| 10142357 |
Systems and methods for preventing malicious network connections using correlation-based anomaly detection |
Acar Tamersoy |
2018-11-27 |
| 10091231 |
Systems and methods for detecting security blind spots |
Chris Gates, Stanislav Miskovic, Michael Hart |
2018-10-02 |
| 10089469 |
Systems and methods for whitelisting file clusters in connection with trusted software packages |
Christopher Gates |
2018-10-02 |
| 10073983 |
Systems and methods for identifying suspicious singleton files using correlational predictors |
Bo Li, Christopher Gates |
2018-09-11 |
| 10069862 |
Techniques for predicting and protecting spearphishing targets |
Sanjay Sawhney |
2018-09-04 |
| 10055586 |
Systems and methods for determining the trustworthiness of files within organizations |
Sandeep Bhatkar, Christopher Gates, Anand Kashyap, Yin-Chen Liu, Aleatha Parker-Wood +1 more |
2018-08-21 |
| 10057274 |
Systems and methods for profiling client systems |
Leylya Bilge, Christopher Gates |
2018-08-21 |
| 10025937 |
Practical and dynamic approach to enterprise hardening |
Anand Kashyap, Sandeep Bhatkar, Aleatha Parker-Wood, Christopher Gates, Yin-Chen Liu +1 more |
2018-07-17 |
| 10003606 |
Systems and methods for detecting security threats |
Michael Hart, Christopher Gates |
2018-06-19 |
| 9998480 |
Systems and methods for predicting security threats |
Christopher Gates, Yining Wang, Nikolaos Vasiloglou, Michael Hart |
2018-06-12 |
| 9959407 |
Systems and methods for identifying potentially malicious singleton files |
Bo Li, Christopher Gates |
2018-05-01 |
| 9948663 |
Systems and methods for predicting security threat attacks |
Yining Wang, Christopher Gates, Nikolaos Vasiloglou |
2018-04-17 |
| 9888024 |
Detection of security incidents with low confidence security events |
Michael Spertus |
2018-02-06 |