Patent application number | Description | Published |
20140098446 | Universal Ground Fault Interrupter (GFCI) Device and Printed Circuit Board Package - A Ground Fault Circuit Interrupter (GFCI) printed circuit board (PCB) for interrupting the flow of current through a pair of lines extending between a source of power and a load. The GFCI PCB is easily adaptable to fit into a plurality of enclosure types having a plurality of load inputs operating off a single GFCI PCB. The GFCI PCB includes a stationary assembly having a load section, a GFCI circuit section, and a power source section, wherein the sections are adapted to minimize space, maintain arcing and dielectric prevention distances, and allow for peripheral load and source connections facilitating easy adaptability into a variety of GFCI enclosures. | 04-10-2014 |
20150009592 | MANUAL RESET GROUND FAULT CIRCUIT INTERRUPTOR (GFCI) WITH A QUICK CONNECT LOAD INPUT - A Ground Fault Circuit Interrupter (GFCI) interrupts the flow of current through a pair of lines extending between a source of power and a load. The GFCI includes a circuit breaker, a relay circuit including a solenoid, a latch circuit, and a fault detecting circuit packaged in a circuit assembly. The GFCI is adaptable for a quick connect of a load input cord by a user, allowing for various configurations of cords to be utilized on site, the cord easily connected from the device being protected to the GFCI at the point of use. The GFCI circuit assembly includes a load input section having cable securement jaws for connection of the load input cable terminal ends. | 01-08-2015 |
20150009600 | Power Cord Apparatus for Remotely Detecting Excessive Operational Parameters in an Electrically Powered Machine - A power cord apparatus for remotely detecting excessive operational parameters in an alternating current (AC) powered machine (e.g., dehumidifiers, air conditioners, refrigerators, and Computer Numerically Controlled (CNC) machines) is provided. The power cord apparatus includes a cooperative remote parametric sensing device (e.g., heat sensing, vibration transducer) in the vicinity of the electrically powered machine. | 01-08-2015 |
20150214719 | MINI APPLIANCE LEAKAGE CURRENT INERRUPTER CIRCUIT AND HOUSING EMBODIMENTS - An appliance leakage current interrupter (ALCI) for interrupting the flow of current through a pair of lines extending between a source of power and a load. The appliance leakage current interrupter having a housing integrating components that would normally be positioned on an ALCI circuit board. The ALCI having a prong assembly for supplying power from a source of power to the remainder of the ALCI, the prong assembly having first and second contact prongs which are in a first embodiment integrated into an ALCI circuit and in a second embodiment integrated into the housing assembly. | 07-30-2015 |
20150214721 | LEAKAGE CURRENT DETECTION AND INTERRUPTION (LCDI) DEVICE WITH IGNITION CONTAINMENT FEATURES - A leakage current detection and interruption (LCDI) device, for use as a safety device for a cable connecting, a power source with a load. The LCDI having a safety circuit that senses the presence of an arcing condition between one of the conducting lines and a metal sheath, and in response thereto, opens at least one of the conducting lines between the power supply and the load. The structure of the LCDI circuit card assembly incorporates a load input cavity having fire retardant materials surrounding the load input terminals, and further includes a contact actuator which encases the switch or contact arm at the source input section of the LCDI. | 07-30-2015 |
Patent application number | Description | Published |
20080200989 | CATHETER DELIVERABLE FOOT IMPLANT AND METHOD OF DELIVERING THE SAME - Methods and devices are disclosed for manipulating alignment of the foot to treat patients with flat feet, posterior tibial tendon dysfunction and metatarsophalangeal joint dysfunction. An enlargeable implant is positioned in or about the sinus tarsi and/or first metatarsal-phalangeal joint of the foot. The implant is insertable by minimally invasive means and enlarged through a catheter or needle. Enlargement of the implant alters the range of motion in the subtalar or first metatarsal-phalangeal joint and changes the alignment of the foot or toe. | 08-21-2008 |
20090069813 | METHOD AND APPARATUS FOR BONE FIXATION WITH SECONDARY COMPRESSION - Disclosed is a fracture fixation device, for reducing and compressing fractures in a bone. The fixation device includes an elongate body comprising a first portion and a second portion that are detachably coupled to each other. The first portion defines a helical cancellous bone anchor and the second portion defines a distal end. An axially moveable proximal anchor is carried by the proximal end of the fixation device and is rotationally locked to the first portion. The device is rotated into position across the femoral neck and into the femoral head, and the proximal anchor is distally advanced to lock the device into place. The second portion is then detached from the first portion. | 03-12-2009 |
