| 12423441 |
Method for using generative large language models (LLM) for cybersecurity deception and honeypots |
Hugo Latapie, Blake Harrell Anderson |
2025-09-23 |
| 12375505 |
Endpoint-assisted inspection of encrypted network traffic |
Martin Rehak, Blake Harrell Anderson, Scott William Dunlop |
2025-07-29 |
| 12348386 |
Automatically detecting authorized remote administration sessions in a network monitoring system |
Martin Rehak, Blake Harrell Anderson, Sunil Amin |
2025-07-01 |
| 12335279 |
Blocking and alerting with domain fronting intelligence |
Blake Harrell Anderson |
2025-06-17 |
| 12301593 |
Associating a user identifier detected from web traffic with a client address |
Blake Harrell Anderson, Ivan Nikolaev |
2025-05-13 |
| 12254123 |
Using a trust anchor to verify an identity of an ASIC |
Chirag Shroff |
2025-03-18 |
| 12244640 |
Automatic retraining of machine learning models to detect DDoS attacks |
K. Tirumaleswar Reddy, Daniel G. Wing, Blake Harrell Anderson |
2025-03-04 |
| 12238014 |
Identifying unmanaged cloud resources with endpoint and network logs |
Blake Harrell Anderson, Andrew Chi, Saran Singh Ahluwalia |
2025-02-25 |