SG10201902109RA
|
|
Systems and methods for customizable authentication and/or authorisation of access to resources
|
SG10201706797SA
|
|
System and method for determining a location of a mobile device based on audio localization techniques
|
SG11201710238QA
|
|
Autonomic incident triage prioritization by performance modifier and temporal decay parameters
|
SG11201804586PA
|
|
A geolocating system for a mobile device
|
US2019095618A1
|
|
Quantitative unified analytic neural networks
|
WO2017192099A1
|
|
Parallelism and n-tiering of knowledge inference and statistical correlation system
|
AU2016402550A1
|
|
System and method for threat incidents corroboration in discrete temporal reference using 3D abstract modelling
|
AU2016393663A1
|
|
Method and system for compression and optimization of in-line and in-transit information security data
|
SG11201604311TA
|
|
System and method for 3d abstract object modelling of high entropic information security threats
|
SG10201507051WA
|
|
System and method for high frequency heuristic data acquisition and analytics of information security events
|
CN106663169A
|
|
System and method for high speed threat intelligence management using unsupervised machine learning and prioritization algorithms
|
EP3108614A1
|
|
System and method for information security threat disruption via a border gateway
|
SG10201401426PA
|
|
A system and method for monitoring performance of a driver of a vehicle
|
SG2013096227A
|
|
An integrated access control and identity management system
|
SG2013076898A
|
|
Method and system for controlling access to wireless apparatuses
|
SG2012089264A
|
|
Security monitoring device and method of monitoring a location
|
GB201414908D0
|
|
Bluetooth (RTM) pairing system, method, and apparatus
|
SG188673A1
|
|
A monitoring system
|
SG187994A1
|
|
An access control system
|
SG185143A1
|
|
A surveillance system
|