20090082874 | CATHETER DELIVERABLE FOOT IMPLANT AND METHOD OF DELIVERING THE SAME - Methods and devices are disclosed for manipulating alignment of the foot to treat patients with flat feet, posterior tibial tendon dysfunction and metatarsophalangeal joint dysfunction. An inflatable implant is positioned in or about the sinus tarsi and/or first metatarsal-phalangeal joint of the foot. The implant is insertable by minimally invasive means and inflatable through a catheter or needle. Inflation of the implant alters the range of motion in the subtalar or first metatarsal-phalangeal joint and changes the alignment of the foot. | 03-26-2009 |
20100228353 | CATHETER DELIVERABLE FOOT IMPLANT AND METHOD OF DELIVERING THE SAME - Methods and devices are disclosed for manipulating alignment of the foot to treat patients with flat feet, posterior tibial tendon dysfunction and metatarsophalangeal joint dysfunction. An enlargeable implant is positioned in or about the sinus tarsi and/or first metatarsal-phalangeal joint of the foot. The implant is insertable by minimally invasive means and enlarged through a catheter or needle. Enlargement of the implant alters the range of motion in the subtalar or first metatarsal-phalangeal joint and changes the alignment of the foot or toe. | 09-09-2010 |
20120130501 | CATHETER DELIVERABLE FOOT IMPLANT AND METHOD OF DELIVERING THE SAME - Methods and devices are disclosed for manipulating alignment of the foot to treat patients with flat feet, posterior tibial tendon dysfunction and metatarsophalangeal joint dysfunction. An inflatable implant is positioned in or about the sinus tarsi and/or first metatarsal-phalangeal joint of the foot. The implant is insertable by minimally invasive means and inflatable through a catheter or needle. Inflation of the implant alters the range of motion in the subtalar or first metatarsal-phalangeal joint and changes the alignment of the foot. | 05-24-2012 |
20120277795 | DISTAL BONE ANCHORS FOR BONE FIXATION WITH SECONDARY COMPRESSION - Disclosed is a bone fracture fixation device, such as for reducing and compressing fractures in the proximal femur. The fixation device includes an elongate body with a helical cancellous bone anchor on a distal end. An axially moveable proximal anchor is carried by the proximal end of the fixation device. The device is rotated into position across the fracture or separation between adjacent bones and into the adjacent bone or bone fragment, and the proximal anchor is distally advanced to apply secondary compression and lock the device into place. The device may also be used for soft tissue attachments. | 11-01-2012 |
20130131821 | CATHETER DELIVERABLE FOOT IMPLANT AND METHOD OF DELIVERING THE SAME - Methods and devices are disclosed for manipulating alignment of the foot to treat patients with flat feet, posterior tibial tendon dysfunction and metatarsophalangeal joint dysfunction. An enlargeable implant is positioned in or about the sinus tarsi and/or first metatarsal-phalangeal joint of the foot. The implant is insertable by minimally invasive means and enlarged through a catheter or needle. Enlargement of the implant alters the range of motion in the subtalar or first metatarsal-phalangeal joint and changes the alignment of the foot or toe. | 05-23-2013 |
20140142629 | DISTAL BONE ANCHORS FOR BONE FIXATION WITH SECONDARY COMPRESSION - Disclosed is a bone fracture fixation device, such as for reducing and compressing fractures in the proximal femur. The fixation device includes an elongate body with a helical cancellous bone anchor on a distal end. An axially moveable proximal anchor is carried by the proximal end of the fixation device. The device is rotated into position across the fracture or separation between adjacent bones and into the adjacent bone or bone fragment, and the proximal anchor is distally advanced to apply secondary compression and lock the device into place. The device may also be used for soft tissue attachments. | 05-22-2014 |
20150088208 | CATHETER DELIVERABLE FOOT IMPLANT AND METHOD OF DELIVERING THE SAME - Methods and devices are disclosed for manipulating alignment of the foot to treat patients with flat feet, posterior tibial tendon dysfunction and metatarsophalangeal joint dysfunction. An inflatable implant is positioned in or about the sinus tarsi and/or first metatarsal-phalangeal joint of the foot. The implant is insertable by minimally invasive means and inflatable through a catheter or needle. Inflation of the implant alters the range of motion in the subtalar or first metatarsal-phalangeal joint and changes the alignment of the foot. | 03-26-2015 |
Patent application number | Description | Published |
20080216559 | Portable core flood apparatus for conducting on-site permeability measurements - A portable apparatus and method provide on-site permeability measurements of a core sample extracted from a subterranean reservoir. The portable apparatus is easily and conveniently transported to well locations for use on-site, thereby allowing the core sample to be tested in actual reservoir conditions. The apparatus can simultaneously test incoming liquids and liquids passing through the core sample, and can measure data in the forward and reverse flow directions. The apparatus requires only a single pump to pressurize and inject the liquid into the core sample. | 09-11-2008 |
20150024505 | APPARATUS FOR EVALUATING CARBONATE SOLUBILITY - A method and apparatus of determining solubility of compounds at non-ambient conditions is disclosed. The compound of interest is placed in a reaction vessel which can withstand the non-ambient conditions, and is allowed to react with an acid at those conditions for a pre-determined time. The reaction is quickened thereby stopping the reaction, after which the conditions are permitted to return to ambient and the solubility of the compound is then determined gravimetrically. | 01-22-2015 |
