Dr. Fletcher graduated from the University of North Texas College of Osteopathic Medicine in 1979. He works in Houston, TX and 1 other location and specializes in Pediatric Neurological Surgery. Dr. Fletcher is affiliated with Memorial Hermann Texas Medical Center.
Name / Title
Company / Classification
Phones & Addresses
Stephen Fletcher
RIGHT TIME MOTORS LLC
Stephen C Fletcher President,Secretary,Treasurer,Chairman
Daybreak Auto Recovery Sebastopol, CA Aug 2014 to Oct 2014 Repossession AgentA-1 Towing Lakeport, CA Dec 2011 to Sep 2014 Customer ServiceLink us Corp Ukiah, CA Mar 2009 to Dec 2011 Satellite TechnicianKmart Corporation Lakeport, CA May 2008 to Mar 2009 Pantry AssociateAaccurate Towing & Transport Silver Spring, MD Apr 1997 to Jan 2008 Transportation Manager
Education:
Mendocino College Lakeport, CA General EducationKatherine Gibbs College Vienna, VA Jun 2006 AA in Visual Communication
Oct 2013 to 2000ODYSSEY SHANKLE BUS AND COACHHyattsville, MD Jun 2013 to Oct 2013Bus Mechanic/Electric Trouble Shooter Jun 2013 to Oct 2013Heavy Duty Mechanic Feb 1984 to Jun 2013M & M FLEET Hyattsville, MD Feb 1984 to May 2013Forklift Operator/Puller Feb 1997 to Jun 1999CRAFTMANS PRESS Cheverly, MD Jan 1995 to Jan 1997 Forklift Operator/Machine OperatorDIRECT MAIL Hyattsville, MD Mar 1992 to Jan 1997DIRECT MAIL
Mar 1992 to Jan 1997 Machine Operator
Education:
OXON HILL HIGH SCHOOL Oxon Hill, MD 1983 Diploma
Us Patents
Deep Learning Based Detection Of Malicious Shell Scripts
- McLean VA, US Sarvani KARE - Clarksville MD, US Boshika TARA - Pleasanton CA, US Stephen FLETCHER - Arlington VA, US Patrick SOFO - Arlington VA, US
International Classification:
G06F 21/55 G06N 3/04 G06N 3/08
Abstract:
In some implementations, a system may receive a shell script associated with a computing device. The system may generate a character frequency feature vector based on the shell script. The system may input text of the shell script to a convolutional neural network (CNN) branch of a trained deep learning model. The system may input the character frequency feature vector to a feedforward neural network (FNN) branch of the trained deep learning model. The system may determine using the trained deep learning model, a respective probability score for each of a plurality of obfuscation types for the shell script based on a combined output of the CNN branch and the FNN branch. The system may detect whether the shell script is obfuscated based on the respective probability score for each of the plurality of obfuscation types determined for the shell script.
Anomaly Detection In Computing Computing System Events
- McLean VA, US Vannia Gonzalez Macias - McLean VA, US Stephen Fletcher - McLean VA, US Boshika Tara - McLean VA, US Patrick Sofo - McLean VA, US Urvish Patel - McLean VA, US
Assignee:
Capital One Services, LLC - McLean VA
International Classification:
H04L 29/06
Abstract:
Methods and systems are described herein for detecting anomalous access to system resources. An anomaly detection system may access system events from one or more computing devices and may generate entries from the system events. Each entry may include a corresponding timestamp indicating a time when a corresponding system event occurred, a corresponding user identifier indicating a user account within a computing environment associated with the corresponding system event, a corresponding location identifier indicating a location within the computing environment, and a corresponding action identifier indicating an action that the user account performed with respect to the location or an object within the computing environment. The generated entries may be aggregated and input into an anomaly detection model to obtain anomalous activity identified by the model.
Systems And Methods For Generating Term Definitions Using Recurrent Neural Networks
- McLean VA, US Stephen FLETCHER - Arlington VA, US
Assignee:
Capital One Services, LLC - McLean VA
International Classification:
G06F 40/279 G06N 3/04 G06N 3/08 G06F 40/169
Abstract:
A method of determining a definition for a term associated with a specific domain may include: receiving, via a processor, an electronic document that is associated with a specific domain, the electronic document including at least one term; determining a definition of the at least one term via a machine learning model that is trained, based on (i) a plurality of terms associated with the specific domain as training data and (ii) definitions associated with the specific domain and corresponding to the plurality of terms as ground truth, to generate an output definition associated with the specific domain in response to an input term; and transmitting a response to receiving the electronic document that includes the determined definition of the at least one term.
