CPC G16H 50/20 (2018.01) [G06F 21/554 (2013.01); G06N 20/00 (2019.01); G16H 50/70 (2018.01)] | 20 Claims |
1. A method comprising:
receiving an identifier of a computer system security event;
sequentially processing a plurality of inquiries, wherein subsequent inquiries in the plurality of inquiries are selected and processed based on responses to earlier inquiries in the plurality of inquiries;
storing indications of (i) the plurality of inquiries processed and (ii) responses received to the plurality of inquiries into a tensor;
determining, with a machine learning model, that the tensor identifies a potential computer system security breach; and
generating an intervention for the potential computer system security breach.
|