Sterling, VA, United States of America

Michael Schatz


Average Co-Inventor Count = 4.0

ph-index = 1

Forward Citations = 147(Granted Patents)


Company Filing History:


Years Active: 2007

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Michael Schatz: Innovator in Computer Intrusion Detection Systems

Introduction

Michael Schatz is a notable inventor based in Sterling, Virginia, who has made significant contributions to the field of computer security. He is recognized for his innovative work in developing a computer intrusion detection system that enhances the security of computer systems against application-based attacks.

Latest Patents

Michael Schatz holds a patent for a "Computer intrusion detection system and method based on application monitoring." This system utilizes application monitors to detect application-based attacks on computer systems. The intrusion detection system (IDS) employs machine learning algorithms to learn and monitor the behavior of system programs, enabling it to recognize future attacks that it has not encountered before. Additionally, the application monitors incorporate temporal locality algorithms to improve the accuracy of the IDS. The system may also include a string-matching program, a neural network, or a time series prediction algorithm to learn normal application behavior and detect anomalies.

Career Highlights

Michael Schatz is currently associated with Cigital, Inc., where he applies his expertise in computer security. His work focuses on developing advanced technologies that protect computer systems from various threats.

Collaborations

Some of his notable coworkers include Anup K Ghosh and Christoph Cornelius Michael, who have collaborated with him on various projects in the field of computer security.

Conclusion

Michael Schatz's contributions to the field of computer intrusion detection systems highlight his innovative spirit and dedication to enhancing cybersecurity. His work continues to influence the development of technologies that protect computer systems from evolving threats.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…