Making security recommendations

Embodiments of a method are disclosed. The method includes determining a plurality of recommended actions based on the security accident using an action model trained to make recommendations. The method further includes determining a plurality of targets similar to the target of the security acciden...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: SPYSAK MICHAEL JAMES, ALI MOHAMED, MCKAY SEAN D, DENIS JEROME
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator SPYSAK MICHAEL JAMES
ALI MOHAMED
MCKAY SEAN D
DENIS JEROME
description Embodiments of a method are disclosed. The method includes determining a plurality of recommended actions based on the security accident using an action model trained to make recommendations. The method further includes determining a plurality of targets similar to the target of the security accident using a collaborative filtering model trained to assign confidence values of similarity between the two targets. The method further includes assigning a plurality of weights to the recommended action based on the one or more actions taken by the similar target and the confidence value, and a success or failure of the recommended action. In addition, the method includes generating a prioritized list of recommended actions ordered based on the assigned weights. 公开了一种方法的实施例。该方法包括:使用被训练以做出推荐的动作模型,基于安全事故来确定多个推荐动作。该方法还包括:使用被训练以分配两个目标之间的相似性的置信度值的协同过滤模型,确定与安全事故的目标相似的多个目标。该方法还包括:基于以下各项将多个权重分配给推荐动作:由相似目标采取的一个或多个动作和置信度值,以及推荐动作的成功或失败。另外,该方法包括:生成基于所分配的权重排序的推荐动作的优先化列表。
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN114629675A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN114629675A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN114629675A3</originalsourceid><addsrcrecordid>eNrjZJD3TczOzEtXKE5NLi3KLKlUKEpNzs_NTc1LSSzJzM8r5mFgTUvMKU7lhdLcDIpuriHOHrqpBfnxqcUFicmpeakl8c5-hoYmZkaWZuamjsbEqAEAVlolbw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Making security recommendations</title><source>esp@cenet</source><creator>SPYSAK MICHAEL JAMES ; ALI MOHAMED ; MCKAY SEAN D ; DENIS JEROME</creator><creatorcontrib>SPYSAK MICHAEL JAMES ; ALI MOHAMED ; MCKAY SEAN D ; DENIS JEROME</creatorcontrib><description>Embodiments of a method are disclosed. The method includes determining a plurality of recommended actions based on the security accident using an action model trained to make recommendations. The method further includes determining a plurality of targets similar to the target of the security accident using a collaborative filtering model trained to assign confidence values of similarity between the two targets. The method further includes assigning a plurality of weights to the recommended action based on the one or more actions taken by the similar target and the confidence value, and a success or failure of the recommended action. In addition, the method includes generating a prioritized list of recommended actions ordered based on the assigned weights. 公开了一种方法的实施例。该方法包括:使用被训练以做出推荐的动作模型,基于安全事故来确定多个推荐动作。该方法还包括:使用被训练以分配两个目标之间的相似性的置信度值的协同过滤模型,确定与安全事故的目标相似的多个目标。该方法还包括:基于以下各项将多个权重分配给推荐动作:由相似目标采取的一个或多个动作和置信度值,以及推荐动作的成功或失败。另外,该方法包括:生成基于所分配的权重排序的推荐动作的优先化列表。</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220614&amp;DB=EPODOC&amp;CC=CN&amp;NR=114629675A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220614&amp;DB=EPODOC&amp;CC=CN&amp;NR=114629675A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SPYSAK MICHAEL JAMES</creatorcontrib><creatorcontrib>ALI MOHAMED</creatorcontrib><creatorcontrib>MCKAY SEAN D</creatorcontrib><creatorcontrib>DENIS JEROME</creatorcontrib><title>Making security recommendations</title><description>Embodiments of a method are disclosed. The method includes determining a plurality of recommended actions based on the security accident using an action model trained to make recommendations. The method further includes determining a plurality of targets similar to the target of the security accident using a collaborative filtering model trained to assign confidence values of similarity between the two targets. The method further includes assigning a plurality of weights to the recommended action based on the one or more actions taken by the similar target and the confidence value, and a success or failure of the recommended action. In addition, the method includes generating a prioritized list of recommended actions ordered based on the assigned weights. 公开了一种方法的实施例。该方法包括:使用被训练以做出推荐的动作模型,基于安全事故来确定多个推荐动作。该方法还包括:使用被训练以分配两个目标之间的相似性的置信度值的协同过滤模型,确定与安全事故的目标相似的多个目标。该方法还包括:基于以下各项将多个权重分配给推荐动作:由相似目标采取的一个或多个动作和置信度值,以及推荐动作的成功或失败。另外,该方法包括:生成基于所分配的权重排序的推荐动作的优先化列表。</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJD3TczOzEtXKE5NLi3KLKlUKEpNzs_NTc1LSSzJzM8r5mFgTUvMKU7lhdLcDIpuriHOHrqpBfnxqcUFicmpeakl8c5-hoYmZkaWZuamjsbEqAEAVlolbw</recordid><startdate>20220614</startdate><enddate>20220614</enddate><creator>SPYSAK MICHAEL JAMES</creator><creator>ALI MOHAMED</creator><creator>MCKAY SEAN D</creator><creator>DENIS JEROME</creator><scope>EVB</scope></search><sort><creationdate>20220614</creationdate><title>Making security recommendations</title><author>SPYSAK MICHAEL JAMES ; ALI MOHAMED ; MCKAY SEAN D ; DENIS JEROME</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN114629675A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>SPYSAK MICHAEL JAMES</creatorcontrib><creatorcontrib>ALI MOHAMED</creatorcontrib><creatorcontrib>MCKAY SEAN D</creatorcontrib><creatorcontrib>DENIS JEROME</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SPYSAK MICHAEL JAMES</au><au>ALI MOHAMED</au><au>MCKAY SEAN D</au><au>DENIS JEROME</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Making security recommendations</title><date>2022-06-14</date><risdate>2022</risdate><abstract>Embodiments of a method are disclosed. The method includes determining a plurality of recommended actions based on the security accident using an action model trained to make recommendations. The method further includes determining a plurality of targets similar to the target of the security accident using a collaborative filtering model trained to assign confidence values of similarity between the two targets. The method further includes assigning a plurality of weights to the recommended action based on the one or more actions taken by the similar target and the confidence value, and a success or failure of the recommended action. In addition, the method includes generating a prioritized list of recommended actions ordered based on the assigned weights. 公开了一种方法的实施例。该方法包括:使用被训练以做出推荐的动作模型,基于安全事故来确定多个推荐动作。该方法还包括:使用被训练以分配两个目标之间的相似性的置信度值的协同过滤模型,确定与安全事故的目标相似的多个目标。该方法还包括:基于以下各项将多个权重分配给推荐动作:由相似目标采取的一个或多个动作和置信度值,以及推荐动作的成功或失败。另外,该方法包括:生成基于所分配的权重排序的推荐动作的优先化列表。</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN114629675A
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Making security recommendations
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T18%3A20%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SPYSAK%20MICHAEL%20JAMES&rft.date=2022-06-14&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN114629675A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true