Predictive modeling for anti-malware solutions

作者: Lawrence T. Belton , Peter A. Makohon , Ryan B. Benskin , Timothy Morris , Christopher Houser

DOI:

关键词:

摘要: Provided is predictive modeling for anti-malware solutions. The includes an identification manager component that generates profile data a hostile source. source identified based on previous threat attributed to the also evaluation determines characteristic of interaction between and endpoint. Further, validation compares with controls access by endpoint comparison. In addition, software not deployed

参考文章(47)
Aji Joseph, Shashi Kumar, Sambasivam Valliappan, Peirong Feng, Atul Mahamuni, Navindra Yadav, Azim Ozakil, Bora A. Akyol, Thomas J. Enderwick, Integration of network admission control functions in network access devices ,(2011)
Shaun Kospiah, Timothy M. Lemm, Aaron R. Davis, Timothy M. Aldrich, Matthew S. Bialek, Software network behavior analysis and identification system ,(2013)
Madhusudan Raman, Jeffrey Getchius, Renu Chipalkatti, Predictive scoring management system for application behavior ,(2011)
Robert Holzmann, Lynne Sherburne-Benz, E Telsuic, Social risk management ,(2014)
Igal Figlin, Bryan C. Griffin, Vidyanand N. Rajpathak, Chengi Jimmy Kuo, Predictive malware threat mitigation ,(2010)
Nancy Cam-Winget, Hao Zhou, Bhawani Sapkota, System and method for wireless network profile provisioning ,(2007)
Ian Foo, Jason D. Frazier, Susan M. Sauter, Gregory Alan Moore, Cynthia D. Melter, Apparatus and methods for supporting 802.1X in daisy chained devices ,(2007)
Kyle Adams, Daniel J. Quinlan, Oskar Ibatullin, Identifying malicious devices within a computer network ,(2015)