| 12120140 |
Detecting threats against computing resources based on user behavior changes |
Harish Kumar Bharat Singh, Murat Bog, Yijou Chen |
2024-10-15 |
| 12034750 |
Tracking of user login sessions |
Murat Bog, Samuel Joseph Pullara, III, Yijou Chen, Harish Kumar Bharat Singh |
2024-07-09 |
| 12032634 |
Graph reclustering based on different clustering criteria |
Yijou Chen, Harish Kumar Bharat Singh, Murat Bog |
2024-07-09 |
| 11991198 |
User-specific data-driven network security |
Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2024-05-21 |
| 11979422 |
Elastic privileges in a secure access service edge |
Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2024-05-07 |
| 11954130 |
Alerting based on pod communication-based logical graph |
Yijou Chen, Harish Kumar Bharat Singh, Murat Bog |
2024-04-09 |
| 11916947 |
Generating user-specific polygraphs for network activity |
Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2024-02-27 |
| 11909752 |
Detecting deviations from typical user behavior |
Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2024-02-20 |
| 11895135 |
Detecting anomalous behavior of a device |
Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2024-02-06 |
| 11882141 |
Graph-based query composition for monitoring an environment |
Yijou Chen, Sanjay Kalra |
2024-01-23 |