platform architecture planning process utilizing platform architecture type unit definitions |
USD781326S1 (en) | 2015-04-15 | 2017-03-14 | Deere & Company | Status display screen with a graphical user interface |
US20170083682A1 (en) | 2014-05-15 | 2017-03-23 | The Johns Hopkins University | Method, system and computer-readable media for treatment plan risk analysis |
US20170093910A1 (en) | 2015-09-25 | 2017-03-30 | Acalvio Technologies, Inc. | Dynamic security mechanisms |
USD783046S1 (en) | 2015-11-24 | 2017-04-04 | Microsoft Corporation | Display screen with graphical user interface |
US20170118239A1 (en) | 2015-10-26 | 2017-04-27 | Microsoft Technology Licensing, Llc. | Detection of cyber threats against cloud-based applications |
US20170118245A1 (en) | 2015-10-27 | 2017-04-27 | Xypro Technology Corporation | Method and system for gathering and contextualizing multiple security events |
US9639697B2 (en) | 2012-02-29 | 2017-05-02 | Cisco Technology, Inc. | Method and apparatus for retroactively detecting malicious or otherwise undesirable software |
USD786273S1 (en) | 2015-06-16 | 2017-05-09 | Adp, Llc | Display screen with graphical user interface |
US20170140293A1 (en) | 2015-11-13 | 2017-05-18 | Accenture Global Solutions Limited | Analytics platform using telematics data |
US20170139894A1 (en) | 2010-09-20 | 2017-05-18 | Welch Global Consulting, Inc. | Method and system for dynamic data modeling for use in real-time computerized presentations |
USD788165S1 (en) | 2015-09-04 | 2017-05-30 | Chargepoint Technology Ltd. | Display screen with transitional icon |
US20170154382A1 (en) | 2015-11-30 | 2017-06-01 | Hartford Fire Insurance Company | Processing system for data elements received via source inputs |
US20170154026A1 (en) * | 2015-12-01 | 2017-06-01 | Business Objects Software Ltd. | Interaction relationship building and explorer for dashboard |
US20170171231A1 (en) | 2015-12-11 | 2017-06-15 | Brightpoint Security, Inc. | Computer Network Threat Assessment |
US20170177641A1 (en) | 2015-12-19 | 2017-06-22 | Viktor Charles Von Drakk | Method and device for correlating multiple tables in a database environment |
US20170192952A1 (en) | 2015-12-30 | 2017-07-06 | Sap Se | Systems and methods for tracking and modifying actions in an action history |
US20170206361A1 (en) | 2014-07-16 | 2017-07-20 | Beijing Zhigu Rui Tuo Tech Co., Ltd | Application recommendation method and application recommendation apparatus |
US20170214701A1 (en) | 2016-01-24 | 2017-07-27 | Syed Kamran Hasan | Computer security based on artificial intelligence |
WO2017127850A1 (en) | 2016-01-24 | 2017-07-27 | Hasan Syed Kamran | Computer security based on artificial intelligence |
US20170244736A1 (en) | 2014-10-30 | 2017-08-24 | Ironscales Ltd. | Method and system for mitigating malicious messages attacks |
US20170249461A1 (en) | 2016-02-26 | 2017-08-31 | Cylance Inc. | Retention and accessibility of data characterizing events on an endpoint computer |
US20170251013A1 (en) | 2016-02-26 | 2017-08-31 | Oracle International Corporation | Techniques for discovering and managing security of applications |
US20170251002A1 (en) | 2016-02-29 | 2017-08-31 | Palo Alto Networks, Inc. | Malware analysis platform for threat intelligence made actionable |
US20170264588A1 (en) | 2016-03-08 | 2017-09-14 | Tanium Inc. | System and Method for Performing Event Inquiries in a Network |
US20170263092A1 (en) | 2016-03-10 | 2017-09-14 | Pinpoint, Inc. | Systems and methods for threat monitoring |
US20170279835A1 (en) | 2016-03-28 | 2017-09-28 | Cisco Technology, Inc. | Adaptive capture of packet traces based on user feedback learning |
US20170301024A1 (en) | 2009-03-20 | 2017-10-19 | Pankaj B. Dalal | Multidimensional risk analysis |
USD800736S1 (en) | 2015-06-16 | 2017-10-24 | Adp Llc | Display screen with animated graphical user interface |
USD802001S1 (en) | 2016-07-08 | 2017-11-07 | Ge Aviation Systems Llc | Portion of a display panel with a graphical user interface component for flight operations management |
US9813449B1 (en) | 2012-08-10 | 2017-11-07 | Lookwise S.L. | Systems and methods for providing a security information and event management system in a distributed architecture |
US20170322959A1 (en) | 2016-05-09 | 2017-11-09 | FactorChain Inc. | Searchable investigation history for event data store |
US20170331816A1 (en) | 2016-05-12 | 2017-11-16 | Bank Of America Corporation | Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques |
US20170331817A1 (en) | 2016-05-12 | 2017-11-16 | Bank Of America Corporation | Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques |
US20170346824A1 (en) | 2016-05-31 | 2017-11-30 | Tracker Networks Inc. | Methods and systems for mobile device risk management |
USD804498S1 (en) * | 2016-04-19 | 2017-12-05 | Minebea Co., Ltd. | Display screen with graphical user interface |
US20170359366A1 (en) | 2016-06-10 | 2017-12-14 | General Electric Company | Threat detection and localization for monitoring nodes of an industrial asset control system |
US20170366582A1 (en) | 2016-06-21 | 2017-12-21 | International Business Machines Corporation | Incident Response Plan based on Indicators of Compromise |
US9852599B1 (en) | 2015-08-17 | 2017-12-26 | Alarm.Com Incorporated | Safety monitoring platform |
US20180007060A1 (en) | 2016-06-30 | 2018-01-04 | Amazon Technologies, Inc. | Multi-Factor Authentication to Access Services |
US20180027006A1 (en) | 2015-02-24 | 2018-01-25 | Cloudlock, Inc. | System and method for securing an enterprise computing environment |
USD808988S1 (en) | 2016-12-20 | 2018-01-30 | Abbott Laboratories | Display screen with graphical user interface |
US20180032914A1 (en) | 2016-07-26 | 2018-02-01 | Gamalon, Inc. | Machine learning data analysis system and method |
US20180033279A1 (en) | 2016-07-27 | 2018-02-01 | Accenture Global Solutions Limited | Providing predictive alerts for workplace safety |
USD809530S1 (en) | 2016-12-20 | 2018-02-06 | Smartorg, Inc. | Display screen or portion thereof with an animated graphical user interface |
US20180041537A1 (en) | 2016-08-02 | 2018-02-08 | Sophos Limited | Identifying and remediating phishing security weaknesses |
USD811425S1 (en) | 2016-07-29 | 2018-02-27 | Neurotrack Technologies, Inc. | Display screen or portion thereof with graphical user interface |
US20180060253A1 (en) | 2016-05-20 | 2018-03-01 | Faraday&Future Inc. | Pairing of input device and display in vehicle infotainment systems |
US20180063186A1 (en) | 2014-09-05 | 2018-03-01 | International Business Machines Corporation | System for tracking data security threats and method for same |
US20180069885A1 (en) | 2016-09-06 | 2018-03-08 | Accenture Global Solutions Limited | Graph database analysis for network anomaly detection systems |
US20180077188A1 (en) | 2016-09-12 | 2018-03-15 | Qualcomm Incorporated | Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs |
US20180077195A1 (en) | 2016-09-12 | 2018-03-15 | Qualcomm Incorporated | Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs |
USD813884S1 (en) | 2016-06-01 | 2018-03-27 | Innovation 360 Group AB | Display screen with graphical user interface |
US20180091559A1 (en) | 2016-09-26 | 2018-03-29 | Splunk Inc. | Managing the collection of forensic data from endpoint devices |
US20180115578A1 (en) | 2016-10-26 | 2018-04-26 | Elastic Beam, Inc. | Methods and systems for deep learning based api traffic security |
US20180124096A1 (en) | 2016-10-31 | 2018-05-03 | Armis Security Ltd. | Detection of vulnerable devices in wireless networks |
US20180121982A1 (en) | 2015-04-02 | 2018-05-03 | Zhejiang Geely Holding Group Co., Ltd | Safe online transaction method, online transaction platform, and service fee platform |
US20180129978A1 (en) | 2016-11-09 | 2018-05-10 | Gamalon, Inc. | Machine learning data analysis system and method |
US20180137277A1 (en) | 2016-11-15 | 2018-05-17 | General Electric Company | Dynamic normalization of monitoring node data for threat detection in industrial asset control system |
USD818487S1 (en) | 2015-04-28 | 2018-05-22 | Includehealth, Inc. | Display screen with a graphical user interface |
US20180144110A1 (en) | 2016-11-22 | 2018-05-24 | International Business Machines Corporation | Multi-input user interaction and behavioral based authentication system for context aware applications |
US20180159877A1 (en) | 2016-12-07 | 2018-06-07 | General Electric Company | Multi-mode boundary selection for threat detection in industrial asset control system |
US20180157831A1 (en) | 2016-12-06 | 2018-06-07 | General Electric Company | Automated attack localization and detection |
US20180189697A1 (en) | 2016-12-30 | 2018-07-05 | Lookingglass Cyber Solutions, Inc. | Methods and apparatus for processing threat metrics to determine a risk of loss due to the compromise of an organization asset |