20150300143 | Chemically-Induced Pulsed Fracturing Method - A method of increasing a stimulated reservoir volume in a wellbore in a gas-containing formation includes the steps of mixing an exothermic reaction component to achieve a pre-selected solution pH, the exothermic reaction component is operable to react at a wellbore temperature to generate a pressure pulse, mixing the exothermic reaction component with a viscous fluid component operable to fracture the gas-containing formation to create fractures, and a proppant component, the proppant component carried to the fractures by the viscous fluid, the proppant component comprises a proppant operable to hold open the fractures, to form a fracturing fluid, injecting the fracturing fluid into the wellbore in the gas-containing formation to create fractures, and generating the pressure pulse when the exothermic reaction component reaches the wellbore temperature, the pressure pulse operable to create auxiliary fractures, wherein the auxiliary fractures create a fracture network, the fracture network increases the stimulated reservoir volume. | 10-22-2015 |
Patent application number | Description | Published |
20090303869 | ROBUST NARROWBAND SYMBOL AND FRAME SYNCHRONIZER FOR POWER-LINE COMMUNICATION - An embodiment is a method and apparatus to perform symbol synchronization. A correlation estimator computes a correlation of a sample vector representative of a narrowband signal. A synchronization detector detects symbol synchronization. | 12-10-2009 |
20090304130 | COMBINED DUAL FEED-FORWARD AND FEEDBACK ANALOG AND DIGITAL AUTOMATIC GAIN CONTROL FOR BROADBAND COMMUNICATION - An embodiment is a method and apparatus to process an input signal. An analog automatic gain control (AGC) processor controls an analog adjustable gain of the input signal using a feedback mechanism. The analog AGC processor generates a first signal. A processing circuit transforms the first signal into a second signal. A digital AGC processor controls a digital adjustable gain of the second signal using a feed-forward mechanism. | 12-10-2009 |
20090304133 | JAMMER CANCELLER FOR POWER-LINE COMMUNICATION - An embodiment is a method and apparatus to cancel signal interference. A jammer remover removes an interfering signal from an input signal to generate a jammer-canceled signal using an adaptive filtering procedure. A jammer detector detects interference caused by the interfering signal. | 12-10-2009 |
20090307540 | SYSTEM AND METHOD FOR APPLYING MULTI-TONE OFDM BASED COMMUNICATIONS WITHIN A PRESCRIBED FREQUENCY RANGE - According to one embodiment of the invention, an integrated circuit comprises an encoding module, a modulation module and a spectral shaped module. The encoding module includes an interleaver that adapted to operate in a plurality of modes including a first mode and a second mode. The interleaver performs repetitive encoding when placed in the second mode. The modulation module is adapted to compensate for attenuations that are to be realized during propagation of a transmitted signal over the power line. The spectral shaped module is adapted to compensate for amplitude distortion and further compensates for attenuations that will be realized during propagation of the transmitted signal over the power line. | 12-10-2009 |
20100316140 | TRANSMITTER AND METHOD FOR APPLYING MULTI-TONE OFDM BASED COMMUNICATIONS WITHIN A LOWER FREQUENCY RANGE - According to one embodiment of the invention, an integrated circuit comprises an encoding module, a modulation module and a spectral shaped module. The encoding module includes an interleaver that adapted to operate in a plurality of modes including a first mode, a second mod and a third mode. The interleaver performs repetitive encoding when placed in the second mode and even greater repetitive encoding when placed in the third mode. | 12-16-2010 |
20130101057 | SYSTEM AND METHOD FOR APPLYING MULTI-TONE OFDM BASED COMMUNICATIONS WITHIN A PRESCRIBED FREQUENCY RANGE - According to one embodiment of the invention, an integrated circuit comprises an encoding module, a modulation module and a spectral shaped module. The encoding module includes an interleaver that adapted to operate in a plurality of modes including a first mode and a second mode. The interleaver performs repetitive encoding when placed in the second mode. The modulation module is adapted to compensate for attenuations that are to be realized during propagation of a transmitted signal over the power line. The spectral shaped module is adapted to compensate for amplitude distortion and further compensates for attenuations that will be realized during propagation of the transmitted signal over the power line. | 04-25-2013 |
20130287126 | JAMMER CANCELLER FOR POWER-LINE COMMUNICATION - An apparatus to process an input signal received via a power line in a power line communication system includes a jammer remover and a jammer detector. The jammer remover removes interference resulting from transmission of electricity and the input signal over the power line from the input signal. The jammer remover generates a jammer-canceled signal using an adaptive filtering procedure. The jammer detector is coupled to the jammer remover to detect the interference. | 10-31-2013 |
