Enjoy your FREE PREVIEW which shows only 2021 data and 25 documents. For full access, try it free at any time.
AI Cybersecurity: Threats and Defenses
Global enterprises and governments are taking a defense in breadth approach to securing their resources and digital assets. Hardware and software providers are bringing to market a host of new offerings to help create consistent, reactive, global policies that prescribe methods for risk assessment, prevention, protection, monitoring, and incident response for cyber attacks on a policy level.
Top 10 Corporate Owners
Issued Patent Count
Published Application Count
Invention Categorization and Classification
Classification |
Patents and Published Applications |
Co-processor |
30
|
Honeypots, decoys |
87
|
Obfuscation, defensive |
30
|
Tool chain |
10
|
Encryption |
32
|
Denial of service |
72
|
Other |
15
|
Email-General |
69
|
Phishing |
95
|
Spam |
39
|
Spoofing |
40
|
Malware-General |
573
|
Encryption |
29
|
Adware |
4
|
Backdoor |
6
|
Man-in-Middle |
19
|
Bots |
38
|
Code injection |
18
|
Evasion |
8
|
Ransomware |
32
|
Rogue |
12
|
Spyware |
7
|
Trojan |
9
|
Virus |
42
|
Worms |
1
|
Encoding |
14
|
Exfiltration |
22
|
Exploitation |
36
|
Operating system |
17
|
Password attack |
3
|
Runtime attacks |
39
|
Insider |
29
|
Other |
36
|
Privacy |
223
|
Objectionable Malicious Content |
155
|
Web-General |
176
|
Scripts |
17
|
Shell and shellcode |
8
|
Recent Published Activity in AI Cybersecurity: Threats and Defenses as of March 26, 2023