US20180191758A1 (en) | 2017-01-03 | 2018-07-05 | General Electric Company | Cluster-based decision boundaries for threat detection in industrial asset control system |
USD822705S1 (en) | 2017-04-20 | 2018-07-10 | Palantir Technologies, Inc. | Display screen or portion thereof with graphical user interface |
US20180211549A1 (en) | 2015-07-21 | 2018-07-26 | Moshe Cohen | Method and system for autonomous dynamic air traffic management |
US20180219911A1 (en) | 2017-01-31 | 2018-08-02 | Hewlett Packard Enterprise Development Lp | Responding to alerts |
US20180219875A1 (en) | 2017-01-31 | 2018-08-02 | Hewlett Packard Enterprise Development Lp | Grouping alerts into bundles of alerts |
US20180219891A1 (en) | 2017-02-02 | 2018-08-02 | Aetna Inc. | Individualized cybersecurity risk detection using multiple attributes |
US20180219876A1 (en) | 2017-01-31 | 2018-08-02 | Hewlett Packard Enterprise Development Lp | Determining contextual information for alerts |
US20180232528A1 (en) | 2017-02-13 | 2018-08-16 | Protegrity Corporation | Sensitive Data Classification |
US20180248863A1 (en) | 2017-02-24 | 2018-08-30 | Fmr Llc | Systems and methods for user authentication using pattern-based risk assessment and adjustment |
US20180248904A1 (en) | 2017-02-24 | 2018-08-30 | LogRhythm Inc. | Analytics for processing information system data |
US20180253676A1 (en) | 2017-03-01 | 2018-09-06 | Accenture Global Solutions Limited | Automatic analysis of a technical capability |
US20180260572A1 (en) | 2017-03-08 | 2018-09-13 | Wipro Limited | Method and device for software risk management within information technology (it) infrastructure |
US20180268506A1 (en) | 2017-03-15 | 2018-09-20 | Exari Group, Inc. | Machine evaluation of contract terms |
US20180275845A1 (en) | 2017-03-23 | 2018-09-27 | International Business Machines Corporation | Dashboard Creation With Popular Patterns and Suggestions Using Analytics |
US20180288078A1 (en) | 2017-04-03 | 2018-10-04 | Juniper Networks, Inc. | Tracking and mitigation of an infected host device |
USD831697S1 (en) | 2016-10-31 | 2018-10-23 | Agile Transformation, Inc. | Display screen or portion thereof with icon |
US20180309752A1 (en) | 2017-04-20 | 2018-10-25 | Adp, Llc | Enhanced security authentication system |
US20180308026A1 (en) | 2017-04-21 | 2018-10-25 | Accenture Global Solutions Limited | Identifying risk patterns in a multi-level network structure |
US20180316701A1 (en) | 2017-04-26 | 2018-11-01 | General Electric Company | Threat detection for a fleet of industrial assets |
US20180324207A1 (en) | 2017-05-05 | 2018-11-08 | Servicenow, Inc. | Network security threat intelligence sharing |
US20180337941A1 (en) | 2017-05-18 | 2018-11-22 | Qadium, Inc. | Correlation-driven threat assessment and remediation |
US20180337891A1 (en) | 2015-05-27 | 2018-11-22 | Ping Identity Corporation | Methods and systems for api proxy based adaptive security |
USD834606S1 (en) | 2015-08-25 | 2018-11-27 | Branch Banking And Trust Company | Display screen or portions thereof with graphical user interface |
US20180348979A1 (en) | 2017-06-02 | 2018-12-06 | Oracle International Corporation | Inter-application sharing |
US20180357422A1 (en) | 2016-02-25 | 2018-12-13 | Sas Institute Inc. | Simulated attack generator for testing a cybersecurity system |
US20180359272A1 (en) | 2017-06-12 | 2018-12-13 | ARIM Technologies Pte Ltd. | Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management |
US20180367561A1 (en) | 2017-06-14 | 2018-12-20 | International Business Machines Corporation | Threat disposition analysis and modeling using supervised machine learning |
US20190007447A1 (en) | 2017-06-29 | 2019-01-03 | Webroot Inc. | Peer Device Protection |
US20190021004A1 (en) | 2017-07-13 | 2019-01-17 | Sophos Limited | Threat index based wlan security and quality of service |
US20190020667A1 (en) | 2017-07-14 | 2019-01-17 | Guavus, Inc. | Non-rule based security risk detection |
US20190019432A1 (en) | 2017-07-12 | 2019-01-17 | Electronics And Telecommunications Research Institute | Apparatus and method for cyber-crisis response training based on augmented reality |
US20190028498A1 (en) | 2017-07-24 | 2019-01-24 | Sap Se | Threat Modeling Tool Using Machine Learning |
US20190037081A1 (en) | 2017-07-25 | 2019-01-31 | Vail Systems, Inc. | Adaptive, multi-modal fraud detection system |
US20190052665A1 (en) | 2016-02-10 | 2019-02-14 | Cortex Insight Limited | Security system |
US20190068620A1 (en) | 2017-08-30 | 2019-02-28 | International Business Machines Corporation | Detecting malware attacks using extracted behavioral features |
US20190068616A1 (en) | 2017-08-25 | 2019-02-28 | Ecrime Management Strategies, Inc., d/b/a PhishLabs | Security system for detection and mitigation of malicious communications |
US10242187B1 (en) | 2016-09-14 | 2019-03-26 | Symantec Corporation | Systems and methods for providing integrated security management |
US20190095618A1 (en) | 2016-10-24 | 2019-03-28 | Certis Cisco Security Pte Ltd | Quantitative unified analytic neural networks |
US20190104140A1 (en) | 2017-09-29 | 2019-04-04 | AO Kaspersky Lab | System and method of cloud detection, investigation and elimination of targeted attacks |
USD845344S1 (en) | 2018-01-30 | 2019-04-09 | Citrix Systems, Inc. | Display screen or portion thereof with icon group |
US10257227B1 (en) | 2014-08-14 | 2019-04-09 | Amazon Technologies, Inc. | Computer security threat correlation |
US20190121977A1 (en) | 2017-10-19 | 2019-04-25 | AO Kaspersky Lab | System and method of detecting a malicious file |
US20190124104A1 (en) | 2017-01-30 | 2019-04-25 | Splunk Inc. | Graph-Based Network Anomaly Detection Across Time and Entities |
US20190132351A1 (en) | 2015-07-30 | 2019-05-02 | IOR Analytics, LLC. | Method and apparatus for data security analysis of data flows |
US10284587B1 (en) | 2016-09-14 | 2019-05-07 | Symantec Corporation | Systems and methods for responding to electronic security incidents |
US20190158525A1 (en) | 2016-02-29 | 2019-05-23 | Palo Alto Networks, Inc. | Automatically grouping malware based on artifacts |
US20190163914A1 (en) | 2017-11-30 | 2019-05-30 | Bank Of America Corporation | System for information security threat assessment and event triggering |
US20190188389A1 (en) | 2017-12-14 | 2019-06-20 | Forescout Technologies, Inc. | Contextual risk monitoring |
US20190199739A1 (en) | 2017-12-22 | 2019-06-27 | Cisco Technology, Inc. | Leveraging endpoint and network environment inferences for malware traffic classification |
US20190199744A1 (en) | 2017-12-22 | 2019-06-27 | Kpmg Llp | System and method for identifying cybersecurity threats |
US20190207966A1 (en) | 2017-12-28 | 2019-07-04 | Fireeye, Inc. | Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data Store |
US20190207967A1 (en) | 2017-12-28 | 2019-07-04 | Fireeye, Inc. | Platform and method for retroactive reclassification employing a cybersecurity-based global data store |
US20190207953A1 (en) | 2017-12-29 | 2019-07-04 | Square, Inc. | Logical Validation of Devices Against Fraud and Tampering |
US20190205511A1 (en) | 2017-05-17 | 2019-07-04 | Forescout Technologies, Inc. | Account monitoring |
US20190222596A1 (en) | 2018-01-18 | 2019-07-18 | General Electric Company | Reliable cyber-threat detection in rapidly changing environments |
USD854561S1 (en) | 2017-03-17 | 2019-07-23 | Health Management Systems, Inc. | Display screen with animated graphical user interface |
US20190230099A1 (en) | 2018-01-19 | 2019-07-25 | General Electric Company | Learning method and system for separating independent and dependent attacks |
US20190230098A1 (en) | 2018-01-22 | 2019-07-25 | T-Mobile Usa, Inc. | Indicator of compromise calculation system |
US20190254634A1 (en) | 2017-12-27 | 2019-08-22 | Canon Medical Systems Corporation | Analysis apparatus |
USD857749S1 (en) | 2017-12-01 | 2019-08-27 | Agco Corporation | Display screen or portion thereof with graphical user interface |
US20190266297A1 (en) | 2018-02-26 | 2019-08-29 | Noblis, Inc. | Multi-layer cyber-physical systems simulation platform |
USD859441S1 (en) | 2017-11-09 | 2019-09-10 | Veriphy Analytics, Inc. | Display screen with graphical user interface |
USD866576S1 (en) * | 2017-06-02 | 2019-11-12 | Sap Se | Display screen or portion thereof with graphical user interface |
US20200037919A1 (en) | 2018-08-06 | 2020-02-06 | Siemens Healthcare Gmbh | Protocol parameter selection method, apparatus and magnetic resonance imaging system |
US20200110803A1 (en) | 2018-10-08 | 2020-04-09 | Tableau Software, Inc. | Determining Levels of Detail for Data Visualizations Using Natural Language Constructs |
USD882583S1 (en) | 2016-07-12 | 2020-04-28 | Google Llc | Display screen with graphical user interface |