20140376647 | SYSTEM AND METHOD FOR APPLYING MULTI-TONE OFDM BASED COMMUNICATIONS WITHIN A PRESCRIBED FREQUENCY RANGE - According to one embodiment of the invention, an integrated circuit comprises an encoding module, a modulation module and a spectral shaped module. The encoding module includes an interleaver that adapted to operate in a plurality of modes including a first mode and a second mode. The interleaver performs repetitive encoding when placed in the second mode. The modulation module is adapted to compensate for attenuations that are to be realized during propagation of a transmitted signal over the power line. The spectral shaped module is adapted to compensate for amplitude distortion and further compensates for attenuations that will be realized during propagation of the transmitted signal over the power line. | 12-25-2014 |
Patent application number | Description | Published |
20130247202 | DYNAMIC MANAGEMENT OF RESOURCE UTILIZATION BY AN ANTIVIRUS APPLICATION - System and method for dynamically managing utilization of computing capacity by an antivirus application having distinct security modules configurable by adjustment of operational parameters. An identification of the computing resources required by each of the security modules to perform certain corresponding security-related functionality is obtained. A current state of authorization granted to the antivirus application to access each of the plurality of computing resources is determined. The operational parameters are adjusted for the at least one of the security modules in response to a determination that the current state of authorization is insufficient for the antivirus application to access certain ones of the computing resources required by the at least one of the security modules to perform its corresponding functionality. The operational parameters are adjusted to disable the corresponding functionality and to thereby de-allocate a portion of the computing capacity needed to execute that corresponding functionality. | 09-19-2013 |
20130268470 | SYSTEM AND METHOD FOR FILTERING SPAM MESSAGES BASED ON USER REPUTATION - System for updating filtering rules for messages received by a plurality of users including a filtering rules database storing filtering rules for the users; means for distributing the filtering rules to the users; a user reputation database comprising a reputation weight for each user; and means for receiving and processing of user reports that indicate that a message belongs to a particular category. The means for receiving (i) calculates a message weight in its category based on a number of reports received from multiple users and a reputation weights of those users, (ii) decides whether the message belongs to the particular category if the message weight exceeds a predefined threshold, (iii) updates the filtering rules in the filtering rules database based on the deciding, and (iv) distributes the updated filtering rules from the filtering rules database to the users using the means for distributing. | 10-10-2013 |
20140095682 | System and Method for Performing Administrative Tasks on Mobile Devices - Disclosed are system, method and computer program product for remote administration of mobile devices. The system includes an administration server that receives a request to perform a remote administrative task on a mobile device. The server selects a function that performs the requested remote administrative task. The server identifies one or more management protocols that perform the selected function, wherein different protocols use different mechanisms to perform the same function. The server determines if the mobile device supports one or more of the identified protocols. When the mobile device supports two or more different management protocols, the server selects a protocol with the highest priority for performing the selected function. The server then executes the selected management protocol to perform the selected function that performs the requested remote administrative task on the mobile device. | 04-03-2014 |
20140181801 | SYSTEM AND METHOD FOR DEPLOYING PRECONFIGURED SOFTWARE - Automated deployment of a software application to be installed via a software installation package onto different user devices for different users. An initial software installation package, is obtained, along with information representing (a) associations between the users and the user devices, (b) user attributes from which access privilege level information for individual users is determinable, and (c) device attributes for each of the plurality of user devices, including network connectivity information. The initial software installation package is custom-configured for individual user devices based on the information representing (a) and (b) to produce a different specially-configured software installation packages. Each one includes installation parameters that establish functionality for the software application based on the access privilege level of the corresponding user. Data transfer channels are custom-configured for individual user devices based on the information representing (a) and (c). | 06-26-2014 |
