Search

Scott J Brunza

from Old Lyme, CT
Age ~49

Scott Brunza Phones & Addresses

  • 51 Flat Rock Hill Rd, Old Lyme, CT 06371 (860) 434-3353
  • 28 Spring Glen Rd, Niantic, CT 06357 (860) 739-3313
  • 12 Cove Hill Rd, Niantic, CT 06357 (860) 739-3313
  • 21 Raymond St, New London, CT 06320 (860) 444-1423
  • 43 South Rd, Groton, CT 06340 (860) 448-1310
  • 28 Spring Rock Rd, East Lyme, CT 06333 (860) 739-3313
  • New Brunswick, NJ
  • Great River, NY

Work

Position: Professional/Technical

Education

Degree: Associate degree or higher

Professional Records

Lawyers & Attorneys

Scott Brunza Photo 1

Scott Brunza

Business Records

Name / Title
Company / Classification
Phones & Addresses
Scott Brunza
FOUNDER
GREEN MONKEY, LLC
360 Old Colchester Rd, Amston, CT 06231
28 Spg Gln Rd, Niantic, CT 06357
Scott Brunza
Founder, Principal
TESSERA COMPUTING, LLC
Business Services at Non-Commercial Site · Nonclassifiable Establishments
29 Charter Oak Dr, East Lyme, CT 06333
51 Flt Rock Hl Rd, Old Lyme, CT 06371

Publications

Us Patents

System And Method For Privacy-Enhanced Cyber Data Fusion Using Temporal-Behavioral Aggregation And Analysis

View page
US Patent:
20120072983, Mar 22, 2012
Filed:
Sep 20, 2010
Appl. No.:
12/885723
Inventors:
Owen McCUSKER - East Lyme CT, US
Scott BRUNZA - Old Lyme CT, US
Assignee:
Sonalysts, Inc. - Waterford CT
International Classification:
G06F 11/00
US Classification:
726 22
Abstract:
A method of determining, within a deployed environment over a data communication network, network threats and their associated behaviors. The method includes the steps of acquiring sensor data that identifies a specific contact, normalizing the acquired sensor data to generate transformed sensor data, deriving, for the specific contact from the transformed sensor data, a contact behavior feature vector for each of a plurality of time periods, determining, for the specific contact, scores associated with each of a plurality of classification modules to form a contact score vector, the contact score vector being independent of an identity of the specific contact, identifying a type of the specific contact based on the contact score vector, and determining a threat type, based on the contact behavioral profile and the contact score vector, when the specific contact is determined to be a threat in the identifying step.
Scott J Brunza from Old Lyme, CT, age ~49 Get Report