USD889490S1 (en) | 2017-08-29 | 2020-07-07 | 3M Innovative Properties Company | Display screen with graphical user interface |
US20200243178A1 (en) * | 2018-04-10 | 2020-07-30 | Mobile Innovations Llc | Advanced health monitoring system and method |
US10775988B2 (en) * | 2016-01-22 | 2020-09-15 | Johnson Controls Technology Company | Building energy management system with ad hoc dashboard |
US10791148B2 (en) * | 2013-04-29 | 2020-09-29 | Moogsoft Inc. | System in communication with a managed infrastructure |
USD905733S1 (en) * | 2018-04-25 | 2020-12-22 | Adp, Llc | Display screen with an animated graphical user interface |
USD905704S1 (en) | 2019-03-25 | 2020-12-22 | Magnifi Llc | Display screen or portion thereof with a graphical user interface |
-
2019
- 2019-06-06 US US29/693,948 patent/USD926811S1/en active Active
- 2019-12-04 CA CA191606F patent/CA191606S/en active Active
Patent Citations (316)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USD418495S (en) | 1997-11-05 | 2000-01-04 | The United States Of America As Represented By The Secretary Of The Army | Computer/generated image for a computer monitor |
US6530024B1 (en) | 1998-11-20 | 2003-03-04 | Centrax Corporation | Adaptive feedback security system and method |
US6381556B1 (en) | 1999-08-02 | 2002-04-30 | Ciena Corporation | Data analyzer system and method for manufacturing control environment |
US20020087882A1 (en) | 2000-03-16 | 2002-07-04 | Bruce Schneier | Mehtod and system for dynamic network intrusion monitoring detection and response |
US20040193598A1 (en) | 2000-06-30 | 2004-09-30 | Masataka Kan | Method and system for display data in a database system |
US7152240B1 (en) | 2000-07-25 | 2006-12-19 | Green Stuart D | Method for communication security and apparatus therefor |
US20050055330A1 (en) | 2001-05-15 | 2005-03-10 | Britton Colin P. | Surveillance, monitoring and real-time events platform |
US7487544B2 (en) | 2001-07-30 | 2009-02-03 | The Trustees Of Columbia University In The City Of New York | System and methods for detection of new malicious executables |
US7818797B1 (en) | 2001-10-11 | 2010-10-19 | The Trustees Of Columbia University In The City Of New York | Methods for cost-sensitive modeling for intrusion detection and response |
US20040010697A1 (en) | 2002-03-13 | 2004-01-15 | Conor White | Biometric authentication system and method |
US20150067844A1 (en) | 2002-10-21 | 2015-03-05 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
US20060123022A1 (en) | 2003-03-12 | 2006-06-08 | Intotality Pty Ltd, Australia | Automated application discovery and analysis system and method |
US20040193912A1 (en) | 2003-03-31 | 2004-09-30 | Intel Corporation | Methods and systems for managing security policies |
US20150040233A1 (en) | 2003-07-01 | 2015-02-05 | Securityprofiling, Llc | Sdk-equipped anti-vulnerability system, method, and computer program product |
US20050125694A1 (en) | 2003-12-05 | 2005-06-09 | Fakes Thomas F. | Security policy update supporting at least one security service provider |
US20050165631A1 (en) | 2004-01-28 | 2005-07-28 | Microsoft Corporation | Time management representations and automation for allocating time to projects and meetings within an online calendaring system |
US20050235206A1 (en) * | 2004-04-15 | 2005-10-20 | Udo Arend | User interface for a quick activity window |
US8253747B2 (en) | 2004-04-16 | 2012-08-28 | Apple Inc. | User interface for controlling animation of an object |
US20060095967A1 (en) | 2004-10-29 | 2006-05-04 | David Durham | Platform-based identification of host software circumvention |
US20130014264A1 (en) | 2005-01-27 | 2013-01-10 | Scott Cruickshanks Kennedy | Systems and Methods For Implementing and Scoring Computer Network Defense Exercises |
US20070180509A1 (en) | 2005-12-07 | 2007-08-02 | Swartz Alon R | Practical platform for high risk applications |
US20070143827A1 (en) | 2005-12-21 | 2007-06-21 | Fiberlink | Methods and systems for intelligently controlling access to computing resources |
US8146146B1 (en) | 2005-12-23 | 2012-03-27 | At&T Intellectual Property Ii, L.P. | Method and apparatus for integrated network security alert information retrieval |
US20070199070A1 (en) | 2006-02-17 | 2007-08-23 | Hughes William A | Systems and methods for intelligent monitoring and response to network threats |
US20090220929A1 (en) | 2006-03-17 | 2009-09-03 | Daniel Warren C | Pc-based simulator training system and methods |
US20070245238A1 (en) | 2006-03-22 | 2007-10-18 | Fugitt Jesse A | Timeline visualizations linked with other visualizations of data in a thin client |
USD552121S1 (en) | 2006-07-20 | 2007-10-02 | Xerion Avionix, Llc | Computer-generated icon for a portion of an engine instrument display |
US20120072968A1 (en) | 2007-02-16 | 2012-03-22 | Wysopal Christopher J | Assessment and analysis of software security flaws in virtual machines |
US20090077666A1 (en) | 2007-03-12 | 2009-03-19 | University Of Southern California | Value-Adaptive Security Threat Modeling and Vulnerability Ranking |
US20100077078A1 (en) | 2007-06-22 | 2010-03-25 | Fortisphere, Inc. | Network traffic analysis using a dynamically updating ontological network description |
US20090089701A1 (en) | 2007-09-27 | 2009-04-02 | Rockwell Automation Technologies, Inc. | Distance-wise presentation of industrial automation data as a function of relevance to user |
US20090178139A1 (en) | 2008-01-09 | 2009-07-09 | Global Dataguard, Inc. | Systems and Methods of Network Security and Threat Management |
US20090208910A1 (en) | 2008-02-19 | 2009-08-20 | Architecture Technology Corporation | Automated execution and evaluation of network-based training exercises |
US8191147B1 (en) | 2008-04-24 | 2012-05-29 | Symantec Corporation | Method for malware removal based on network signatures and file system artifacts |
US20100067390A1 (en) | 2008-05-21 | 2010-03-18 | Luis Filipe Pereira Valente | System and method for discovery of network entities |
US20090320137A1 (en) | 2008-06-18 | 2009-12-24 | Eads Na Defense Security And Systems Solutions Inc. | Systems and methods for a simulated network attack generator |
US20090328219A1 (en) | 2008-06-27 | 2009-12-31 | Juniper Networks, Inc. | Dynamic policy provisioning within network security devices |
US8490149B1 (en) | 2008-08-20 | 2013-07-16 | Juniper Networks, Inc. | Secure session handling in a device after a policy update |
US20100156630A1 (en) | 2008-12-18 | 2010-06-24 | Robert Ainsbury | Contextual Risk Indicators in Connection with Threat Level Management |
US20100169948A1 (en) | 2008-12-31 | 2010-07-01 | Hytrust, Inc. | Intelligent security control system for virtualized ecosystems |
US20100205136A1 (en) | 2009-02-09 | 2010-08-12 | Southwest Research Institute | System and Method for Modeling and Predicting Security Threats |
US20120083706A1 (en) | 2009-02-26 | 2012-04-05 | Draeger Medical Systems, Inc. | Ecg data display method for rapid detection of myocardial ischemia |
US8549626B1 (en) | 2009-03-20 | 2013-10-01 | Symantec Corporation | Method and apparatus for securing a computer from malicious threats through generic remediation |
US20170301024A1 (en) | 2009-03-20 | 2017-10-19 | Pankaj B. Dalal | Multidimensional risk analysis |
US20110029450A1 (en) | 2009-07-31 | 2011-02-03 | Accenture Global Services Gmbh | Computer-implemented method, system, and computer program product for connecting contract management and claim management |
USD636779S1 (en) * | 2009-10-07 | 2011-04-26 | Dfs Services Llc | Graphical user interface for a spending analysis tool for a computer display |
USD691159S1 (en) * | 2009-10-07 | 2013-10-08 | Discover Financial Services | Computer display with a graphical user interface for a spending analysis tool |
US20150281287A1 (en) | 2009-11-20 | 2015-10-01 | Alert Enterprise, Inc. | Policy/rule engine, multi-compliance framework and risk remediation |
US8539385B2 (en) | 2010-01-26 | 2013-09-17 | Apple Inc. | Device, method, and graphical user interface for precise positioning of objects |
USD697080S1 (en) | 2010-02-26 | 2014-01-07 | Draeger Medical Systems, Inc. | Display screen with an icon |
US9479357B1 (en) | 2010-03-05 | 2016-10-25 | Symantec Corporation | Detecting malware on mobile devices based on mobile behavior analysis |
US20140297495A1 (en) | 2010-03-18 | 2014-10-02 | Pankaj B. Dalal | Multidimensional risk analysis |
US20110289308A1 (en) | 2010-05-18 | 2011-11-24 | Sobko Andrey V | Team security for portable information devices |
US20110288692A1 (en) | 2010-05-20 | 2011-11-24 | Accenture Global Services Gmbh | Malicious attack detection and analysis |
US20130081141A1 (en) | 2010-05-25 | 2013-03-28 | Hewlett-Packard Development Company, L.P. | Security threat detection associated with security events and an actor category model |
