Patents by Inventor Noora Fetais

Noora Fetais has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230185925
    Abstract: A method of quantifying the satisfaction of security requirements is provided via characterizing a security feature; matching the security feature to a security metric; computing a quantification score that indicates the exploitability of a system to which the security feature is applied; and outputting the quantification score to a security analyst.
    Type: Application
    Filed: November 23, 2022
    Publication date: June 15, 2023
    Inventors: Armstrong Nhlabatsi, Khaled Khan, Jin Hong, Dong Seong Kim, Rachel Fernandez, Noora Fetais
  • Patent number: 11228616
    Abstract: A computer-implemented method for monitoring the security of a computing network which includes a plurality of hosts and a plurality of edges which link connected hosts. The method comprises capturing and storing first and second network state information at first and second times respectively. The method comprises comparing the first and second network state information to detect a change in the security of the network during the time window between the first and second times. The method further comprises storing security change data which is indicative of the change in the security of the network during the time window for a user to monitor the change in the security of the network.
    Type: Grant
    Filed: December 6, 2018
    Date of Patent: January 18, 2022
    Assignee: Qatar Foundation
    Inventors: Khaled M. Khan, Dong Seong Kim, Jin Bum Hong, Simon Enoch Yusuf, Mengmeng Ge, Huy Kang Kim, Paul Kim, Armstrong Nhlabatsi, Noora Fetais
  • Patent number: 11146583
    Abstract: The presently disclosed technology provides a threat-specific network risk evaluation tailored to a client's security objectives. The present technology may include identifying a plurality of threats to a first component of a networked system and assigning a plurality of weighting values to the plurality of threats according to the client's security objectives. The present technology may include identifying a plurality of vulnerabilities of the first component and determining a set of relevant threats for the first vulnerability based on the nature of the vulnerability and the weighting values assigned to the plurality of threats. The set of relevant threats includes one or more of the plurality of threats. The present technology may include determining a set of relevant threats for each of the identified vulnerabilities of the first component and calculating a risk of the first component based on the sets of the relevant threats.
    Type: Grant
    Filed: May 1, 2019
    Date of Patent: October 12, 2021
    Assignees: QATAR FOUNDATION FOR EDUCATION, SCIENCE AND COMMUNITY DEVELOPMENT, QATAR UNIVERSITY
    Inventors: Armstrong Nhlabatsi, Jin Hong, Dong Seong Kim, Rachael Fernandez, Alaa Hussein, Noora Fetais, Khaled M. Khan
  • Publication number: 20200351295
    Abstract: The presently disclosed technology provides a threat-specific network risk evaluation tailored to a client's security objectives. The present technology may include identifying a plurality of threats to a first component of a networked system and assigning a plurality of weighting values to the plurality of threats according to the client's security objectives. The present technology may include identifying a plurality of vulnerabilities of the first component and determining a set of relevant threats for the first vulnerability based on the nature of the vulnerability and the weighting values assigned to the plurality of threats. The set of relevant threats includes one or more of the plurality of threats. The present technology may include determining a set of relevant threats for each of the identified vulnerabilities of the first component and calculating a risk of the first component based on the sets of the relevant threats.
    Type: Application
    Filed: May 1, 2019
    Publication date: November 5, 2020
    Inventors: Armstrong Nhlabatsi, Jin Hong, Dong Seong Kim, Rachael Fernandez, Alaa Hussein, Noora Fetais, Khaled M. Khan
  • Publication number: 20190190955
    Abstract: A computer-implemented method for monitoring the security of a computing network which includes a plurality of hosts and a plurality of edges which link connected hosts. The method comprises capturing and storing first and second network state information at first and second times respectively. The method comprises comparing the first and second network state information to detect a change in the security of the network during the time window between the first and second times. The method further comprises storing security change data which is indicative of the change in the security of the network during the time window for a user to monitor the change in the security of the network.
    Type: Application
    Filed: December 6, 2018
    Publication date: June 20, 2019
    Inventors: Khaled Khan, Dong Seong Kim, Jin Bum Hong, Simon Enoch Yusuf, Mengmeng Ge, Huy Kang Kim, Paul Kim, Armstrong Nhlabatsi, Noora Fetais