| 12355782 |
Assessing coordinated malicious behavior towards a service provider network |
Jared Sylvester, Michael Lowney, Catherine Watkins, Wayne Alan Fullen, Sameer Anil Murudkar |
2025-07-08 |
| 12149559 |
Reputation and confidence scoring for network identifiers based on network telemetry |
Wayne Alan Fullen, Patrick Collard, William Kupersanin, Michael Lowney, Jared Sylvester +8 more |
2024-11-19 |
| 10348759 |
Threat detection and mitigation through run-time introspection and instrumentation |
Hassan Sultan, Donald L. Bailey, Gregory Branchek Roth, Nachiketh Rao Potlapally |
2019-07-09 |
| 9876815 |
Threat detection and mitigation through run-time introspection and instrumentation |
Hassan Sultan, Donald L. Bailey, Gregory Branchek Roth, Nachiketh Rao Potlapally |
2018-01-23 |
| 9471354 |
Determining provenance of virtual machine images |
— |
2016-10-18 |
| 9438618 |
Threat detection and mitigation through run-time introspection and instrumentation |
Hassan Sultan, Donald L. Bailey, Gregory Branchek Roth, Nachiketh Rao Potlapally |
2016-09-06 |