Patent application number | Description | Published |
20140101761 | SYSTEMS AND METHODS FOR CAPTURING, REPLAYING, OR ANALYZING TIME-SERIES DATA - Provided is an intrusion detection system configured to detect anomalies indicative of a zero-day attack by statistically analyzing substantially all traffic on a network in real-time. The intrusion detection system, in some aspects, includes a network interface; one or more processors communicatively coupled to the network interface; system memory communicatively coupled to the processors. The system memory, in some aspects, stores instructions that when executed by the processors cause the processors to perform steps including: buffering network data from the network interface in the system memory; retrieving the network data buffered in the system memory; applying each of a plurality of statistical or machine-learning intrusion-detection models to the retrieved network data; aggregating intrusion-likelihood scores from each of the intrusion-detection models in an aggregate score, and upon the aggregate score exceeding a threshold, outputting an alert. | 04-10-2014 |
20140101762 | SYSTEMS AND METHODS FOR CAPTURING OR ANALYZING TIME-SERIES DATA - Provided is an intrusion detection system configured to detect anomalies indicative of a zero-day attack by statistically analyzing substantially all traffic on a network in real-time. The intrusion detection system, in some aspects, includes a network interface; one or more processors communicatively coupled to the network interface; system memory communicatively coupled to the processors. The system memory, in some aspects, stores instructions that when executed by the processors cause the processors to perform steps including: buffering network data from the network interface in the system memory; retrieving the network data buffered in the system memory; applying each of a plurality of statistical or machine-learning intrusion-detection models to the retrieved network data; aggregating intrusion-likelihood scores from each of the intrusion-detection models in an aggregate score, and upon the aggregate score exceeding a threshold, outputting an alert. | 04-10-2014 |
20140101763 | SYSTEMS AND METHODS FOR CAPTURING OR REPLAYING TIME-SERIES DATA - Provided is an intrusion detection system configured to detect anomalies indicative of a zero-day attack by statistically analyzing substantially all traffic on a network in real-time. The intrusion detection system, in some aspects, includes a network interface; one or more processors communicatively coupled to the network interface; system memory communicatively coupled to the processors. The system memory, in some aspects, stores instructions that when executed by the processors cause the processors to perform steps including: buffering network data from the network interface in the system memory; retrieving the network data buffered in the system memory; applying each of a plurality of statistical or machine-learning intrusion-detection models to the retrieved network data; aggregating intrusion-likelihood scores from each of the intrusion-detection models in an aggregate score, and upon the aggregate score exceeding a threshold, outputting an alert. | 04-10-2014 |
20150082433 | SYSTEMS AND METHODS FOR CAPTURING, REPLAYING, OR ANALYZING TIME-SERIES DATA - Provided is an intrusion detection system configured to detect anomalies indicative of a zero-day attack by statistically analyzing substantially all traffic on a network in real-time. The intrusion detection system, in some aspects, includes a network interface; one or more processors communicatively coupled to the network interface; system memory communicatively coupled to the processors. The system memory, in some aspects, stores instructions that when executed by the processors cause the processors to perform steps including: buffering network data from the network interface in the system memory; retrieving the network data buffered in the system memory; applying each of a plurality of statistical or machine-learning intrusion-detection models to the retrieved network data; aggregating intrusion-likelihood scores from each of the intrusion-detection models in an aggregate score, and upon the aggregate score exceeding a threshold, outputting an alert. | 03-19-2015 |
Patent application number | Description | Published |
20110114585 | Modular Sanitation Tray Systems - A sanitation tray system for medical, laboratory, and industrial equipment. This system is modular, stackable, and user customizable. It may be assembled in any number of horizontal or vertical configurations depending on the user's needs and is capable of permitting instruments of varying heights, lengths and widths to be sanitized simultaneously. It is easily assemblable and disassemblable and includes a rack, corners, sides, and dowels. It is light-weight, easy to manufacture, easy to ship, and economical. It is designed to use the least amount of surface area to allow for maximum permeation of sterilants and minimizes the opportunity for pooling of sterilants or retention of particulate matter while decreasing drying time. | 05-19-2011 |
20120094249 | Dental Instrument Securing System - A tray assembly for use with dental instruments is disclosed herein comprising: a tray, an plate having a top plane and a bottom plane and apertures, the apertures being horizontally configured to receive a plurality of receiver assemblies supported on a top plane via a receiver assembly support, a plurality of semi-cylindrical RadelĀ® instrument supports, a stationer comprising a biasing means whereby the instrument is friction held in stasis between the stationer and the instrument support, and a plurality of instrument stationers. The plate includes a plurality of aperture(s), at least one receiver assembly for receiving at least one medical/dental instrument inserted between the instrument support and the biasing instrument stationer, suspended within the tray. A kit is also disclosed for the present invention. | 04-19-2012 |