| 11836664 |
Enterprise network threat detection |
Karl Ackerman, Mark Russo, Andrew J. Thomas |
2023-12-05 |
| 11755974 |
Computer augmented threat evaluation |
Joshua Daniel Saxe, Andrew J. Thomas, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy |
2023-09-12 |
| 11741222 |
Sandbox environment for document preview and analysis |
Ross McKerchar, John Edward Tyrone Shaw, Andrew J. Thomas, Kenneth D. Ray, Daniel Salvatore Schiappa |
2023-08-29 |
| 11727333 |
Endpoint with remotely programmable data recorder |
Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas |
2023-08-15 |
| 11720844 |
Enterprise network threat detection |
Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas |
2023-08-08 |
| 11716351 |
Intrusion detection with honeypot keys |
Harald Schütz, Andreas Berger, Mark David Harris, Kenneth D. Ray |
2023-08-01 |
| 11550909 |
Tracking malicious software movement with an event graph |
Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith |
2023-01-10 |
| 11552962 |
Computer assisted identification of intermediate level threats |
Joshua Daniel Saxe, Andrew J. Thomas, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy |
2023-01-10 |