100% success in identifying vulnerabilities and exploits, and TRIBUTED COMPUTATIONAL GRAPH ” , filed on Oct. as of yet no such system is deployed for large scale or TRIBUTED COMPUTATIONAL GRAPH", filed on Oct. as of yet no such system is deployed for large scale or 28 , 2015 , the entire specifications of each of which are commercial applications in automated analysis and defense 28, 2015, the entire specifications of each of which are commercial applications in automated analysis and defense incorporated herein by reference .
6 is a method diagram illustrating the use of the case that vulnerabilities and exploits in software are only FIG. 6 is a method diagram illustrating the use of the case that vulnerabilities and exploits in software are only advanced endpoint instrumentation to collect data on end found out and then patched some time after they are taken advanced endpoint instrumentation to collect data on end- found out and then patched some time after they are taken point devices across a network , according to a preferred advantage of , falling out of view of the system developers 10 point devices across a network, according to a preferred advantage of, falling out of view of the system developers aspect .
The following non - limiting summary of the invention is 30 The following non-limiting summary of the invention is provided for clarity , and should be construed consistently The inventor has conceived , and reduced to practice , a The inventor has conceived, and reduced to practice, a provided for clarity, and should be construed consistently with embodiments described in the detailed description system and methods for sandboxed malware analysis and system and methods for sandboxed malware analysis and with embodiments described in the detailed description automated patch development , deployment and validation .
One or more transformational filters, which It is also likely that that during times of heavy reporting from a moderate to large array of sensors , the instantaneous 10 include but a not limited to : mean , median , variance , stan 10 include but a not limited to: mean, median, variance, stan- from a moderate to large array of sensors, the instantaneous dard deviation , standard linear interpolation , or Kalman load of data to be committed will exceed what can be dard deviation, standard linear interpolation, or Kalman load of data to be committed will exceed what can be reliably transferred over a single swimlane .
The embodiment uses a key-value pair data store examples of which are Riak , Redis and Berkeley DB for which is application driven through the use of the Scala / Lift which is application driven through the use of the Scala/Lift examples of which are Riak, Redis and Berkeley DB for their low overhead and speed , although the invention is not development environment and web interaction operation development environment and web interaction operation their low overhead and speed, although the invention is not specifically tied to a single data store type to the exclusion 25 mediated by AWS ELASTIC BEANSTALKTM , both used 25 mediated by AWS ELASTIC BEANSTALKTM, both used specifically tied to a single data store type to the exclusion for standards compliance and ease of development .