| 10841161 |
Real-time configuration check framework |
Eugen Pritzkau, Hartwig Seifert, Kevin Schwab, Omar-Alexander Al-Hujaj, Volker Guzman +2 more |
2020-11-17 |
| 10826926 |
Pattern creation based on an attack path |
Eugen Pritzkau, Wei-Guo Peng, Omar-Alexander Al-Hujaj, Volker Guzman, Kevin Schwab |
2020-11-03 |
| 10815098 |
Multiple-state health monitoring apparatus and monitoring method for critical components in hoisting system |
Gongbo Zhou, Zhencai Zhu, Wei Li, Yuxing Peng, Guohua Cao +4 more |
2020-10-27 |
| 10747898 |
Determining privacy for a user and a product in a particular context |
Keke Cai, HongLei Guo, Zhong Su, Changhua Sun, Guoyu Tang +3 more |
2020-08-18 |
| 10681064 |
Analysis of complex relationships among information technology security-relevant entities using a network graph |
Wei-Guo Peng, Eugen Pritzkau, Hartwig Seifert, Harish Mehta, Nan Zhang +7 more |
2020-06-09 |
| 10673879 |
Snapshot of a forensic investigation for enterprise threat detection |
Florian Chrosziel, Jona Hassforther, Thomas Kunz, Harish Mehta, Rita Merkel +8 more |
2020-06-02 |
| 10654035 |
Catalyst regeneration |
Andrzej Malek, David G. Barton |
2020-05-19 |
| 10647634 |
Process for catalytic dehydrogenation |
Matthew T. Pretz |
2020-05-12 |
| 10542016 |
Location enrichment in enterprise threat detection |
Marco Rodeck, Harish Mehta, Hartwig Seifert, Thomas Kunz, Eugen Pritzkau +5 more |
2020-01-21 |
| 10536476 |
Realtime triggering framework |
Eugen Pritzkau, Kathrin Nos, Marco Rodeck, Florian Chrosziel, Jona Hassforther +8 more |
2020-01-14 |
| 10530794 |
Pattern creation in enterprise threat detection |
Eugen Pritzkau, Joscha Philipp Bohn, Daniel Kartmann, Wei-Guo Peng, Hristina Dinkova +7 more |
2020-01-07 |