Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020056314 - SYSTEMS AND METHODS FOR A SIMULATION PROGRAM OF A PERCOLATION MODEL FOR THE LOSS DISTRIBUTION CAUSED BY A CYBER ATTACK

Publication Number WO/2020/056314
Publication Date 19.03.2020
International Application No. PCT/US2019/051091
International Filing Date 13.09.2019
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
G06N 5/04 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
5Computer systems using knowledge-based models
04Inference methods or devices
G06N 7/00 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
7Computer systems based on specific mathematical models
G06N 99/00 2019.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
99Subject matter not provided for in other groups of this subclass
G06Q 10/06 2012.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
10Administration; Management
06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
CPC
G06F 21/552
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
552involving long-term monitoring or reporting
G06N 5/04
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
5Computer systems using knowledge-based models
04Inference methods or devices
G06N 7/00
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
7Computer systems based on specific mathematical models
G06N 99/00
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
99Subject matter not provided for in other groups of this subclass
G06Q 10/06
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
10Administration; Management
06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
H04L 29/06
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00
02Communication control
06characterised by a protocol
Applicants
  • ARIZONA BOARD OF REGENTS ON BEHALF OF ARIZONA STATE UNIVERSITY [US]/[US]
Inventors
  • JEVTIC, Petar
  • LANCHIER, Nicolas
Agents
  • FONTES, Timothy
  • BAI, Ari
Priority Data
62/730,64913.09.2018US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SYSTEMS AND METHODS FOR A SIMULATION PROGRAM OF A PERCOLATION MODEL FOR THE LOSS DISTRIBUTION CAUSED BY A CYBER ATTACK
(FR) SYSTÈMES ET PROCÉDÉS RELATIFS À UN PROGRAMME DE SIMULATION D'UN MODÈLE DE PERCOLATION ASSOCIÉ À LA RÉPARTITION DES PERTES DUES À UNE CYBERATTAQUE
Abstract
(EN)
Aspects of the present disclosure relate to implementation of a dynamical structural percolation model, that may be implemented via at least one computing device, and models the loss distribution for cyber risk due to breach of IT networks of a single small or medium-sized enterprise, which is believed to be a technical improvement responsive to the foregoing issues and challenges with known risk/loss distribution models.
(FR)
Des aspects de la présente invention concernent la mise en œuvre d'un modèle de percolation structurel dynamique qui peut être implémenté par l'intermédiaire d'au moins un dispositif informatique et modélise la répartition des pertes associées à un risque cyber dû à la violation des réseaux informatiques d'une PME. L'invention constitue une avancée technique en réponse aux problèmes et défis liés, dans l'état de la technique, aux modèles de répartition de risques/perte connus.
Latest bibliographic data on file with the International Bureau