1
William C Arnold, David M Chess, Jeffrey O Kephart, Steven R White: Automatic immune system for computers and computer networks. International Business Machines Corporation, Perman & Green, August 8, 1995: US05440723 (480 worldwide citation)

A method includes the following component steps, or some functional subset of these steps: (A) periodic monitoring of a data processing system (10) for anomalous behavior that may indicate the presence of an undesirable software entity such as a computer virus, worm, or Trojan Horse; (B) automatic s ...


2
Jeffrey O Kephart: Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entities. International Business Machines Corporation, Perman & Green, September 19, 1995: US05452442 (275 worldwide citation)

A method, and apparatus for accomplishing the method, to extract and/or evaluate a signature of a computer virus or other undesirable software entity. The method includes a first step of inputting to a digital data processor at least one portion of a undesirable software entity, the at least one por ...


3
James E Hanson, Jeffrey O Kephart: Apparatus for preventing automatic generation of a chain reaction of messages if a prior extracted message is similar to current processed message. International Business Machines Corporation, Gail H Zarick, Harrington & Smith, April 15, 2003: US06549957 (149 worldwide citation)

A digital data processing system is provided with an information extracting portion or step for extracting information from each message processed by an entity of the system, where the extracted information permits that message or a similar message to be recognized. The system further includes a sto ...


4
David M Chess, Jeffrey O Kephart, Gregory B Sorkin: Automatic analysis of a computer virus structure and means of attachment to its hosts. International Business Machines Corporation, Robert Tassinari, Whitham Curtis Whitham & McGinn, January 16, 1996: US05485575 (131 worldwide citation)

Information pertaining to the verification of the identity of, and reversal of, a transformation of computer data is derived automatically based on a set of samples. The most important class of transformations is computer viruses. The process extracts this information for a large, fairly general cla ...


5
William C Arnold, David M Chess, Jeffrey O Kephart, Gregory B Sorkin, Steve R White: Searching for patterns in encrypted data. International Business Machines Corporation, Robert P Tassinari, Whitham Curtis Whitham & McGinn, August 15, 1995: US05442699 (68 worldwide citation)

A searching method determines, given a specified encryption method (or set of encryption methods) and a specified pattern (or set of patterns), whether a given text contains an encryption, with any key, of anything fitting the pattern or patterns. The procedure detects and locates patterns that are ...


6
Jeffrey O Kephart, Gregory B Sorkin: Generic disinfection of programs infected with a computer virus. International Business Machines Corporation, Robert P Tassinari Jr, March 18, 1997: US05613002 (67 worldwide citation)

A method for restoring a computer program infected with a computer virus to its non-viral condition. The method uses certain information about an uninfected host program recorded prior to infection without relying upon pre-existing knowledge of the computer virus. The method includes: recording a ch ...


7
Rajarshi Das, James E Hanson, Jeffrey O Kephart, Steve R White: Apparatus, system and method for automatically making operational selling decisions. International Business Machines Corporation, Duke W Yee, Eustus D Nelson, Lisa L B Yociss, April 10, 2007: US07203662 (18 worldwide citation)

An apparatus, system and method for automatically making operation selling decisions are provided. The apparatus, system and method make use of selling policy rules established by human operators associated with a firm to guide the making of decisions to sell products and/or services. The actual dec ...


8
Canturk Isci, Jeffrey O Kephart, Xiaoqiao Meng, Li Zhang: System and method for virtual machine multiplexing for resource provisioning in compute clouds. International Business Machines Corporation, Tutunjian & Bitetto P C, Preston J Young, April 16, 2013: US08423998 (13 worldwide citation)

A system and method for provisioning virtual machines in a virtualized environment includes determining a relationship between capacity need and performance for virtual machines (VMs) stored in memory storage media. Aggregate capacity needs for a plurality of VMs consolidated on a same physical serv ...


9
Hoi Y Chan, Jeffrey O Kephart, David W Levine: Adaptive dynamic buffering system for power management in server clusters. International Business Machines Corporation, Scully Scott Murphy & Presser P C, Stephen Kaufman Esq, October 21, 2008: US07441135 (12 worldwide citation)

A system, method and computer program product for managing power consumption in a system comprising at least two computing devices. The at least two computing devices are organized as part of active computing device group or a ready computing device group, the ready computing devices configured into ...


10
Gerald James Tesauro, Rajarshi Das, Nicholas K Jong, Jeffrey O Kephart: Method and apparatus for reward-based learning of improved policies for management of a plurality of application environments supported by a data processing system. International Business Machines Corporation, August 16, 2011: US08001063 (7 worldwide citation)

In one embodiment, the present invention is a method for reward-based learning of improved systems management policies. One embodiment of the inventive method involves obtaining a decision-making entity and a reward mechanism. The decision-making entity manages a plurality of application environment ...