| 10777093 |
Automated execution and evaluation of network-based training exercises |
Stephen K. Brueckner, Haim Yehuda Bar, Matthew Donovan |
2020-09-15 |
| 10068493 |
Automated execution and evaluation of network-based training exercises |
Stephen K. Brueckner, Haim Yehuda Bar, Matthew Donovan |
2018-09-04 |
| 9384677 |
Automated execution and evaluation of network-based training exercises |
Stephen K. Brueckner, Haim Yehuda Bar, Matthew Donovan |
2016-07-05 |
| 9076342 |
Automated execution and evaluation of network-based training exercises |
Stephen K. Brueckner, Haim Yehuda Bar, Matthew Donovan |
2015-07-07 |
| 8862803 |
Mediating communciation of a univeral serial bus device |
Judson Powers, Matthew Donovan, Michael Joseph Kentley, Stephen K. Brueckner |
2014-10-14 |
| 8474047 |
Remote collection of computer forensic evidence |
Matthew A. Stillerman, Robert A. Joyce |
2013-06-25 |
| 8458805 |
Digital forensic analysis using empirical privilege profiling (EPP) for filtering collected data |
Carla Marceau |
2013-06-04 |
| 8286249 |
Attack correlation using marked information |
Haim Yehuda Bar, Prasanth Alla, Nikita Proskourine |
2012-10-09 |
| 8176557 |
Remote collection of computer forensic evidence |
Matthew A. Stillerman, Robert A. Joyce |
2012-05-08 |
| 7886049 |
Extensible software tool for investigating peer-to-peer usage on a target device |
Judson Powers, Robert A. Joyce, Derek P. Bronner |
2011-02-08 |
| 7748040 |
Attack correlation using marked information |
Haim Yehuda Bar, Prasanth Alla, Nikita Proskourine |
2010-06-29 |
| 7496959 |
Remote collection of computer forensic evidence |
Matthew A. Stillerman, Robert A. Joyce |
2009-02-24 |