-
公开(公告)号:US20240078424A1
公开(公告)日:2024-03-07
申请号:US18258761
申请日:2021-12-01
Inventor: Robert HERCOCK , Alexander HEALING
IPC: G06N3/08
CPC classification number: G06N3/08
Abstract: A computer implemented method of a machine learning algorithm modelling a target function mapping inputs in an input domain to outputs in an output range, the machine learning algorithm including an array of processing nodes arranged in a network of layers of nodes including an input layer for receiving an input value, an output layer for providing an output value, and one or more intermediate layers between the input and output layers, each node in the processing set being outside the input layer receiving input from at least some adjacent nodes logically closer to the input layer via weighted connections between nodes, and each node being outside the output layer generating output to at least some adjacent nodes logically closer to the output layer via weighted connections between nodes, wherein each node includes: an adjustable weight for application to each input to the node, the adjustment weight being responsive to a threshold function applied to a value of the node input; a combination function for combining outputs of the threshold function; and a node bypass function for selectively mapping one or more of the inputs to the node to the output of the node, the method comprising iteratively training the machine learning algorithm to model the target function by adjustment, at each iteration, of at least weights of connections between at least a subset of the nodes, such that the nodes of the network are programmable during operation of the algorithm by adjustment of the threshold function and the bypass function so as to selectively emphasise subsets of nodes in the network.
-
公开(公告)号:US20250005009A1
公开(公告)日:2025-01-02
申请号:US18712160
申请日:2022-10-05
Inventor: Robert HERCOCK
Abstract: In various examples there is a database management system which has a memory storing a plurality of addresses of items. The database management system has a mapping component for computing a mapped location of each item in a plane or volume comprising a plurality of tessellated cells. The memory stores, for individual ones of the items, the mapped location of the item.
-
公开(公告)号:US20240340648A1
公开(公告)日:2024-10-10
申请号:US18694829
申请日:2022-08-23
Inventor: Catherine WHITE , Jonathan ROSCOE , Robert HERCOCK , Ruth WRIGHT
IPC: H04W12/08 , H04W12/106
CPC classification number: H04W12/08 , H04W12/106
Abstract: A beacon device including directional transmission means transmits a challenge message in a first predetermined direction to each of one or more responder devices over a respective direct radio communication link, to invite the responder devices to each transmit a respective response message indicating knowledge of contents of the challenge message. The beacon device transmits one or more directed repetitions of the challenge message in one or more respective further predetermined directions such that data relating to the location of each of the responder devices can be inferred from timings of each response message with respect to times the challenge message and the directed repetitions of the challenge message were transmitted. The beacon device either engages in or eschews subsequent two-way communication with each of the one or more responder devices over the respective direct radio communication link, in dependence on the existence and timing of a respective response message.
-
公开(公告)号:US20240045962A1
公开(公告)日:2024-02-08
申请号:US18258766
申请日:2021-12-07
Inventor: Robert HERCOCK , Jonathan ROSCOE
IPC: G06F21/56 , G06F40/279
CPC classification number: G06F21/566 , G06F40/279 , G06F2221/034
Abstract: A computer implemented method of clustering computer systems in a plurality of systems to identify computer systems being subject to a common security occurrence, each computer system generating data records corresponding to security events in respect the systems, the method comprising: receiving a set of one or more data records associated with each computer system, each record including a sequence of data fields; generate a vector embedding for each data field in each record; evaluate a distance of each vector embedding from a reference vector as an indicator of semantic distance; identifying similar data records based on a measure of a degree of similarity of the distances of vector embeddings for each record; defining a cluster of computer systems including computer systems associated with the similar data records for applying protective measures to the computer systems in the cluster.
-
公开(公告)号:US20220027478A1
公开(公告)日:2022-01-27
申请号:US17309530
申请日:2019-12-01
Inventor: Robert HERCOCK , Giulio GIACONI
Abstract: A computer implemented method of detecting an increased vulnerability of a software system including a plurality of software components, the method including generating a vector representation of each software component derived from a neural network trained using training data defined from known vulnerabilities of the software components in the software system, wherein the training data is augmented by replicating each of one or more training data items in the training data responsive to one or more attributes of a vulnerability corresponding to the training data item; aggregating the vector representations for the software component to an aggregate vector representation for a particular time; repeating the generating and the aggregating for a plurality of points in time to generate multiple generations of aggregate vector representations; comparing the multiple generations of aggregate vector representations to detect a change in an aggregate vector representation exceeding a maximum threshold degree of change as an indication of an increased vulnerability of the software system.
-
-
-
-