| 11711390 |
Techniques for data routing and management using risk classification and data sampling |
Christopher M. Anderson, Katharine Nicole Harrison, Matthew Ryan Jezorek, Jon Arron McClintock, Tushaar Sethi |
2023-07-25 |
| 11310251 |
Techniques for data routing and management using risk classification and data sampling |
Christopher M. Anderson, Katharine Nicole Harrison, Matthew Ryan Jezorek, Jon Arron McClintock, Tushaar Sethi |
2022-04-19 |
| 10728272 |
Risk scoring in a connected graph |
Danial Muhammad Ranjha, Jon Arron McClintock, Tushaar Sethi |
2020-07-28 |
| 10560338 |
Event-based data path detection |
Jon Arron McClintock, Dominique Imjya Brezinski, Tushaar Sethi |
2020-02-11 |
| 10511619 |
Techniques for data routing and management using risk classification and data sampling |
Christopher M. Anderson, Katharine Nicole Harrison, Matthew Ryan Jezorek, Jon Arron McClintock, Tushaar Sethi |
2019-12-17 |
| 10467423 |
Static analysis-based tracking of data in access-controlled systems |
Jon Arron McClintock, Tushaar Sethi |
2019-11-05 |
| 10187362 |
Secure streamlined provisioning of remote access terminals |
Jon Arron McClintock, John Clark Coonley Duksta, Katharine Nicole Harrison, Matthew Ryan Jezorek, Brian Lee |
2019-01-22 |
| 10114960 |
Identifying sensitive data writes to data stores |
Jon Arron McClintock, Tushaar Sethi |
2018-10-30 |
| 9960975 |
Analyzing distributed datasets |
Matthew Ryan Jezorek |
2018-05-01 |
| 9838260 |
Event-based data path detection |
Jon Arron McClintock, Dominique Imjya Brezinski, Tushaar Sethi |
2017-12-05 |
| 9756058 |
Detecting network attacks based on network requests |
Matthew Ryan Jezorek, Richie Lai |
2017-09-05 |
| 9661011 |
Techniques for data routing and management using risk classification and data sampling |
Christopher M. Anderson, Katharine Nicole Harrison, Matthew Ryan Jezorek, Jon Arron McClintock, Tushaar Sethi |
2017-05-23 |
| 9473516 |
Detecting network attacks based on a hash |
Matthew Ryan Jezorek, Richie Lai |
2016-10-18 |
| 9426171 |
Detecting network attacks based on network records |
Matthew Ryan Jezorek, Richie Lai |
2016-08-23 |
| 8966659 |
Automatic fraudulent digital certificate detection |
Muhammad Umar Janjua, Yogesh A. Mehta, Anooshiravan Saboori, Nelly Porter, Vassil Dimitrov Bakalov +1 more |
2015-02-24 |