| 9497163 |
Identifying malicious devices within a computer network |
Oskar Ibatullin, Kyle Adams |
2016-11-15 |
| 9485276 |
Dynamic service handling using a honeypot |
Oskar Ibatullin, Bryan Burns, Oliver Tavakoli, Robert W. Cameron |
2016-11-01 |
| 9477457 |
Automated software installation using a click area prediction model |
Jacob Asher Langton, Kyle Adams |
2016-10-25 |
| 9477837 |
Configuring a sandbox environment for malware testing |
Jacob Asher Langton, Kyle Adams, Zhenxin Zhan |
2016-10-25 |
| 9413782 |
Malware detection using internal malware detection operations |
Kyle Adams |
2016-08-09 |
| 9411959 |
Identifying an evasive malicious object based on a behavior delta |
Kyle Adams |
2016-08-09 |
| 9392018 |
Limiting the efficacy of a denial of service attack by increasing client resource demands |
Kyle Adams |
2016-07-12 |
| 9386104 |
Preventing extraction of secret information over a compromised encrypted connection |
Kyle Adams |
2016-07-05 |
| 9367685 |
Dynamically optimizing performance of a security appliance |
Jacob Asher Langton |
2016-06-14 |
| 9258328 |
Identifying malicious devices within a computer network |
Oskar Ibatullin, Kyle Adams |
2016-02-09 |