Prescott, AZ, United States of America

John Robertson


Average Co-Inventor Count = 5.0

ph-index = 1

Forward Citations = 16(Granted Patents)


Company Filing History:


Years Active: 2019

Loading Chart...
1 patent (USPTO):Explore Patents

Title: John Robertson: Innovator in Cyber Threat Mitigation

Introduction

John Robertson is an accomplished inventor based in Prescott, AZ, known for his innovative contributions to cybersecurity. He has developed a unique approach to data-driven game theoretic cyber threat mitigation, which not only showcases his technical expertise but also addresses pressing security challenges in an increasingly digital world.

Latest Patents

John holds a patent for "Systems and methods for data driven game theoretic cyber threat mitigation." This groundbreaking patent outlines a system and methods for a data-driven security game framework. It models an attacker based on exploit market data actively mined from the darknet, which allows the development of sophisticated strategies for defenders to counteract potential cyber threats.

Career Highlights

John Robertson is associated with Arizona State University, where he contributes to research and innovative advancements in cybersecurity. His work demonstrates a commitment to enhancing security measures through the application of game theory, making significant strides in protecting systems from cyber adversaries.

Collaborations

During his career, John has collaborated with noted professionals in the field, including Paulo Shakarian and Jana Shakarian. These partnerships reflect a strong academic and practical approach to tackling cybersecurity challenges, blending expertise from various disciplines to create comprehensive security solutions.

Conclusion

John Robertson's inventive work in cybersecurity through data-driven strategies positions him as a key player in the fight against cyber threats. His patent signifies a vital step forward in the development of more effective security frameworks, showcasing the importance of innovation in safeguarding technology and data.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…