| 12069083 |
Assessing security risks of users in a computing network |
Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Jeff Losapio, Kurt Wescoe, Jason Brubaker +1 more |
2024-08-20 |
| 11659004 |
Networking flow logs for multi-tenant environments |
Rajat Banerjee, Aniket Deepak Divecha, John Robert Kerl, Mingxue Zhao, Shuai Ye +1 more |
2023-05-23 |
| 11310261 |
Assessing security risks of users in a computing network |
Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Jeff Losapio, Kurt Wescoe, Jason Brubaker +1 more |
2022-04-19 |
| 10749887 |
Assessing security risks of users in a computing network |
Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Jeff Losapio, Kurt Wescoe, Jason Brubaker +1 more |
2020-08-18 |
| 10469536 |
Networking flow logs for multi-tenant environments |
Rajat Banerjee, Aniket Deepak Divecha, John Robert Kerl, Mingxue Zhao, Shuai Ye +1 more |
2019-11-05 |
| 10187427 |
Networking flow logs for multi-tenant environments |
Rajat Banerjee, Aniket Deepak Divecha, John Robert Kerl, Mingxue Zhao, Shuai Ye +1 more |
2019-01-22 |
| 9667656 |
Networking flow logs for multi-tenant environments |
Rajat Banerjee, Aniket Deepak Divecha, John Robert Kerl, Mingxue Zhao, Shuai Ye +1 more |
2017-05-30 |
| 8782796 |
Data exfiltration attack simulation technology |
Trevor T. Hawthorn, Jeffrey LoSapio |
2014-07-15 |