| 11991198 |
User-specific data-driven network security |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Theron Tock, Ying Xie +1 more |
2024-05-21 |
| 11979422 |
Elastic privileges in a secure access service edge |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Theron Tock, Ying Xie +1 more |
2024-05-07 |
| 11936663 |
System for monitoring and managing datacenters |
Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani +17 more |
2024-03-19 |
| 11916947 |
Generating user-specific polygraphs for network activity |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Theron Tock, Ying Xie +1 more |
2024-02-27 |
| 11909752 |
Detecting deviations from typical user behavior |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Theron Tock, Ying Xie +1 more |
2024-02-20 |
| 11902124 |
Round trip time (RTT) measurement based upon sequence number |
Mohammadreza Alizadeh Attar, Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Roberto Fernando Spadaro |
2024-02-13 |
| 11902120 |
Synthetic data for determining health of a network security system |
Rohit Chandra Prasad, Bharathwaj Sankara Viswanathan, Hoang Viet Nguyen, Roberto Fernando Spadaro, Varun Sagar Malhotra +1 more |
2024-02-13 |
| 11895135 |
Detecting anomalous behavior of a device |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Theron Tock, Ying Xie +1 more |
2024-02-06 |