| 9825986 |
Systems and methods for generating contextually meaningful animated visualizations of computer security events |
Sharada Sundaram, Kevin Roundy, David Luz Silva |
2017-11-21 |
| 9807094 |
Systems and methods for dynamic access control over shared resources |
Yin-Chen Liu, Kevin Roundy, Leylya Yumer, Anand Kashyap, Aleatha Parker-Wood +1 more |
2017-10-31 |
| 9798876 |
Systems and methods for creating security profiles |
Aleatha Parker-Wood, Anand Kashyap, Christopher Gates, Kevin Roundy, Leylya Yumer +1 more |
2017-10-24 |
| 9800590 |
Systems and methods for threat detection using a software program update profile |
Christopher Gates, Kevin Roundy, Anand Kashyap, Yin-Chen Liu, Aleatha Parker-Wood +1 more |
2017-10-24 |
| 9774615 |
Techniques for detecting anomalous network traffic |
Kevin Roundy, Jie Fu, Tao Cheng, Zhi Kai Li, Fanglu Guo |
2017-09-26 |
| 9754106 |
Systems and methods for classifying security events as targeted attacks |
Kevin Roundy |
2017-09-05 |
| 9686304 |
Systems and methods for healing infected document files |
Fanglu Guo, Susanta K. Nanda |
2017-06-20 |
| 9665715 |
Systems and methods for detecting malware-induced crashes |
Kevin Roundy, Fanglu Guo, Daniel Marino |
2017-05-30 |
| 9659182 |
Systems and methods for protecting data files |
Kevin Roundy, Fanglu Guo, Scott Schneider |
2017-05-23 |
| 9652616 |
Techniques for classifying non-process threats |
Kent E. Griffin, Pratyusa K. Manadhata |
2017-05-16 |