US20110320307A1 (en) | 2010-06-18 | 2011-12-29 | Google Inc. | Context-influenced application recommendations |
US8832148B2 (en) | 2010-06-29 | 2014-09-09 | International Business Machines Corporation | Enterprise evidence repository |
US20120079596A1 (en) | 2010-08-26 | 2012-03-29 | Verisign, Inc. | Method and system for automatic detection and analysis of malware |
US20170139894A1 (en) | 2010-09-20 | 2017-05-18 | Welch Global Consulting, Inc. | Method and system for dynamic data modeling for use in real-time computerized presentations |
US20120079433A1 (en) | 2010-09-28 | 2012-03-29 | J-MEX, Inc. | Device and system and method for interacting with target in operation area |
US20120154169A1 (en) | 2010-12-15 | 2012-06-21 | Edo Vincent Hoekstra | Toilet management systems, methods, and techniques |
US20170041337A1 (en) | 2011-01-26 | 2017-02-09 | Viaforensics, Llc | Systems, Methods, Apparatuses, And Computer Program Products For Forensic Monitoring |
US8947374B2 (en) | 2011-02-07 | 2015-02-03 | Healthfusion, Inc. | Electronic medical system touch phrase technology |
US20140223555A1 (en) | 2011-02-10 | 2014-08-07 | Telefonica, S.A. | Method and system for improving security threats detection in communication networks |
USD665412S1 (en) | 2011-03-09 | 2012-08-14 | Microsoft Corporation | Display screen with graphical user interface |
US20120240233A1 (en) | 2011-03-17 | 2012-09-20 | Skunk Worx B.V. | Method and system for detecting malicious web content |
US9069930B1 (en) | 2011-03-29 | 2015-06-30 | Emc Corporation | Security information and event management system employing security business objects and workflows |
USD685813S1 (en) * | 2011-05-19 | 2013-07-09 | Nxn Tech, Llc | Display screen with a results graphical user interface |
USD685391S1 (en) | 2011-06-27 | 2013-07-02 | Specialty Minerals (Michigan) Inc. | Graphical user interface for a display screen or a portion thereof for evaluating refractory data |
US9282114B1 (en) | 2011-06-30 | 2016-03-08 | Emc Corporation | Generation of alerts in an event management system based upon risk |
US20130031555A1 (en) | 2011-07-26 | 2013-01-31 | Salesforce.Com, Inc. | System, method and computer program product for conditionally executing related reports in parallel based on an estimated execution time |
US20140156711A1 (en) | 2011-08-01 | 2014-06-05 | Dhiraj Sharan | Asset model import connector |
US20140280075A1 (en) | 2011-08-26 | 2014-09-18 | Hewlett-Packard Development Company, L.P. | Multidimension clusters for data partitioning |
US20140195502A1 (en) | 2011-08-26 | 2014-07-10 | Wei Huang | Multidimension column-based partitioning and storage |
US20140189870A1 (en) | 2011-09-08 | 2014-07-03 | Anurag Singla | Visual component and drill down mapping |
USD674404S1 (en) | 2011-10-26 | 2013-01-15 | Mcafee, Inc. | Computer having graphical user interface |
US20130117847A1 (en) | 2011-11-07 | 2013-05-09 | William G. Friedman | Streaming Method and System for Processing Network Metadata |
US20140330816A1 (en) | 2011-11-18 | 2014-11-06 | Debabrata Dash | Query summary generation using row-column data storage |
US20140009289A1 (en) | 2011-12-22 | 2014-01-09 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140020122A1 (en) | 2011-12-22 | 2014-01-16 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140208447A1 (en) | 2011-12-22 | 2014-07-24 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140013454A1 (en) | 2011-12-22 | 2014-01-09 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140020121A1 (en) | 2011-12-22 | 2014-01-16 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140013455A1 (en) | 2011-12-22 | 2014-01-09 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140020123A1 (en) | 2011-12-22 | 2014-01-16 | Michael Berger | Always-available embedded theft reaction subsystem |
US20140007264A1 (en) | 2011-12-22 | 2014-01-02 | Michael Berger | Always-available embedded theft reaction subsystem |
US20130275770A1 (en) | 2011-12-22 | 2013-10-17 | Michael Berger | Always-available embedded theft reaction subsystem |
USD681662S1 (en) | 2012-01-05 | 2013-05-07 | Flextronics Ap, Llc | Display panel with graphical user interface for analyzing and presenting supply, fabrication, and logistics data |
US20130179938A1 (en) | 2012-01-09 | 2013-07-11 | International Business Machines Corporation | Security policy management using incident analysis |
US20150207813A1 (en) | 2012-02-01 | 2015-07-23 | Vorstack, Inc. | Techniques for sharing network security event information |
US9639697B2 (en) | 2012-02-29 | 2017-05-02 | Cisco Technology, Inc. | Method and apparatus for retroactively detecting malicious or otherwise undesirable software |
US20130263266A1 (en) | 2012-03-29 | 2013-10-03 | Cyber Engineering Services, Inc. | Systems and methods for automated malware artifact retrieval and analysis |
US8850585B2 (en) | 2012-03-29 | 2014-09-30 | Cyber Engineering Services, Inc. | Systems and methods for automated malware artifact retrieval and analysis |
US8291500B1 (en) | 2012-03-29 | 2012-10-16 | Cyber Engineering Services, Inc. | Systems and methods for automated malware artifact retrieval and analysis |
US9064210B1 (en) | 2012-03-31 | 2015-06-23 | Emc Corporation | Semantically-aware behavioral security analysis system for security information and event management |
US20130291087A1 (en) | 2012-04-30 | 2013-10-31 | Zscaler, Inc. | Systems and methods for integrating cloud services with information management systems |
US20150163199A1 (en) | 2012-04-30 | 2015-06-11 | Zscaler, Inc. | Systems and methods for integrating cloud services with information management systems |
US20150135262A1 (en) | 2012-05-03 | 2015-05-14 | Shine Security Ltd. | Detection and prevention for malicious threats |
US20150128049A1 (en) | 2012-07-06 | 2015-05-07 | Robert S. Block | Advanced user interface |
USD775180S1 (en) | 2012-07-12 | 2016-12-27 | Mx Technologies, Inc. | Display screen or portion thereof with a graphical user interface |
USD732555S1 (en) | 2012-07-19 | 2015-06-23 | D2L Corporation | Display screen with graphical user interface |
USD716328S1 (en) * | 2012-07-20 | 2014-10-28 | Desire2Learn Incorporated | Display screen with graphical user interface |
US20140046709A1 (en) | 2012-08-08 | 2014-02-13 | Mark Clement Kwapiszeski | Methods and systems for evaluating technology assets |
US9813449B1 (en) | 2012-08-10 | 2017-11-07 | Lookwise S.L. | Systems and methods for providing a security information and event management system in a distributed architecture |
US20140053273A1 (en) | 2012-08-18 | 2014-02-20 | Lume Systems, Inc. | System and method for limiting exploitable or potentially exploitable sub-components in software components |
US20140201836A1 (en) | 2012-08-23 | 2014-07-17 | David B. Amsler | Automated Internet Threat Detection and Mitigation System and Associated Methods |
US20150332398A1 (en) | 2012-09-04 | 2015-11-19 | Slav Brkic | Risk management system and method for monitoring and controlling of messages in a trading system |
US20140096181A1 (en) | 2012-09-28 | 2014-04-03 | Tripwire, Inc. | Event integration frameworks |
US20150215334A1 (en) | 2012-09-28 | 2015-07-30 | Level 3 Communications, Llc | Systems and methods for generating network threat intelligence |
US9367535B2 (en) * | 2012-11-29 | 2016-06-14 | Business Objects Software, Ltd. | Dashboard formula execution |
US20140172706A1 (en) | 2012-12-18 | 2014-06-19 | Michael Condry | Security broker |
USD736824S1 (en) | 2012-12-28 | 2015-08-18 | P&W Solutions Co., Ltd. | Display screen with graphical user interface |
US9378361B1 (en) | 2012-12-31 | 2016-06-28 | Emc Corporation | Anomaly sensor framework for detecting advanced persistent threat attacks |
USD730925S1 (en) | 2013-02-07 | 2015-06-02 | Esco Technologies (Asia) Pte Ltd | Display screen or portion thereof with graphical user interface |
USD717328S1 (en) | 2013-03-05 | 2014-11-11 | Xian Qian Lin | Display screen or portion thereof with graphical user interface |
US20160019388A1 (en) | 2013-03-11 | 2016-01-21 | Hewlett-Packard Development Company, L.P. | Event correlation based on confidence factor |
US20150286636A1 (en) | 2013-03-15 | 2015-10-08 | Salim Elkhou | Document processing system and method |
US20160034361A1 (en) | 2013-04-16 | 2016-02-04 | Hewlett-Packard Development Company, L.P. | Distributed event correlation system |
US10791148B2 (en) * | 2013-04-29 | 2020-09-29 | Moogsoft Inc. | System in communication with a managed infrastructure |
US20150015504A1 (en) | 2013-07-12 | 2015-01-15 | Microsoft Corporation | Interactive digital displays |
US20160164893A1 (en) | 2013-07-17 | 2016-06-09 | Hewlett-Packard Development Company, L.P. | Event management systems |