Computer-Based Systems Configured For Automated Computer Script Analysis And Malware Detection And Methods Thereof
Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification.
Systems And Methods Of Detecting Email-Based Attacks Through Machine Learning
A system including at least one processor; and at least one memory having stored thereon computer program code that, when executed by the at least one processor, controls the at least one processor to: receive an email addressed to a user; separate the email into a plurality of email components; analyze, using respective machine-learning techniques, each of the plurality of email components; feed the analysis of each of the plurality of email components into a stacked ensemble analyzer; and based on an output of the stacked ensemble analyzer, determine whether the email is malicious.
Systems And Methods Of Detecting Email-Based Attacks Through Machine Learning
A system including at least one processor; and at least one memory having stored thereon computer program code that, when executed by the at least one processor, controls the at least one processor to: receive an email addressed to a user; separate the email into a plurality of email components; analyze, using respective machine-learning techniques, each of the plurality of email components; feed the analysis of each of the plurality of email components into a stacked ensemble analyzer; and based on an output of the stacked ensemble analyzer, determine whether the email is malicious.
BurlingtonManager, Human Resources, Atlantic and Ontario Fac... HUMAN RESOURCES PROFESSIONAL AND BUSINESS CONSULTANT
Delivering Tailored Business Solutions, Cost Efficiencies, and Customer Relationship Management
... HUMAN RESOURCES PROFESSIONAL AND BUSINESS CONSULTANT
Delivering Tailored Business Solutions, Cost Efficiencies, and Customer Relationship Management
Results-oriented professional with over thirteen years of experience in people management and management consulting for environmental services...
dying in some capacity. Last month, two senators one Conservative, one Liberal introduced a bill to remove criminal penalties for doctors who help patients end their lives, based on a private members bill first introduced to the House of Commons last March by Conservative MP Stephen Fletcher.
16 Goals at the other end has been the Black Cats problem this term with a mere 12 in 12 games. Stephen Fletcher is top of the pops for Poyets side but he has managed to muster just four league goals to date. In sharp contrast, Diego Costa has already scored 11 league goals for the Blues
Just after the half-hour mark, Patrick Van Aanholt put a delightful cross into the Palace box, which was met by a Stephen Fletcher header that wrong-footed Speroni and crept into the near post. Sunderlands opener was against the run of play, as Palace had been bossing possession.
Date: Nov 04, 2014
Category: Sports
Source: Google
Harper's cabinet: The familiar faces, the demoted and the departed
blonczy (minister of state of foreign affairs) and Gordon OConnor (whip). Stephen Fletcher, who lost his position as minister of state for transport, said in a statement that he will run in the next election and explaining that he is out of cabinet because of a need for better gender distribution.
Date: Jul 15, 2013
Category: World
Source: Google
Number of Residents Affected by Utah Health Data Breach Hits 800K
Stephen Fletcher -- executive director of UDTS -- said it appeared that "very sophisticated" hackers used passwords to access a server, but officials are uncertain about how the hackers bypassed security (iHealthBeat, 4/9).
The information was stolen from a new server at the health department, said Stephen Fletcher, executive director of the Department of Technology Services. Although the state has multiple layers of security on every server, a technician installed a password that wasn't as secure as needed.
In investigating, officials focused first on the Medicaid claims, because they were believed to be most at risk, said technology services director Stephen Fletcher. Then it was discovered that Medicaid eligibility inquiries also were stored on the server.
Date: Apr 09, 2012
Category: Health
Source: Google
The Government CIO 50: Vision, Influence, And Results
of Defense;Michael Carleton, CIO, Health and Human Services;Aneesh Chopra, Federal CTO, White House;Brook Colangelo, CIO, White House;Casey Coleman, CIO, GSA;Regina Dugan, Director, DARPA;Stephen Fletcher, CIO, Utah;Chad Fulgham, CIO, FBI;Adrian Gardner, CIO, Goddard Space Center;Terry Hal