1
Sherif M Botros, Thanh A Diep, Martin D Izenson: Method and apparatus for training a neural network model for use in computer network intrusion detection. Visa International Service Association, Beyer Weaver & Thomas, July 27, 2004: US06769066 (169 worldwide citation)

Detecting harmful or illegal intrusions into a computer network or into restricted portions of a computer network uses a process of synthesizing anomalous data to be used in training a neural network-based model for use in a computer network intrusion detection system. Anomalous data for artificiall ...


2
Wade F Schott, Thanh A Diep: Apparatus and method for problem solving using intelligent agents. General Dynamics Advanced Info Systems, Ingrassia Fisher & Lorenz P C, July 26, 2011: US07987151 (154 worldwide citation)

The present invention relates to a system and method for problem solving using intelligent agents. The intelligent agents may be embodied as processor-readable software code stored on a processor-readable medium. The intelligent agents may include a brain agent to parse the input and direct the pars ...


3
Thanh A Diep: Computer network intrusion detection. Visa International Service Association, Beyer Weaver & Thomas, April 9, 2002: US06370648 (146 worldwide citation)

Detecting harmful or illegal intrusions into a computer network or into restricted portions of a computer network uses statistical analysis to match user commands and program names with a template sequence. Discrete correlation matching and permutation matching are used to match sequences. The resul ...


4
Thanh A Diep, Sherif M Botros, Martin D Izenson: Features generation for use in computer network intrusion detection. Visa Internation Service Association, Beyer Weaver & Thomas, December 30, 2003: US06671811 (53 worldwide citation)

Detecting harmful or illegal intrusions into a computer network or into restricted portions of a computer network uses a features generator or builder to generate a feature reflecting changes in user and user group behavior over time. User and user group historical means and standard deviations are ...


5
Thanh A Diep, Hadar I Avi Itzhak, Harry T Garland: Training a neural network using centroid dithering by randomly displacing a template. Canon, Stuart P Meyer, Edward J Radlo, April 29, 1997: US05625707 (30 worldwide citation)

Pattern recognition, for instance optical character recognition, is achieved by training a neural network, scanning an image, segmenting the image to detect a pattern, preprocessing the detected pattern, and applying the preprocessed detected pattern to the trained neural network. The preprocessing ...


6
Thanh A Diep, Hadar I Avi Itzhak, Harry T Garland: High accuracy optical character recognition using neural networks with centroid dithering. Canon, Stuart P Meyer, Edward J Radlo, Elizabeth F Enayati, December 12, 1995: US05475768 (14 worldwide citation)

Pattern recognition, for instance optical character recognition, is achieved by training a neural network, scanning an image, segmenting the image to detect a pattern, preprocessing the detected pattern, and applying the preprocessed detected pattern to the trained neural network. The preprocessing ...


7
Sherif M Botros, Thanh A Diep, Martin D Izenson: Synthesis of anomalous data to create artificial feature sets and use of same in computer network intrusion detection systems. Visa International Service Association, Kilpatrick Townsend & Stockton, September 3, 2013: US08527776 (4 worldwide citation)

Detecting harmful or illegal intrusions into a computer network or into restricted portions of a computer network uses a process of synthesizing anomalous data to be used in training a neural network-based model for use in a computer network intrusion detection system. Anomalous data for artificiall ...


8
Sherif M Botros, Thanh A Diep, Martin D Izenson: Synthesis of anomalous data to create artificial feature sets and use of same in computer network intrusion detection systems. Visa International Service Association A Delaware Corporation, Beyer Weaver & Thomas, November 11, 2004: US20040225627-A1

Detecting harmful or illegal intrusions into a computer network or into restricted portions of a computer network uses a process of synthesizing anomalous data to be used in training a neural network-based model for use in a computer network intrusion detection system. Anomalous data for artificiall ...


9
Jeffrey A Goldman, Thanh A Diep: Apparatus and method for encrypting data. General Dynamics Advanced Information Systems, Steptoe & Johnson, August 23, 2007: US20070195960-A1

A method for sharing a data set including multiple classifications of security between one or more entities and/or between one or more organizations. Public-keys for use in selectively encrypting the data set with multiple classifications of security are made available in a public-key table. A priva ...


10
Wade F Schott, Thanh A Diep: Apparatus and method for problem solving using intelligent agents. Jenner & Block, February 13, 2003: US20030033266-A1

An apparatus and method for iterative problem solving that uses intelligent agents such as a brain agent, a profile agent, a personality agent, a knowledge agent and an error handling agent to interpret questions posed by a user and to provide responses back to the user. The apparatus and method may ...