| 10089469 |
Systems and methods for whitelisting file clusters in connection with trusted software packages |
Kevin Roundy |
2018-10-02 |
| 10073983 |
Systems and methods for identifying suspicious singleton files using correlational predictors |
Bo Li, Kevin Roundy |
2018-09-11 |
| 10055586 |
Systems and methods for determining the trustworthiness of files within organizations |
Kevin Roundy, Sandeep Bhatkar, Anand Kashyap, Yin-Chen Liu, Aleatha Parker-Wood +1 more |
2018-08-21 |
| 10057274 |
Systems and methods for profiling client systems |
Kevin Roundy, Leylya Bilge |
2018-08-21 |
| 10025937 |
Practical and dynamic approach to enterprise hardening |
Anand Kashyap, Kevin Roundy, Sandeep Bhatkar, Aleatha Parker-Wood, Yin-Chen Liu +1 more |
2018-07-17 |
| 10003606 |
Systems and methods for detecting security threats |
Kevin Roundy, Michael Hart |
2018-06-19 |
| 9998480 |
Systems and methods for predicting security threats |
Yining Wang, Nikolaos Vasiloglou, Kevin Roundy, Michael Hart |
2018-06-12 |
| 9959407 |
Systems and methods for identifying potentially malicious singleton files |
Bo Li, Kevin Roundy |
2018-05-01 |
| 9948663 |
Systems and methods for predicting security threat attacks |
Yining Wang, Kevin Roundy, Nikolaos Vasiloglou |
2018-04-17 |