| 9807094 |
Systems and methods for dynamic access control over shared resources |
Yin-Chen Liu, Sandeep Bhatkar, Kevin Roundy, Leylya Yumer, Aleatha Parker-Wood +1 more |
2017-10-31 |
| 9798876 |
Systems and methods for creating security profiles |
Aleatha Parker-Wood, Christopher Gates, Kevin Roundy, Leylya Yumer, Sandeep Bhatkar +1 more |
2017-10-24 |
| 9800590 |
Systems and methods for threat detection using a software program update profile |
Christopher Gates, Kevin Roundy, Sandeep Bhatkar, Yin-Chen Liu, Aleatha Parker-Wood +1 more |
2017-10-24 |
| 9786138 |
Using the home wireless router to detect an intruder not carrying any wireless device |
Qiyan Wang |
2017-10-10 |
| 9659474 |
Automatically learning signal strengths at places of interest for wireless signal strength based physical intruder detection |
Yongjie Cai, Qiyan Wang |
2017-05-23 |
| 9652597 |
Systems and methods for detecting information leakage by an organizational insider |
Kevin Roundy |
2017-05-16 |
| 9572125 |
Systems and methods for locating unrecognized computing devices |
Qiyan Wang |
2017-02-14 |