| 9412066 |
Systems and methods for predicting optimum run times for software samples |
— |
2016-08-09 |
| 9385869 |
Systems and methods for trusting digitally signed files in the absence of verifiable signature conditions |
Christopher Peterson |
2016-07-05 |
| 9373080 |
Using historical accuracy of user decision making to improve accuracy of predictive modeling based automatic classification |
— |
2016-06-21 |
| 9361460 |
Detecting malware through package behavior |
— |
2016-06-07 |
| 9330258 |
Systems and methods for identifying uniform resource locators that link to potentially malicious resources |
Jingjing Ren |
2016-05-03 |
| 9332033 |
Methods and systems for enabling community-tested security features for legacy applications |
William E. Sobel |
2016-05-03 |
| 9323924 |
Systems and methods for establishing reputations of files |
Kevin Roundy, Acar Tamersoy |
2016-04-26 |
| 9323930 |
Systems and methods for reporting security vulnerabilities |
— |
2016-04-26 |
| 9276947 |
Identifying misuse of legitimate objects |
— |
2016-03-01 |
| 9246931 |
Communication-based reputation system |
Carey Nachenberg |
2016-01-26 |
| 9246887 |
Method and apparatus for securing confidential data for a user in a computer |
Brian Hernacki |
2016-01-26 |
| 9245123 |
Systems and methods for identifying malicious files |
— |
2016-01-26 |
| 9235390 |
Application optimization for use based on feature popularity |
Brian Hernacki |
2016-01-12 |
| 9230105 |
Detecting malicious tampering of web forms |
Abubakar Wawda |
2016-01-05 |
| 9231969 |
Determining file risk based on security reputation of associated objects |
— |
2016-01-05 |
| 9230115 |
Educating computer users concerning security threats |
— |
2016-01-05 |