US20150033340A1 (en) | 2013-07-23 | 2015-01-29 | Crypteia Networks S.A. | Systems and methods for self-tuning network intrusion detection and prevention |
US20150350161A1 (en) | 2013-07-31 | 2015-12-03 | International Business Machines Corporation | Network Traffic Analysis to Enhance Rule-Based Network Security |
US20150106867A1 (en) | 2013-10-12 | 2015-04-16 | Fortinet, Inc. | Security information and event management |
US20150120373A1 (en) | 2013-10-25 | 2015-04-30 | Jabil Circuit, Inc. | Systems and methods for risk processing and visualization of supply chain management system data |
US20150135316A1 (en) | 2013-11-13 | 2015-05-14 | NetCitadel Inc. | System and method of protecting client computers |
US20150142491A1 (en) | 2013-11-15 | 2015-05-21 | Cognito Limited | Management of field-based workers |
US20150222667A1 (en) | 2013-12-02 | 2015-08-06 | Alex Nayshtut | Protection system including security rule evaluation |
USD756371S1 (en) | 2013-12-02 | 2016-05-17 | Symantec Corporation | Display screen with graphical user interface |
US20150180891A1 (en) | 2013-12-19 | 2015-06-25 | Splunk Inc. | Using network locations obtained from multiple threat lists to evaluate network data or machine data |
US20150178835A1 (en) | 2013-12-20 | 2015-06-25 | David W. Quillian | Supply chain finance system |
USD748126S1 (en) | 2013-12-23 | 2016-01-26 | Skyhigh Networks, Inc. | Display screen with a graphical user interface for cloud usage analysis |
US9398035B2 (en) | 2013-12-31 | 2016-07-19 | Cisco Technology, Inc. | Attack mitigation using learning machines |
US20150206245A1 (en) * | 2014-01-20 | 2015-07-23 | Fmr Llc | Dynamic Portfolio Simulator Tool Apparatuses, Methods and Systems |
US20150242628A1 (en) | 2014-02-23 | 2015-08-27 | Cyphort Inc. | System and Method for Detection of Malicious Hypertext Transfer Protocol Chains |
US20150242619A1 (en) | 2014-02-24 | 2015-08-27 | Northcross Group | Security management system |
USD757075S1 (en) | 2014-02-27 | 2016-05-24 | Robert Bosch Gmbh | Display screen with a graphical user interface |
US20140240122A1 (en) | 2014-02-27 | 2014-08-28 | Fitbit, Inc. | Notifications on a User Device Based on Activity Detected By an Activity Monitoring Device |
US20150264011A1 (en) | 2014-03-17 | 2015-09-17 | Fortinet, Inc. | Security information and event management |
US20160170594A1 (en) | 2014-03-26 | 2016-06-16 | Unanimous A. I., Inc. | Dynamic systems for optimization of real-time collaborative intelligence |
US20160357418A1 (en) | 2014-03-26 | 2016-12-08 | Unanimous A. I., Inc. | Methods for analyzing decisions made by real-time collective intelligence systems |
US20160241581A1 (en) | 2014-04-03 | 2016-08-18 | Isight Partners, Inc. | System and Method of Cyber Threat Intensity Determination and Application to Cyber Threat Mitigation |
USD753134S1 (en) | 2014-04-04 | 2016-04-05 | Adp, Llc | Display screen or portion thereof with graphical user interface |
US20150341212A1 (en) * | 2014-04-15 | 2015-11-26 | Splunk Inc. | Visualizations of statistics associated with captured network data |
USD780199S1 (en) | 2014-05-02 | 2017-02-28 | Enigami Systems, Inc. | Display screen or portion thereof with a graphical user interface |
USD774540S1 (en) * | 2014-05-08 | 2016-12-20 | Express Scripts, Inc. | Display screen with a graphical user interface |
US20170083682A1 (en) | 2014-05-15 | 2017-03-23 | The Johns Hopkins University | Method, system and computer-readable media for treatment plan risk analysis |
US20150356701A1 (en) | 2014-06-06 | 2015-12-10 | Play-it Health, Inc. | Monitoring and adapting a patient's medical regimen and facilitating communication with a caregiver |
US20170206361A1 (en) | 2014-07-16 | 2017-07-20 | Beijing Zhigu Rui Tuo Tech Co., Ltd | Application recommendation method and application recommendation apparatus |
US20160044054A1 (en) | 2014-08-06 | 2016-02-11 | Norse Corporation | Network appliance for dynamic protection from risky network activities |
US10257227B1 (en) | 2014-08-14 | 2019-04-09 | Amazon Technologies, Inc. | Computer security threat correlation |
US20160048658A1 (en) | 2014-08-15 | 2016-02-18 | Federal Express Corporation | Research performance framework |
US20180063186A1 (en) | 2014-09-05 | 2018-03-01 | International Business Machines Corporation | System for tracking data security threats and method for same |
USD771068S1 (en) | 2014-09-18 | 2016-11-08 | Cheetah Mobile Inc. | Display screen or portion thereof with graphical user interface |
US20160092408A1 (en) | 2014-09-26 | 2016-03-31 | Oracle International Corporation | Semantic distance-based assignment of data elements to visualization edges |
US20160094565A1 (en) | 2014-09-29 | 2016-03-31 | Juniper Networks, Inc. | Targeted attack discovery |
US20160117466A1 (en) | 2014-10-27 | 2016-04-28 | Jay P. Singh | System and method for risk management |
US20170244736A1 (en) | 2014-10-30 | 2017-08-24 | Ironscales Ltd. | Method and system for mitigating malicious messages attacks |
US20160125535A1 (en) | 2014-10-31 | 2016-05-05 | Trading Technologies International Inc. | Location-aware risk mitigation systems and methods |
US20160164907A1 (en) | 2014-12-03 | 2016-06-09 | Phantom Cyber Corporation | Security actions for computing assets based on enrichment information |
USD765672S1 (en) * | 2014-12-08 | 2016-09-06 | Kpmg Llp | Electronic device with portfolio risk view graphical user interface |
US20170048267A1 (en) | 2014-12-13 | 2017-02-16 | Security Scorecard, Inc. | Calculating and benchmarking an entity's cybersecurity risk score |
US20160191466A1 (en) | 2014-12-30 | 2016-06-30 | Fortinet, Inc. | Dynamically optimized security policy management |
US20160203883A1 (en) | 2015-01-14 | 2016-07-14 | David W. Richardson | Semi Submersible Nuclear Power Plant and Multi-Purpose Platform |
US20160203319A1 (en) | 2015-01-14 | 2016-07-14 | Leidos, Inc. | System and Method For Providing Technology-Driven End-to-End Managed Security Service Products Through a Security Marketplace |
US20160224619A1 (en) | 2015-01-30 | 2016-08-04 | Splunk Inc. | Text-based table manipulation of event data |
US20160232353A1 (en) | 2015-02-09 | 2016-08-11 | Qualcomm Incorporated | Determining Model Protection Level On-Device based on Malware Detection in Similar Devices |
US20180027006A1 (en) | 2015-02-24 | 2018-01-25 | Cloudlock, Inc. | System and method for securing an enterprise computing environment |
US20160246849A1 (en) | 2015-02-25 | 2016-08-25 | FactorChain Inc. | Service interface for event data store |
US20160246490A1 (en) | 2015-02-25 | 2016-08-25 | Bank Of America Corporation | Customizable Dashboard |
US20160259939A1 (en) | 2015-03-05 | 2016-09-08 | Minerva Labs Ltd. | Systems and methods for malware evasion management |
US20160286084A1 (en) | 2015-03-26 | 2016-09-29 | Konica Minolta, Inc. | Image processing apparatus, image processing system, method for giving temporary use permission to portable terminal apparatus, and recording medium |
US20180121982A1 (en) | 2015-04-02 | 2018-05-03 | Zhejiang Geely Holding Group Co., Ltd | Safe online transaction method, online transaction platform, and service fee platform |
US20160294800A1 (en) | 2015-04-03 | 2016-10-06 | Oracle International Corporation | Aggregated computing infrastructure analyzer |
USD781326S1 (en) | 2015-04-15 | 2017-03-14 | Deere & Company | Status display screen with a graphical user interface |
US20160306862A1 (en) | 2015-04-16 | 2016-10-20 | Nuix Pty Ltd | Systems and methods for data indexing with user-side scripting |
US20160366174A1 (en) | 2015-04-17 | 2016-12-15 | Soltra Solutions, Llc | Computerized system and method for securely distributing and exchanging cyber-threat information in a standardized format |
USD769287S1 (en) | 2015-04-27 | 2016-10-18 | Vericle Corporation | Computer screen with practice health monitor and radar graphical user interface |
USD818487S1 (en) | 2015-04-28 | 2018-05-22 | Includehealth, Inc. | Display screen with a graphical user interface |
US20160321664A1 (en) | 2015-04-28 | 2016-11-03 | Ronald R. Erickson | System and method for secure transactions using images |
US20180337891A1 (en) | 2015-05-27 | 2018-11-22 | Ping Identity Corporation | Methods and systems for api proxy based adaptive security |
USD800736S1 (en) | 2015-06-16 | 2017-10-24 | Adp Llc | Display screen with animated graphical user interface |
USD786273S1 (en) | 2015-06-16 | 2017-05-09 | Adp, Llc | Display screen with graphical user interface |
US20170006058A1 (en) | 2015-07-02 | 2017-01-05 | Reliaquest Holdings, Llc | Threat intelligence system and method |
US20180211549A1 (en) | 2015-07-21 | 2018-07-26 | Moshe Cohen | Method and system for autonomous dynamic air traffic management |
US20190132351A1 (en) | 2015-07-30 | 2019-05-02 | IOR Analytics, LLC. | Method and apparatus for data security analysis of data flows |
