| 11184374 |
Endpoint inter-process activity extraction and pattern matching |
Xiaokui Shu, Zhongshu Gu, Heqing Huang, Jialong Zhang |
2021-11-23 |
| 11163878 |
Integrity, theft protection and cyber deception using a deception-based filesystem |
Frederico Araujo, Douglas Lee Schales, Teryl Paul Taylor |
2021-11-02 |
| 11144642 |
Deactivating evasive malware |
Zhongshu Gu, Heqing Huang, Jiyong Jang, Dhilung Hang Kirat, Xiaokui Shu +1 more |
2021-10-12 |
| 11089040 |
Cognitive analysis of security data with signal flow-based graph exploration |
Jiyong Jang, Dhilung Hang Kirat, Youngja Park |
2021-08-10 |
| 11082434 |
Inferring temporal relationships for cybersecurity events |
Preeti Ravindra, Youngja Park, Dhilung Hang Kirat, Jiyong Jang |
2021-08-03 |
| 11032251 |
AI-powered cyber data concealment and targeted mission execution |
Dhilung Hang Kirat, Jiyong Jang |
2021-06-08 |
| 11025656 |
Automatic categorization of IDPS signatures from multiple different IDPS systems |
Xin Hu, Jiyong Jang, Douglas Lee Schales, Ting Wang |
2021-06-01 |
| 10979453 |
Cyber-deception using network port projection |
Frederico Araujo, Douglas Lee Schales, Teryl Paul Taylor |
2021-04-13 |
| 10958672 |
Cognitive offense analysis using contextual data and knowledge graphs |
William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Youngja Park +1 more |
2021-03-23 |
| 10956566 |
Multi-point causality tracking in cyber incident reasoning |
Xiaokui Shu, Douglas Lee Schales |
2021-03-23 |
| 10887323 |
Detecting malicious beaconing communities using lockstep detection and co-occurrence graph |
Jiyong Jang, Dhilung Hang Kirat, Bum Jun Kwon, Douglas Lee Schales |
2021-01-05 |
| 10887346 |
Application-level sandboxing |
Frederico Araujo, Douglas Lee Schales, Teryl Paul Taylor |
2021-01-05 |