| 11539735 |
Systems and methods for application placement in a network based on host security posture |
Supreeth Rao, Prasannakumar Jobigenahally Malleshaiah, Tapan Shrikrishna Patwardhan, Umamaheswaran Arumugam, Darshan Shrinath Purandare +2 more |
2022-12-27 |
| 11528283 |
System for monitoring and managing datacenters |
Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi +17 more |
2022-12-13 |
| 11522775 |
Application monitoring prioritization |
Jackson Ngoc Ki Pang, Anubhav Gupta, Shashidhar Gandham, Supreeth Rao, Sunil Gupta |
2022-12-06 |
| 11516098 |
Round trip time (RTT) measurement based upon sequence number |
Mohammadreza Alizadeh Attar, Abhishek Ranjan Singh, Vimalkumar Jeyakumar, Shashidhar Gandham, Roberto Fernando Spadaro |
2022-11-29 |
| 11509535 |
Network agent for reporting to a network policy system |
Hai Trong Vu, Shih-Chun Chang, Varun Sagar Malhotra, Shashi Gandham, Allen Chen +2 more |
2022-11-22 |
| 11502922 |
Technologies for managing compromised sensors in virtualized environments |
Abhishek Ranjan Singh, Anubhav Gupta, Shashidhar Gandham, Jackson Ngoc Ki Pang, Shih-Chun Chang +1 more |
2022-11-15 |
| 11503063 |
Systems and methods for detecting hidden vulnerabilities in enterprise networks |
Supreeth Rao, Prasannakumar Jobigenahally Malleshaiah, Ashok Kumar, Umamaheswaran Arumugam, Darshan Shrinath Purandare +2 more |
2022-11-15 |
| 11496377 |
Anomaly detection through header field entropy |
Mohammadreza Alizadeh Attar, Shashidhar Gandham, Jackson Ngoc Ki Pang, Roberto Fernando Spadaro |
2022-11-08 |
| 11483351 |
Securing network resources from known threats |
Supreeth Rao, Tapan Shrikrishna Patwardhan, Umamaheswaran Arumugam, Darshan Shrinath Purandare, Aiyesha Ma +2 more |
2022-10-25 |
| 11477097 |
Hierarchichal sharding of flows from sensors to collectors |
Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Khawar Deen, Varun Sagar Malhotra |
2022-10-18 |
| 11463483 |
Systems and methods for determining effectiveness of network segmentation policies |
Alok Lalit Wadhwa, James Gabriel Fontenot, Ashutosh Kulshreshtha, Shashidhar Gandham, Weifei Zeng |
2022-10-04 |
| 11431592 |
System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack |
Khawar Deen, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh +1 more |
2022-08-30 |
| 11411770 |
Virtual port channel bounce in overlay network |
Kit Chiu Chu, Thomas J. Edsall, Francisco M. Matus, Krishna Doddapaneni, Satyam Sinha |
2022-08-09 |
| 11405291 |
Generate a communication graph using an application dependency mapping (ADM) pipeline |
Ali Parandehgheibi, Mohammadreza Alizadeh Attar, Vimalkumar Jeyakumar, Omid Madani, Ellen Christine Scheib |
2022-08-02 |
| 11403200 |
Provisioning resources for monitoring hosts based on defined functionalities of hosts |
Xin Liu, Sunil Gupta, Thanh Trung Ngo, Xuan Loc Bui, Hoang Viet Nguyen +1 more |
2022-08-02 |
| 11368378 |
Identifying bogon address spaces |
Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Khawar Deen, Varun Sagar Malhotra |
2022-06-21 |
| 11252038 |
Network agent for generating platform specific network policies |
Rohit Chandra Prasad, Hai Trong Vu, Shih-Chun Chang, Hoang Viet Nguyen, Shashi Gandham +4 more |
2022-02-15 |
| 11252060 |
Data center traffic analytics synchronization |
Khawar Deen, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh +1 more |
2022-02-15 |
| 11252058 |
System and method for user optimized application dependency mapping |
Omid Madani, Ali Parandehgheibi, Vimalkumar Jeyakumar, Ellen Christine Scheib, Mohammadreza Alizadeh Attar |
2022-02-15 |
| 11233821 |
Network intrusion counter-intelligence |
Shih-Chun Chang, Shashi Gandham, Xiaofei Guo, Hoang Viet Nguyen, Xin Liu +3 more |
2022-01-25 |