| 11178151 |
Decentralized database identity management system |
Kapil Kumar Singh, Ashish Kundu, Sridhar R. Muppidi, Dong Su |
2021-11-16 |
| 11171946 |
Two-level sequence learning for analyzing, metering, generating, and cracking passwords |
Taesung Lee, Ian M. Molloy, Youngja Park |
2021-11-09 |
| 11159547 |
Malware clustering approaches based on cognitive computing techniques |
Heqing Huang, Taesung Lee, Youngja Park |
2021-10-26 |
| 10984322 |
Estimating asset sensitivity using information associated with users |
Christopher Gates, Stephen C. Gates, Youngja Park, Wilfried Teiken |
2021-04-20 |
| 10984323 |
Estimating asset sensitivity using information associated with users |
Christopher Gates, Stephen C. Gates, Youngja Park, Wilfried Teiken |
2021-04-20 |
| 10979452 |
Blockchain-based malware containment in a network resource |
Ashish Kundu, Abhishek Malvankar |
2021-04-13 |
| 10944560 |
Privacy-preserving identity asset exchange |
Hasini Gunasinghe, Ashish Kundu, Kapil Kumar Singh, Dong Su |
2021-03-09 |
| 10902121 |
Policy-based detection of anomalous control and data flow paths in an application program |
Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis |
2021-01-26 |
| 10904246 |
Single channel input multi-factor authentication via separate processing pathways |
Zhongshu Gu, Heqing Huang, Dimitrios Pendarakis |
2021-01-26 |
| 10891371 |
Detecting malicious user activity |
Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken |
2021-01-12 |