US20170032279A1 (en) | 2015-07-31 | 2017-02-02 | Acuity Solutions Corporation | System and method for in-situ classifier retraining for malware identification and model heterogeneity |
US20170048264A1 (en) | 2015-08-01 | 2017-02-16 | Splunk Inc, | Creating Timeline Views of Information Technology Event Investigations |
US20170041036A1 (en) | 2015-08-05 | 2017-02-09 | International Business Machines Corporation | Automatic Self-Protection for a Portable Electronic Device |
USD766302S1 (en) | 2015-08-11 | 2016-09-13 | Unified Office | Display screen with call center performance graphical user interface |
US9852599B1 (en) | 2015-08-17 | 2017-12-26 | Alarm.Com Incorporated | Safety monitoring platform |
USD834606S1 (en) | 2015-08-25 | 2018-11-27 | Branch Banking And Trust Company | Display screen or portions thereof with graphical user interface |
US20170060537A1 (en) | 2015-08-31 | 2017-03-02 | Salesforce.Com, Inc. | Platform provider architecture creation utilizing platform architecture type unit definitions |
US20170061338A1 (en) | 2015-08-31 | 2017-03-02 | Salesforce.Com, Inc. | Quantitative metrics for assessing status of a platform architecture for cloud computing |
US9516053B1 (en) | 2015-08-31 | 2016-12-06 | Splunk Inc. | Network security threat detection by user/user-entity behavioral analysis |
US20170061348A1 (en) | 2015-08-31 | 2017-03-02 | Salesforce.com. inc. | Platform architecture planning process utilizing platform architecture type unit definitions |
US20170060792A1 (en) | 2015-09-01 | 2017-03-02 | The Boeing Company | Platform Management System, Apparatus, and Method |
USD788165S1 (en) | 2015-09-04 | 2017-05-30 | Chargepoint Technology Ltd. | Display screen with transitional icon |
US20170093910A1 (en) | 2015-09-25 | 2017-03-30 | Acalvio Technologies, Inc. | Dynamic security mechanisms |
US20170118239A1 (en) | 2015-10-26 | 2017-04-27 | Microsoft Technology Licensing, Llc. | Detection of cyber threats against cloud-based applications |
US20170118245A1 (en) | 2015-10-27 | 2017-04-27 | Xypro Technology Corporation | Method and system for gathering and contextualizing multiple security events |
US20170140293A1 (en) | 2015-11-13 | 2017-05-18 | Accenture Global Solutions Limited | Analytics platform using telematics data |
USD783046S1 (en) | 2015-11-24 | 2017-04-04 | Microsoft Corporation | Display screen with graphical user interface |
US20170154382A1 (en) | 2015-11-30 | 2017-06-01 | Hartford Fire Insurance Company | Processing system for data elements received via source inputs |
US20170154026A1 (en) * | 2015-12-01 | 2017-06-01 | Business Objects Software Ltd. | Interaction relationship building and explorer for dashboard |
US20170171231A1 (en) | 2015-12-11 | 2017-06-15 | Brightpoint Security, Inc. | Computer Network Threat Assessment |
US20170177641A1 (en) | 2015-12-19 | 2017-06-22 | Viktor Charles Von Drakk | Method and device for correlating multiple tables in a database environment |
US20170192952A1 (en) | 2015-12-30 | 2017-07-06 | Sap Se | Systems and methods for tracking and modifying actions in an action history |
US10775988B2 (en) * | 2016-01-22 | 2020-09-15 | Johnson Controls Technology Company | Building energy management system with ad hoc dashboard |
US20170214701A1 (en) | 2016-01-24 | 2017-07-27 | Syed Kamran Hasan | Computer security based on artificial intelligence |
WO2017127850A1 (en) | 2016-01-24 | 2017-07-27 | Hasan Syed Kamran | Computer security based on artificial intelligence |
US20190052665A1 (en) | 2016-02-10 | 2019-02-14 | Cortex Insight Limited | Security system |
US20180357422A1 (en) | 2016-02-25 | 2018-12-13 | Sas Institute Inc. | Simulated attack generator for testing a cybersecurity system |
US20170249461A1 (en) | 2016-02-26 | 2017-08-31 | Cylance Inc. | Retention and accessibility of data characterizing events on an endpoint computer |
US20170251013A1 (en) | 2016-02-26 | 2017-08-31 | Oracle International Corporation | Techniques for discovering and managing security of applications |
US20170251002A1 (en) | 2016-02-29 | 2017-08-31 | Palo Alto Networks, Inc. | Malware analysis platform for threat intelligence made actionable |
US20190158525A1 (en) | 2016-02-29 | 2019-05-23 | Palo Alto Networks, Inc. | Automatically grouping malware based on artifacts |
US20170264589A1 (en) | 2016-03-08 | 2017-09-14 | Tanium Inc. | System and Method for Performing Event Inquiries in a Network |
US20170264588A1 (en) | 2016-03-08 | 2017-09-14 | Tanium Inc. | System and Method for Performing Event Inquiries in a Network |
US20170263092A1 (en) | 2016-03-10 | 2017-09-14 | Pinpoint, Inc. | Systems and methods for threat monitoring |
US20170279835A1 (en) | 2016-03-28 | 2017-09-28 | Cisco Technology, Inc. | Adaptive capture of packet traces based on user feedback learning |
USD804498S1 (en) * | 2016-04-19 | 2017-12-05 | Minebea Co., Ltd. | Display screen with graphical user interface |
US20170322959A1 (en) | 2016-05-09 | 2017-11-09 | FactorChain Inc. | Searchable investigation history for event data store |
US20170331816A1 (en) | 2016-05-12 | 2017-11-16 | Bank Of America Corporation | Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques |
US20170331817A1 (en) | 2016-05-12 | 2017-11-16 | Bank Of America Corporation | Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques |
US20180060253A1 (en) | 2016-05-20 | 2018-03-01 | Faraday&Future Inc. | Pairing of input device and display in vehicle infotainment systems |
US20170346824A1 (en) | 2016-05-31 | 2017-11-30 | Tracker Networks Inc. | Methods and systems for mobile device risk management |
USD813884S1 (en) | 2016-06-01 | 2018-03-27 | Innovation 360 Group AB | Display screen with graphical user interface |
US20170359366A1 (en) | 2016-06-10 | 2017-12-14 | General Electric Company | Threat detection and localization for monitoring nodes of an industrial asset control system |
US20170366582A1 (en) | 2016-06-21 | 2017-12-21 | International Business Machines Corporation | Incident Response Plan based on Indicators of Compromise |
US20180007060A1 (en) | 2016-06-30 | 2018-01-04 | Amazon Technologies, Inc. | Multi-Factor Authentication to Access Services |
USD840427S1 (en) | 2016-07-08 | 2019-02-12 | Ge Aviation Systems Llc | Portion of a display panel with a graphical user interface component for flight operations management |
USD802001S1 (en) | 2016-07-08 | 2017-11-07 | Ge Aviation Systems Llc | Portion of a display panel with a graphical user interface component for flight operations management |
USD882583S1 (en) | 2016-07-12 | 2020-04-28 | Google Llc | Display screen with graphical user interface |
US20180032914A1 (en) | 2016-07-26 | 2018-02-01 | Gamalon, Inc. | Machine learning data analysis system and method |
US20180033279A1 (en) | 2016-07-27 | 2018-02-01 | Accenture Global Solutions Limited | Providing predictive alerts for workplace safety |
USD811425S1 (en) | 2016-07-29 | 2018-02-27 | Neurotrack Technologies, Inc. | Display screen or portion thereof with graphical user interface |
US20180041537A1 (en) | 2016-08-02 | 2018-02-08 | Sophos Limited | Identifying and remediating phishing security weaknesses |
US20180069885A1 (en) | 2016-09-06 | 2018-03-08 | Accenture Global Solutions Limited | Graph database analysis for network anomaly detection systems |
US20180077195A1 (en) | 2016-09-12 | 2018-03-15 | Qualcomm Incorporated | Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs |
US20180077188A1 (en) | 2016-09-12 | 2018-03-15 | Qualcomm Incorporated | Methods And Systems For On-Device Real-Time Adaptive Security Based On External Threat Intelligence Inputs |
US10284587B1 (en) | 2016-09-14 | 2019-05-07 | Symantec Corporation | Systems and methods for responding to electronic security incidents |
US10242187B1 (en) | 2016-09-14 | 2019-03-26 | Symantec Corporation | Systems and methods for providing integrated security management |
US20180091559A1 (en) | 2016-09-26 | 2018-03-29 | Splunk Inc. | Managing the collection of forensic data from endpoint devices |
US20190095618A1 (en) | 2016-10-24 | 2019-03-28 | Certis Cisco Security Pte Ltd | Quantitative unified analytic neural networks |
US20180115578A1 (en) | 2016-10-26 | 2018-04-26 | Elastic Beam, Inc. | Methods and systems for deep learning based api traffic security |
US20180115523A1 (en) | 2016-10-26 | 2018-04-26 | Elastic Beam, Inc. | Methods and systems for api deception environment and api traffic control and security |
USD831697S1 (en) | 2016-10-31 | 2018-10-23 | Agile Transformation, Inc. | Display screen or portion thereof with icon |
US20180124096A1 (en) | 2016-10-31 | 2018-05-03 | Armis Security Ltd. | Detection of vulnerable devices in wireless networks |
US20180129978A1 (en) | 2016-11-09 | 2018-05-10 | Gamalon, Inc. | Machine learning data analysis system and method |
