| 9485271 |
Systems and methods for anomaly-based detection of compromised IT administration accounts |
Kevin Roundy, Sandeep Bhatkar |
2016-11-01 |
| 9483469 |
Techniques for optimizing disk access |
Tzi-Cker Chiueh, Nitin Suresh Supekar, Gaurav Makin |
2016-11-01 |
| 9401925 |
Systems and methods for detecting security threats based on user profiles |
Sandeep Bhatkar, Kevin Roundy |
2016-07-26 |
| 9361028 |
Systems and methods for increasing restore speeds of backups stored in deduplicated storage systems |
Weibao Wu, Satyajit Gorhe Parlikar, Yun Yang |
2016-06-07 |
| 9336224 |
Systems and methods for providing increased scalability in deduplication storage systems |
Xianbo Zhang, Weibao Wu |
2016-05-10 |
| 9330260 |
Detecting auto-start malware by checking its aggressive load point behaviors |
— |
2016-05-03 |
| 9317679 |
Systems and methods for detecting malicious documents based on component-object reuse |
Sandeep Bhatkar, Susanta K. Nanda |
2016-04-19 |
| 9298561 |
Systems and methods for prioritizing restoration speed with deduplicated backups |
Sanjay Sawhney, Weibao Wu |
2016-03-29 |
| 9275226 |
Systems and methods for detecting selective malware attacks |
Kevin Roundy, Sandeep Bhatkar |
2016-03-01 |
| 9230111 |
Systems and methods for protecting document files from macro threats |
Susanta K. Nanda, Sandeep Bhatkar |
2016-01-05 |