Oakton, VA, United States of America

Kam Him Tam


Average Co-Inventor Count = 5.0

ph-index = 1

Forward Citations = 12(Granted Patents)


Company Filing History:


Years Active: 2019

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Kam Him Tam - Innovator in Cybersecurity Visualization

Introduction

Kam Him Tam is an accomplished inventor based in Oakton, Virginia. He has made significant contributions to the field of cybersecurity through his innovative patent. His work focuses on enhancing the analysis and monitoring of enterprise computer networks.

Latest Patents

Kam Him Tam holds a patent for a "System and method for visualizing and analyzing cyber-attacks using a graph model." This invention provides a system and method for implementing a graph database to analyze and monitor the status of an enterprise computer network. In this system, a plurality of sensors can be inputted into a sensor interface, where all data associated with the sensors is converted into a common data format. The data is then parsed into a data model containing nodes and edges, generating a graph database model that allows network analysts to assess the real-time status of a computer network. The graph database model includes multiple layers, such as an infrastructure layer, a cyber threats layer, a cyber posture layer, and a mission readiness layer. Additionally, users can query the graph database model using a domain-specific query language, providing a user-friendly syntax for generating queries.

Career Highlights

Kam Him Tam is currently employed at The Mitre Corporation, where he continues to work on innovative solutions in cybersecurity. His expertise in graph database models has positioned him as a valuable asset in the field.

Collaborations

Some of Kam Him Tam's notable coworkers include Steven E Noel and Eric Harley, who contribute to the collaborative environment at The Mitre Corporation.

Conclusion

Kam Him Tam's contributions to cybersecurity through his innovative patent demonstrate his commitment to enhancing network security. His work continues to influence the way enterprises monitor and analyze cyber threats effectively.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…