Oak Ridge, TN, United States of America

Brian Weber


Average Co-Inventor Count = 7.0

ph-index = 1


Company Filing History:


Years Active: 2025

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Brian Weber: Innovator in Cybersecurity User Emulation

Introduction

Brian Weber is a notable inventor based in Oak Ridge, TN (US). He has made significant contributions to the field of cybersecurity through his innovative patent. His work focuses on enhancing the realism of user behavior in cyber-ranges, which is crucial for testing and training in cybersecurity environments.

Latest Patents

Brian Weber holds a patent for a "Data driven computer user emulation." This invention addresses the need for realistic user behavior in cyber-ranges, which are used for testing intrusion detection systems and conducting training exercises. Existing methods often rely on network-level data or recorded user actions, which may not accurately represent real users. Weber's approach utilizes probabilistic models that are trained on actual user data collected from endpoints. These models can generate novel sequences of actions that mimic real user behavior, making them valuable for various emulation software packages. Additionally, the models can incorporate time-of-day trends to enhance their accuracy.

Career Highlights

Brian Weber is associated with UT-Battelle, Inc., where he applies his expertise in cybersecurity. His work has been instrumental in advancing the capabilities of cyber-ranges, making them more effective for training and testing purposes.

Collaborations

Throughout his career, Brian has collaborated with notable colleagues, including Timothy S. Oesch and Robert A. Bridges. These collaborations have contributed to the development and refinement of his innovative approaches in cybersecurity.

Conclusion

Brian Weber's contributions to cybersecurity through his patent on data-driven user emulation highlight his role as an innovator in the field. His work not only enhances the effectiveness of cyber-ranges but also supports the broader cybersecurity community.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…