Hernandez, 2022 - Google Patents
Sandia Cyber and Emulytics Overview.Hernandez, 2022
View PDF- Document ID
- 15102409012279360206
- Author
- Hernandez A
- Publication year
External Links
Snippet
Sandia Emulytics Overview Page 1 PRESENTEDBY Sandia National Laboratories is a
multimission laboratory managed and operated by National Technology & Engineering
Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International Inc., for the US …
- 241000321453 Paranthias colonus 0 title description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Happe et al. | Getting pwn’d by ai: Penetration testing with large language models | |
EP3338205B1 (en) | Simulation and virtual reality based cyber behavioral system | |
KR102765579B1 (en) | Quantum Computing Machine Learning for Security Threats | |
HK1257367A1 (en) | Simulation and virtual reality based cyber behavioral system | |
Kavak et al. | A characterization of cybersecurity simulation scenarios. | |
Kotenko et al. | Modeling the impact of cyber attacks | |
Li et al. | Agent based modeling on organizational dynamics of terrorist network | |
Horne et al. | Data Farming in support of NATO operations-methodology and proof-of-concept | |
McNeese et al. | The cognitive sciences of cyber-security: a framework for advancing socio-cyber systems | |
Burke | Robust artificial intelligence for active cyber defence | |
Shen et al. | Cryptographically secure computation | |
Malik et al. | Mapping AICTE cybersecurity curriculum onto CyBOK: a case study | |
Hernandez | Sandia Cyber and Emulytics Overview. | |
Zhou | Key problems and solutions of the application of artificial intelligence technology | |
Raybourn et al. | Data privacy and security considerations for personal assistants for learning (PAL) | |
Der Derian et al. | “Quantum 3.0”: What Will It Mean for War, Peace, and World Order? | |
Grant | Speeding up planning of cyber attacks using AI techniques: State of the art | |
Surve et al. | Multiagent simulators for social networks | |
Ormrod et al. | Modeling and Simulation Approaches | |
Tremori et al. | A verification, validation and accreditation process for autonomous interoperable systems | |
Awotidebe | Defensive AI in Cybersecurity: Building Autonomous Systems to Counter Evolving Threats | |
Maathuis et al. | The Role of AI in Military Cyber Security: Data Insights and Evaluation Methods | |
Haas et al. | Aiding understanding of a contested information environment’s effect on operations | |
Frazier | Applications of Artificial Intelligence to Information Privacy | |
Timčenko et al. | Approach to Assessing Cloud Computing Sustainability |