20140181896 | System and Method for Protecting Computer Resources from Unauthorized Access Using Isolated Environment - Disclosed system and methods for protecting computer resources from unauthorized access. The system provides a library of handler functions that control access of applications to protected resources on a computer device. The system associates a security policy with the library to handler functions. The security policy specifies access rules for accessing protected resources by the applications. The system also modifies applications to access the library of handler functions instead of corresponding application program interface (API) functions of the computer device. When a handler function receives an API function call from a modified application, it may determine if the received API function call complies with the access rules. When the API function call complies with the access rules, the handler function performs the API function call from the application to the protected resources. When the API function call violates the access rules, the handler function block that API function call. | 06-26-2014 |
20140181974 | System and Method for Detecting Malware Using Isolated Environment - Disclosed system and methods for detecting malicious applications. The system provides a library of handler functions. The handlers functions control access of one or more applications to protected resources on a user device The system also modifies the one or more applications to access the library of handler functions instead of corresponding application program interface (API) functions of the user device. The handler functions receive API function calls from a modified application. The system analyzes the received API function calls for malicious behavior characteristics. When the. API function calls do not exhibit malicious behavior characteristics, the handier functions perform the API function calls to the protected resources. When the API function calls exhibit malicious behavior characteristics, the system prevents access of the modified application to the protected resources. | 06-26-2014 |
20140298324 | SYSTEM AND METHOD FOR AUTOMATED CONFIGURATION OF SOFTWARE INSTALLATION PACKAGE - Automated configuration of a software application to be installed via a software installation package onto different user devices for different users. An initial software installation package is obtained, as is information representing (a) associations between the plurality of users and the plurality of user devices, and (b) user attributes from which access privilege level information for individual users is determinable. The initial software installation package is configured for the user devices based on the information representing (a) and (b), to produce a plurality of different specially-configured software installation packages, each one of which corresponds to one or more specific users and one or more specific user devices. Each specially-configured package includes parameters that establish functionality for the software application based on the access privilege level of the users. Each user is authenticated, and completion of installation of the software application is conditioned on a result of the authentication. | 10-02-2014 |
20140298470 | System and Method for Adaptive Modification of Antivirus Databases - Disclosed are systems, methods and computer program products for adaptively modifying antivirus databases. In one example, a system stores in an antivirus database a list of file types and antivirus records for different file types. When the system receives files for performing antivirus analysis, it retrieves from the database the list of file types and uses it to determine file types of the received files. The system then retrieves from the database antivirus lists for the determined file types and uses them to perform antivirus analysis of the files. The system then identifies files with an unknown file type and attempts to determine the file type of these files. The system then updates the antivirus database by (i) adding to the list of file types a new file type corresponding to said unknown file type, and (ii) adding a new empty antivirus list corresponding to said unknown file type. | 10-02-2014 |
20150143521 | SYSTEM AND METHOD FOR DETECTING MALICIOUS SOFTWARE USING MALWARE TRIGGER SCENARIOS IN A MODIFIED COMPUTER ENVIRONMENT - Disclosed system and methods for malware testing of software programs. An example method includes storing a plurality of malware trigger scenarios specifying different sets of malware trigger events known to trigger malicious behaviour in software programs; in response to obtaining a software program, modifying a computer environment for operating the software program by creating malware trigger events associated with a selected one of the plurality of malware trigger scenarios; analyzing an execution of the software program in the modified computer environment in response to the malware trigger events; upon detecting that the software program exhibits malicious behaviour, performing remedial actions on the software program; and upon detecting that the software program exhibits no malicious behaviour, selecting a different malware trigger scenario from the plurality of malware trigger scenarios for malware testing of the software program. | 05-21-2015 |
