| 11201880 |
Network attack tainting and tracking |
Ronald B. Williams |
2021-12-14 |
| 11178171 |
Security mechanism for suspicious files |
Wei-Hsiang Hsiung, Ming-Hsun Wu, Wei-Shiau Suen |
2021-11-16 |
| 11159566 |
Countering phishing attacks |
Russell Couturier, Andrii Iesiev, Iosif V. Onut |
2021-10-26 |
| 11146588 |
Context-based adaptive encryption |
Chun-Shuo Lin, Wei-Shiau Suen, Ming-Hsun Wu |
2021-10-12 |
| 11121918 |
Intelligent network management device and method of managing network |
Chih-Wen Chao, Wei-Shiau Suen, Ming-Hsun Wu |
2021-09-14 |
| 11122077 |
Identification of attack flows in a multi-tier network topology |
Chih-Hung Chou, Yin Lee, Chun-Shuo Lin |
2021-09-14 |
| 11089058 |
Context-based adaptive encryption |
Chun-Shuo Lin, Wei-Shiau Suen, Ming-Hsun Wu |
2021-08-10 |
| 11042384 |
Managing the customizing of appliances |
Chih-Wen Chao, Gregory L. Galloway, Ming-Hsun Wu, Rick MF Wu |
2021-06-22 |
| 11032073 |
Seamless abort and reinstatement of TLS sessions |
Ping Min Lin, Wei-Shiau Suen, Ming-Hsun Wu |
2021-06-08 |
| 11032268 |
System and method for providing persistent user identification |
Chih-Wen Chao, Wei-Shiau Suen, Ming-Hsun Wu |
2021-06-08 |
| 10915374 |
Method of facilitating live migration of virtual machines |
Chih-Wen Chao, Wei-Shiau Suen, Travis Wu, Lun-Pin Yuan |
2021-02-09 |