US20180137277A1 (en) | 2016-11-15 | 2018-05-17 | General Electric Company | Dynamic normalization of monitoring node data for threat detection in industrial asset control system |
US20180144110A1 (en) | 2016-11-22 | 2018-05-24 | International Business Machines Corporation | Multi-input user interaction and behavioral based authentication system for context aware applications |
US20180157831A1 (en) | 2016-12-06 | 2018-06-07 | General Electric Company | Automated attack localization and detection |
US20180159877A1 (en) | 2016-12-07 | 2018-06-07 | General Electric Company | Multi-mode boundary selection for threat detection in industrial asset control system |
USD808988S1 (en) | 2016-12-20 | 2018-01-30 | Abbott Laboratories | Display screen with graphical user interface |
USD809530S1 (en) | 2016-12-20 | 2018-02-06 | Smartorg, Inc. | Display screen or portion thereof with an animated graphical user interface |
US20180189697A1 (en) | 2016-12-30 | 2018-07-05 | Lookingglass Cyber Solutions, Inc. | Methods and apparatus for processing threat metrics to determine a risk of loss due to the compromise of an organization asset |
US20180191758A1 (en) | 2017-01-03 | 2018-07-05 | General Electric Company | Cluster-based decision boundaries for threat detection in industrial asset control system |
US20190124104A1 (en) | 2017-01-30 | 2019-04-25 | Splunk Inc. | Graph-Based Network Anomaly Detection Across Time and Entities |
US20180219876A1 (en) | 2017-01-31 | 2018-08-02 | Hewlett Packard Enterprise Development Lp | Determining contextual information for alerts |
US20180219875A1 (en) | 2017-01-31 | 2018-08-02 | Hewlett Packard Enterprise Development Lp | Grouping alerts into bundles of alerts |
US20180219911A1 (en) | 2017-01-31 | 2018-08-02 | Hewlett Packard Enterprise Development Lp | Responding to alerts |
US20180219891A1 (en) | 2017-02-02 | 2018-08-02 | Aetna Inc. | Individualized cybersecurity risk detection using multiple attributes |
US20180232528A1 (en) | 2017-02-13 | 2018-08-16 | Protegrity Corporation | Sensitive Data Classification |
US20180248904A1 (en) | 2017-02-24 | 2018-08-30 | LogRhythm Inc. | Analytics for processing information system data |
US20180248863A1 (en) | 2017-02-24 | 2018-08-30 | Fmr Llc | Systems and methods for user authentication using pattern-based risk assessment and adjustment |
US20180253676A1 (en) | 2017-03-01 | 2018-09-06 | Accenture Global Solutions Limited | Automatic analysis of a technical capability |
US20180260572A1 (en) | 2017-03-08 | 2018-09-13 | Wipro Limited | Method and device for software risk management within information technology (it) infrastructure |
US20180268506A1 (en) | 2017-03-15 | 2018-09-20 | Exari Group, Inc. | Machine evaluation of contract terms |
USD854561S1 (en) | 2017-03-17 | 2019-07-23 | Health Management Systems, Inc. | Display screen with animated graphical user interface |
US20180275845A1 (en) | 2017-03-23 | 2018-09-27 | International Business Machines Corporation | Dashboard Creation With Popular Patterns and Suggestions Using Analytics |
US20180288078A1 (en) | 2017-04-03 | 2018-10-04 | Juniper Networks, Inc. | Tracking and mitigation of an infected host device |
US20180309752A1 (en) | 2017-04-20 | 2018-10-25 | Adp, Llc | Enhanced security authentication system |
USD822705S1 (en) | 2017-04-20 | 2018-07-10 | Palantir Technologies, Inc. | Display screen or portion thereof with graphical user interface |
USD894944S1 (en) | 2017-04-20 | 2020-09-01 | Palantir Technologies, Inc. | Display screen or portion thereof with transitional graphical user interface |
USD863338S1 (en) | 2017-04-20 | 2019-10-15 | Palantir Technologies Inc. | Display screen or portion thereof with transitional graphical user interface |
US20180308026A1 (en) | 2017-04-21 | 2018-10-25 | Accenture Global Solutions Limited | Identifying risk patterns in a multi-level network structure |
US20180316701A1 (en) | 2017-04-26 | 2018-11-01 | General Electric Company | Threat detection for a fleet of industrial assets |
US20180324207A1 (en) | 2017-05-05 | 2018-11-08 | Servicenow, Inc. | Network security threat intelligence sharing |
US20190205511A1 (en) | 2017-05-17 | 2019-07-04 | Forescout Technologies, Inc. | Account monitoring |
US20180337941A1 (en) | 2017-05-18 | 2018-11-22 | Qadium, Inc. | Correlation-driven threat assessment and remediation |
USD866576S1 (en) * | 2017-06-02 | 2019-11-12 | Sap Se | Display screen or portion thereof with graphical user interface |
US20180348979A1 (en) | 2017-06-02 | 2018-12-06 | Oracle International Corporation | Inter-application sharing |
US20180359272A1 (en) | 2017-06-12 | 2018-12-13 | ARIM Technologies Pte Ltd. | Next-generation enhanced comprehensive cybersecurity platform with endpoint protection and centralized management |
US20180367561A1 (en) | 2017-06-14 | 2018-12-20 | International Business Machines Corporation | Threat disposition analysis and modeling using supervised machine learning |
US20190007447A1 (en) | 2017-06-29 | 2019-01-03 | Webroot Inc. | Peer Device Protection |
US20190019432A1 (en) | 2017-07-12 | 2019-01-17 | Electronics And Telecommunications Research Institute | Apparatus and method for cyber-crisis response training based on augmented reality |
US20190021004A1 (en) | 2017-07-13 | 2019-01-17 | Sophos Limited | Threat index based wlan security and quality of service |
US20190020667A1 (en) | 2017-07-14 | 2019-01-17 | Guavus, Inc. | Non-rule based security risk detection |
US20190028498A1 (en) | 2017-07-24 | 2019-01-24 | Sap Se | Threat Modeling Tool Using Machine Learning |
US20190037081A1 (en) | 2017-07-25 | 2019-01-31 | Vail Systems, Inc. | Adaptive, multi-modal fraud detection system |
US20190068616A1 (en) | 2017-08-25 | 2019-02-28 | Ecrime Management Strategies, Inc., d/b/a PhishLabs | Security system for detection and mitigation of malicious communications |
USD889490S1 (en) | 2017-08-29 | 2020-07-07 | 3M Innovative Properties Company | Display screen with graphical user interface |
US20190068620A1 (en) | 2017-08-30 | 2019-02-28 | International Business Machines Corporation | Detecting malware attacks using extracted behavioral features |
US20190104140A1 (en) | 2017-09-29 | 2019-04-04 | AO Kaspersky Lab | System and method of cloud detection, investigation and elimination of targeted attacks |
US20190121977A1 (en) | 2017-10-19 | 2019-04-25 | AO Kaspersky Lab | System and method of detecting a malicious file |
USD859441S1 (en) | 2017-11-09 | 2019-09-10 | Veriphy Analytics, Inc. | Display screen with graphical user interface |
US20190163914A1 (en) | 2017-11-30 | 2019-05-30 | Bank Of America Corporation | System for information security threat assessment and event triggering |
USD857749S1 (en) | 2017-12-01 | 2019-08-27 | Agco Corporation | Display screen or portion thereof with graphical user interface |
US20190188389A1 (en) | 2017-12-14 | 2019-06-20 | Forescout Technologies, Inc. | Contextual risk monitoring |
US20190199744A1 (en) | 2017-12-22 | 2019-06-27 | Kpmg Llp | System and method for identifying cybersecurity threats |
US20190199739A1 (en) | 2017-12-22 | 2019-06-27 | Cisco Technology, Inc. | Leveraging endpoint and network environment inferences for malware traffic classification |
US20190254634A1 (en) | 2017-12-27 | 2019-08-22 | Canon Medical Systems Corporation | Analysis apparatus |
US20190207966A1 (en) | 2017-12-28 | 2019-07-04 | Fireeye, Inc. | Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data Store |
US20190207967A1 (en) | 2017-12-28 | 2019-07-04 | Fireeye, Inc. | Platform and method for retroactive reclassification employing a cybersecurity-based global data store |
US20190207953A1 (en) | 2017-12-29 | 2019-07-04 | Square, Inc. | Logical Validation of Devices Against Fraud and Tampering |
US20190222596A1 (en) | 2018-01-18 | 2019-07-18 | General Electric Company | Reliable cyber-threat detection in rapidly changing environments |
US20190230099A1 (en) | 2018-01-19 | 2019-07-25 | General Electric Company | Learning method and system for separating independent and dependent attacks |
US20190230098A1 (en) | 2018-01-22 | 2019-07-25 | T-Mobile Usa, Inc. | Indicator of compromise calculation system |
USD845344S1 (en) | 2018-01-30 | 2019-04-09 | Citrix Systems, Inc. | Display screen or portion thereof with icon group |
US20190266297A1 (en) | 2018-02-26 | 2019-08-29 | Noblis, Inc. | Multi-layer cyber-physical systems simulation platform |
US20200243178A1 (en) * | 2018-04-10 | 2020-07-30 | Mobile Innovations Llc | Advanced health monitoring system and method |
USD905733S1 (en) * | 2018-04-25 | 2020-12-22 | Adp, Llc | Display screen with an animated graphical user interface |
US20200037919A1 (en) | 2018-08-06 | 2020-02-06 | Siemens Healthcare Gmbh | Protocol parameter selection method, apparatus and magnetic resonance imaging system |
