| 11194906 |
Automated threat alert triage via data provenance |
Ding Li, Kangkook Jee, Zhengzhang Chen, Wajih Ul Hassan |
2021-12-07 |
| 11030157 |
Template based data reduction for commercial data mining |
Ding Li, Kangkook Jee, Mu Zhang, Zhenyu Wu |
2021-06-08 |
| 11030308 |
Inter-application dependency analysis for improving computer system threat detection |
Ding Li, Kangkook Jee, Zhengzhang Chen, LuAn Tang |
2021-06-08 |
| 10929539 |
Automated software safeness categorization with installation lineage and hybrid information sources |
Jungwhan Rhee, Zhenyu Wu, Lauri Korts-Parn, Kangkook Jee, Omid Setayeshfar |
2021-02-23 |
| 10931635 |
Host behavior and network analytics based automotive secure gateway |
Junghwan Rhee, Hongyu Li, Shuai Hao, Chung Hwan Kim, Zhenyu Wu +2 more |
2021-02-23 |
| 10915625 |
Graph model for alert interpretation in enterprise security system |
LuAn Tang, Zhengzhang Chen, Zhenyu Wu, Jumpei Kamimura, Haifeng Chen |
2021-02-09 |
| 10915626 |
Graph model for alert interpretation in enterprise security system |
LuAn Tang, Zhengzhang Chen, Zhenyu Wu, Jumpei Kamimura, Haifeng Chen |
2021-02-09 |
| 10909242 |
System and method for detecting security risks in a computer system |
Ding Li, Xusheng Xiao, Guofei Jiang, Peng Gao |
2021-02-02 |
| 10885027 |
Progressive processing for querying system behavior |
Xusheng Xiao, Mu Zhang, Guofei Jiang, Jiaping Gui |
2021-01-05 |
| 10885185 |
Graph model for alert interpretation in enterprise security system |
LuAn Tang, Zhengzhang Chen, Zhenyu Wu, Jumpei Kamimura, Haifeng Chen |
2021-01-05 |