Search Results - ankit+shah

2 Results Sort By:
System and Method for Reducing a Threat Footprint of an Area-of-Interest
Advantages: The AI-enabled technology automates the risk assessment process and eliminates the need for manual techniques, which can be time-consuming and prone to human error. By leveraging AI, the technology is able to learn patterns and analyze complex data, uncovering new and previously unrecognized attack paths and strategies. The methodical...
Published: 2/6/2024   |   Inventor(s): Ankit Shah, Soumyadeep Hore, Dinesh Sharma
Keywords(s): Artificial Intelligence, Diagnostic Tools for Network Vulnerability Evaluations, Machine Learning
Category(s): Technology Classifications > Software > Multimedia, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity
Deep Cyber Vulnerability Mitigator
Competitive Advantages Organization-specific context-based threat detection and mitigation. Continuous refinement of defender’s policies according to the threats identified. Assignment of security personnel according to the threat level of vulnerability and skills of the individual. Summary Cyberthreats are increasing daily with continuously...
Published: 9/12/2024   |   Inventor(s): Ankit Shah
Keywords(s): Computer Science, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Algorithms