US20200110803A1 (en) | 2018-10-08 | 2020-04-09 | Tableau Software, Inc. | Determining Levels of Detail for Data Visualizations Using Natural Language Constructs |
USD905704S1 (en) | 2019-03-25 | 2020-12-22 | Magnifi Llc | Display screen or portion thereof with a graphical user interface |
Non-Patent Citations (58)
Title |
---|
"Radar Charts in Tableau—part 1", Aug. 5, 2013, The Information Lab, Alteryx Global Partner of the Year 2019, posted at theinformationlab.co.uk, [site visited Dec. 22, 2020]. https://www.theinformationlab.co.uk/2013/08/05/radar-charts-in-tableau (Year: 2013), 2 pages. |
Detken, Kai-Oliver et al., "SIEM Approach for a Higher Level of IT Security in Enterprise Networks", The 8th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, Technology and Applications, Sep. 24-26, 2015, Warsaw, Poland, 6 pages. |
Final Office Action issued in counterpart U.S. Appl. No. 16/432,488 dated Jan. 24, 2020. |
Final Office Action issued in counterpart U.S. Appl. No. 16/432,626 dated Nov. 26, 2019. |
Final Office Action issued in counterpart U.S. Appl. No. 16/432,671 dated Dec. 11, 2019. |
Final Office Action issued in counterpart U.S. Appl. No. 16/432,689 dated Dec. 10, 2019. |
Final Office Action issued in counterpart U.S. Appl. No. 16/432,711 dated Jan. 31, 2020. |
Final Office Action issued in counterpart U.S. Appl. No. 16/432,733 dated Dec. 11, 2019. |
Final Office Action issued in counterpart U.S. Appl. No. 16/432,762 dated Dec. 11, 2019. |
Final Office Action issued in counterpart U.S. Appl. No. 16/432,772 dated Nov. 26, 2019. |
Final Office Action issued in counterpart U.S. Appl. No. 16/432,791 dated Jan. 27, 2020. |
Final Office Action issued in counterpart U.S. Appl. No. 16/432,801 dated Nov. 21, 2019. |
Final Office Action issued in counterpart U.S. Appl. No. 16/433,006 dated Jan. 10, 2020. |
Final Office Action issued in counterpert U.S. Appl. No. 16/432,818 dated Jan. 13, 2020. |
Final Office Action issued in countpart U.S. Appl. No. 16/432,751 dated Jan. 10, 2020. |
Final Office Action issued in related U.S. Appl. No. 29/693,794 dated Dec. 30, 2020. |
Final Office Action issued in related U.S. Appl. No. 29/693,796 dated Dec. 30, 2020. |
Final Office Action issued in related U.S. Appl. No. 29/693,951 dated Dec. 30, 2020. |
Final Office Action issued in related U.S. Appl. No. 29/693,957 dated Dec. 30, 2020. |
Goldstein et al. "Enhancing Security Event Management Systems with Unsupervised Anomaly Detection." in ICPRAM, pp. 530-538, 2013. |
International Seach Report issued in Internatioanl Application No. PCT/US2019/035745 dated Aug. 16, 2019. |
International Search Report issued in International Application No. PCT/US2019/035704 dated Oct. 8, 2019. |
International Search Report issued in International Application No. PCT/US2019/035715 dated Sep. 4, 2019. |
International Search Report issued in International Application No. PCT/US2019/035720 dated Aug. 27, 2019. |
International Search Report issued in International Application No. PCT/US2019/035734 dated Aug. 16, 2019. |
International Search Report issued in International Application No. PCT/US2019/035738 dated Aug. 16, 2019. |
International Search Report issued in International Application No. PCT/US2019/035748 dated Aug. 26, 2019. |
Kotento, I. et al. "The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems" Sep. 2013 International Conference on Availability, Reliability and Security, pp. 638-645. |
Murray, A., "How to Create a Rader Chart in Excel", Jan. 30, 2019, posted at howtogeek.com, [site visited Dec. 22, 2020]. https://www.howtogeek.com/402016/how-to-create-a-radar-chart-in-excel (Year: 2019), 2 pages. |
Non-Final Office Action issed in U.S. Appl. No. 16/433,053 dated Aug. 22, 2019. |
Non-Final Office Action issued in counterpart U.S. Appl. No. 16/433,032 dated Nov. 18, 2019. |
Non-Final Office Action issued in related U.S. Appl. No. 29/693,794 dated Aug. 12, 2020. |
Non-Final Office Action issued in related U.S. Appl. No. 29/693,796 dated Aug. 10, 2020. |
Non-Final Office Action issued in related U.S. Appl. No. 29/693,951 dated Aug. 12, 2020. |
Non-Final Office Action issued in related U.S. Appl. No. 29/693,957 dated Aug. 12, 2020. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,488 dated Aug. 22, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,556 dated Sep. 30, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,614 dated Sep. 3, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,626 dated Aug. 8, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,649 dated Aug. 21, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,671 dated Aug. 21, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,689 dated Aug. 6, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,711 dated Aug. 29, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,733 dated Aug. 8, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,751 dated Aug. 12, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,762 dated Aug. 8, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,772 dated Jul. 23, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,780 dated Oct. 18, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,791 dated Jul. 31, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,801 dated Aug. 1, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/432,818 dated Aug. 21, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/433,006 dated Sep. 5, 2019. |
Non-Final Office Action issued in U.S. Appl. No. 16/433,022 dated Aug. 22, 2019. |
Notice of Allowance issued in counterpart U.S. Appl. No. 16/432,614 dated Jan. 10, 2020. |
Pavlik, J. et al., "Security information and event management in the cloud computing infrastructure", 15th IEEE International Symposium on Computational Intelligence and Informatics, Nov. 19-21, 2014, Budapest, Hungary, 6 pages. |
Reliaquest Blog, "New ReliaQuest GreyMatter Demos Fuel ReliaQuest's Momentum at Black Hat USA", Aug. 13, 2019, posted at reliaquest.com, [site visited Dec. 22, 2020]. https://www.reliaquest.com/blog/new-greymatter-demos-fuel-reliaquests-momentum-at-black-hat-usa (Year: 2019), 2 pages. |
Shabtai, A. et al., "Detection of Malicious Code by Applying Machine Learning Classifers on Static Features: A State-of-the-art survey", Information Security Technical Report I4 (2009), pp. 16-29. |
Warnecke, M. P., Master's Thesis, "Examining the Return on Investment of a Security Information and Event Management Solution in a Notional Department of Defense Network Environment", Naval Postgraduate School, Monterey, CA, Jun. 2013, 107 pages. |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USD947878S1 (en) * | 2019-04-05 | 2022-04-05 | Adp, Inc. | Display screen with graphical user interface |
Also Published As
Publication number | Publication date |
---|---|
CA191606S (en) | 2021-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USD986274S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD896264S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD902951S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD891456S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD926200S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD917521S1 (en) | Display screen or portion thereof with graphical user interface | |
USD906363S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD1026030S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD941334S1 (en) | Display screen or portion thereof with graphical user interface | |
USD926782S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD865804S1 (en) | Display screen with graphical user interface | |
USD926809S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD949165S1 (en) | Portion of a display screen with a graphical user interface | |
USD969854S1 (en) | Portion of a display screen with a graphical user interface | |
USD922418S1 (en) | Display screen or portion thereof with graphical user interface | |
USD937858S1 (en) | Display screen or portion thereof with graphical user interface | |
USD892825S1 (en) | Display screen or portion thereof with graphical user interface | |
USD936073S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD929430S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD969819S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD910059S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD936672S1 (en) | Display screen or portion thereof with graphical user interface | |
USD926810S1 (en) | Display screen or portion thereof with a graphical user interface | |
USD891445S1 (en) | Display screen or portion thereof with graphical user interface | |
USD932504S1 (en) | Display screen or portion thereof with a graphical user interface |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |