GB201904276D0 - Pre-emptive computer security - Google Patents
Pre-emptive computer securityInfo
- Publication number
- GB201904276D0 GB201904276D0 GBGB1904276.1A GB201904276A GB201904276D0 GB 201904276 D0 GB201904276 D0 GB 201904276D0 GB 201904276 A GB201904276 A GB 201904276A GB 201904276 D0 GB201904276 D0 GB 201904276D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- emptive
- computer security
- security
- computer
- emptive computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
- G06N3/0455—Auto-encoder networks; Encoder-decoder networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/042—Knowledge-based neural networks; Logical representations of neural networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/047—Probabilistic or stochastic networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/084—Backpropagation, e.g. using gradient descent
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/088—Non-supervised learning, e.g. competitive learning
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
- G06N5/022—Knowledge engineering; Knowledge acquisition
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Biophysics (AREA)
- General Physics & Mathematics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biomedical Technology (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Probability & Statistics with Applications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1904276.1A GB2582609B (en) | 2019-03-27 | 2019-03-27 | Pre-emptive computer security |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1904276.1A GB2582609B (en) | 2019-03-27 | 2019-03-27 | Pre-emptive computer security |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| GB201904276D0 true GB201904276D0 (en) | 2019-05-08 |
| GB2582609A GB2582609A (en) | 2020-09-30 |
| GB2582609B GB2582609B (en) | 2021-10-20 |
Family
ID=66381328
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB1904276.1A Expired - Fee Related GB2582609B (en) | 2019-03-27 | 2019-03-27 | Pre-emptive computer security |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2582609B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112398819A (en) * | 2020-11-02 | 2021-02-23 | 杭州海康威视数字技术股份有限公司 | Method and device for recognizing abnormality |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11449604B2 (en) * | 2019-03-27 | 2022-09-20 | British Telecommunications Public Limited Company | Computer security |
| WO2020193332A1 (en) * | 2019-03-27 | 2020-10-01 | British Telecommunications Public Limited Company | Pre-emptive computer security |
| US11436320B2 (en) * | 2019-03-27 | 2022-09-06 | British Telecommunications Public Limited Company | Adaptive computer security |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10382478B2 (en) * | 2016-12-20 | 2019-08-13 | Cisco Technology, Inc. | Detecting malicious domains and client addresses in DNS traffic |
| EP3635914B1 (en) * | 2017-06-09 | 2021-04-14 | British Telecommunications Public Limited Company | Anomaly detection in computer networks |
| CN109829299B (en) * | 2018-11-29 | 2022-05-10 | 电子科技大学 | An Unknown Attack Recognition Method Based on Deep Autoencoder |
-
2019
- 2019-03-27 GB GB1904276.1A patent/GB2582609B/en not_active Expired - Fee Related
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112398819A (en) * | 2020-11-02 | 2021-02-23 | 杭州海康威视数字技术股份有限公司 | Method and device for recognizing abnormality |
Also Published As
| Publication number | Publication date |
|---|---|
| GB2582609B (en) | 2021-10-20 |
| GB2582609A (en) | 2020-09-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| GB2570752B (en) | Time-bound secure access | |
| GB2554390B (en) | Computer security profiling | |
| GB2555759B (en) | Data access and ownership management | |
| IL266445B (en) | Secure key management | |
| GB2583892B (en) | Adaptive computer security | |
| GB201706015D0 (en) | Data security | |
| GB201803275D0 (en) | Data security | |
| GB2582609B (en) | Pre-emptive computer security | |
| PL4061164T3 (en) | Security tag | |
| GB201602873D0 (en) | Secure data access | |
| GB201714219D0 (en) | A security document or token | |
| GB2588765B (en) | Security tag | |
| GB2593003B (en) | Square computer lock | |
| GB2580714B (en) | Security tag | |
| SG11202008538UA (en) | Transaction security | |
| IL262653B (en) | Hard bouillon tablet | |
| GB2539100B (en) | Preventing security threats in a computer network | |
| PL3833458T3 (en) | Game engine-based computer security | |
| GB201715073D0 (en) | Data security | |
| GB201616788D0 (en) | Enhanced computer objects security | |
| GB201904275D0 (en) | Computer Security | |
| GB201722299D0 (en) | Encrypted data access | |
| AU2015100387A4 (en) | A Security Document or Token | |
| GB202103373D0 (en) | Computer Security | |
| GB2584623B (en) | Security tag |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20250327 |