20150160813 | SYSTEM AND METHOD FOR BLOCKING ELEMENTS OF APPLICATION INTERFACE - A method, system and computer program product for blocking access to restricted elements of application interface and covering the restricted elements by trusted interface elements. The system includes an analyzer module, a database of restricted elements and a blocking module. The analyzer module is configured to detect interface elements of an active application rendered on a computer or a mobile device. The analyzer module determines if an application interface element is restricted by comparing the application interface element against the known restricted interface elements from the database. If the restricted element is detected, the analyzer module sends the data about the restricted element to the blocking module. The blocking module covers the restricted interface element by a trusted interface element or by an image. | 06-11-2015 |
20150160939 | SYSTEM AND METHOD FOR MODIFYING A SOFTWARE DISTRIBUTION PACKAGE WITHOUT RECALCULATING DIGITAL SIGNATURES - Disclosed are systems, methods and computer program products for modifying a software distribution package. An example method includes receiving a software distribution package that including one or more compressed files and one or more digital signatures of the one or more compressed files. The method further includes determining to add modifications to the software distribution package. The method further includes writing the modifications into a commentary section of the software distribution package or into a free region between the one or more compressed files of the software distribution package without recalculating the digital signatures for the one or more compressed files included in the software distribution package. | 06-11-2015 |
20150341358 | METHOD AND SYSTEM FOR DETERMINING TRUSTED WIRELESS ACCESS POINTS - Disclosed are systems and method for determining trusted wireless access points. An example method includes identifying, by a mobile device, one or more wireless access points are available to connect to a network resource; obtaining a plurality of access point characteristics of the one or more wireless access points; obtaining a plurality of network resource characteristics for connecting to the network resource; comparing the plurality of access point characteristics and the plurality of network resource characteristics; determining based on the comparison at least one trusted wireless access points that is acceptable for establishing a connection to the network resource; and establishing a connection to the network resource via the trusted wireless access point. | 11-26-2015 |
20150341484 | SYSTEM AND METHOD CONTROLLING ACCESS TO APPLICATIONS ON A MOBILE DEVICE - Disclosed are systems and methods for controlling access to applications of a mobile device. An example method includes collecting, by a controlled shell of an OS of the mobile device, information about an application of the user device; determining a category designation of the application based on the collected information; determining, by the controlled shell, whether the category designation of the application complies with one or more rules of a usage policy of the mobile device; blocking user access to the application if it is determined that a rule exists prohibiting use of applications in the designated category or if no rule exists permitting use of the applications in the designated category; and permitting user access to the application if it is determined that a rule exists allowing use of applications in the designated category or if no rule exists prohibiting use of the applications in the designated category. | 11-26-2015 |
20160036834 | SYSTEM AND METHOD FOR DETERMINING CATEGORY OF TRUSTOF APPLICATIONS PERFORMING INTERFACE OVERLAY - Disclose dare systems and method for determining category of trust of software applications. An example method includes monitoring a first application to detect an overlay of at least one interface element of the first application by at least one interface element of a second application; collecting information about the second application, wherein the information includes at least a danger status of the second application, wherein the danger status determines a danger caused by the second application to the first application; determining a category of trust of the second application based on an analysis of the collected information; and determining, based on the category of trust of the second application, whether to allow or prohibit overlay of the at least one interface element of the first application by the at least one interface element of the second application. | 02-04-2016 |
20160080398 | SYSTEM AND METHOD FOR DETECTION OF TARGETED ATTACKS - Methods, systems, and computer programs for detecting targeted attacks on compromised computer. An example method includes receiving from a plurality of computer systems data about the network resource, wherein each of the plurality of computer systems has a set of parameters and associated parameter values; detecting presence of a suspect indicator in the respective data received from each of a first group of the plurality of computer systems; detecting absence of the suspect indicator in the respective data received from each of a second group of the plurality of computer systems; determining at least one suspect parameter and at least one suspect parameter value; and estimating a probability of the targeted attack from the network resource based on the suspect indicator, the at least one suspect parameter, and the at least one parameter value. | 03-17-2016 |