| 10455085 |
Systems and methods for real-time scam protection on phones |
Mahmood Sharif, Acar Tamersoy |
2019-10-22 |
| 10452841 |
Modeling malicious behavior that occurs in the absence of users |
Acar Tamersoy, Sandeep Bhatkar, Daniel Marino |
2019-10-22 |
| 10341377 |
Systems and methods for categorizing security incidents |
Matteo Dell'Amico, Chris Gates, Michael Hart |
2019-07-02 |
| 10313379 |
Systems and methods for making security-related predictions |
Yufei Han, Michael Hart, Christopher Gates |
2019-06-04 |
| 10284564 |
Systems and methods for dynamically validating remote requests within enterprise networks |
Christopher Gates, Petrus Johannes Viljoen |
2019-05-07 |
| 10262137 |
Security recommendations based on incidents of malware |
Michael Hart, Shang-Tse Chen, Christopher Gates |
2019-04-16 |
| 10242201 |
Systems and methods for predicting security incidents triggered by security software |
Shang-Tse Chen, Chris Gates, Yufei Han, Michael Hart |
2019-03-26 |
| 10242187 |
Systems and methods for providing integrated security management |
Matteo Dell'Amico, Chris Gates, Michael Hart, Stanislav Miskovic |
2019-03-26 |
| 10200395 |
Systems and methods for automated whitelisting of files |
Christopher Gates |
2019-02-05 |
| 10200369 |
Systems and methods for dynamically validating remote requests within enterprise networks |
Christopher Gates, Petrus Johannes Viljoen |
2019-02-05 |
| 10169584 |
Systems and methods for identifying non-malicious files on computing devices within organizations |
Sandeep Bhatkar, Aleatha Parker-Wood, Yin-Chen Liu, Anand Kashyap, Leylya Yumer +1 more |
2019-01-01 |