Issued Patents All Time
Showing 26–50 of 76 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11494295 | Automated software bug discovery and assessment | Joseph Sirianni, Paul Nicotera, Eric Chartier | 2022-11-08 |
| 11461477 | Obfuscation for high-performance computing systems | Robert A. Joyce, Scott Aloisio, Matthew A. Stillerman | 2022-10-04 |
| 11451581 | Systems and methods for malware detection and mitigation | Joseph Sirianni, Robert A. Joyce | 2022-09-20 |
| 11451577 | System and method for improving training program efficiency | Matthew Donovan | 2022-09-20 |
| 11444974 | Systems and methods for cyber-physical threat modeling | Martiros Shakhzadyan, Matthew A. Stillerman | 2022-09-13 |
| 11429713 | Artificial intelligence modeling for cyber-attack simulation protocols | Matthew Donovan, Paul Nicotera, Dahyun Hollister, Robert A. Joyce | 2022-08-30 |
| 11403405 | Portable vulnerability identification tool for embedded non-IP devices | Matthew Donovan, Scott Aloisio | 2022-08-02 |
| 11349894 | Bandwidth-dependent media stream compression | Tyler J. Mitchell, Scott Aloisio, Matthew A. Stillerman, Valentino Felipe | 2022-05-31 |
| 11275940 | Systems and methods for used learned representations to determine terrain type | Paul Nicotera, Robert A. Joyce, Daniel McArdle | 2022-03-15 |
| 11269078 | Systems and methods for detecting global positioning system spoofing signal emitters | Joseph Sirianni | 2022-03-08 |
| 11245743 | Bandwidth dependent media stream compression | Tyler J. Mitchell, Scott Aloisio, Matthew A. Stillerman, Valentino Felipe | 2022-02-08 |
| 11181903 | Systems and methods of detecting and controlling unmanned aircraft systems | — | 2021-11-23 |
| 11048502 | Systems, devices, and methods for source code generation from binary files | Jason Hogan | 2021-06-29 |
| 11042369 | Systems and methods for modernizing and optimizing legacy source code | Colleen Kimball | 2021-06-22 |
| 11010472 | Systems and methods for signature-less endpoint protection against zero-day malware attacks | Katey Huddleston | 2021-05-18 |
| 11010495 | Systems and methods for runtime enforcement of data flow integrity | Daniel McArdle | 2021-05-18 |
| 10949338 | Automated software bug discovery and assessment | Joseph Sirianni, Paul Nicotera, Eric Chartier | 2021-03-16 |
| 10942716 | Dynamic computational acceleration using a heterogeneous hardware infrastructure | Noel E. Schmidt | 2021-03-09 |
| 10909257 | Multi-domain application execution management | Daniel James Tingstrom, Matthew Donovan | 2021-02-02 |
| 10909244 | Computer network defense training on operational networks using software agents | Matthew Donovan, Robert A. Joyce, Dahyun Hollister | 2021-02-02 |
| 10862938 | Bandwidth-dependent media stream compression | Tyler J. Mitchell, Scott Aloisio, Matthew A. Stillerman, Valentino Felipe | 2020-12-08 |
| 10817604 | Systems and methods for processing source codes to detect non-malicious faults | Colleen Kimball, Robert A. Joyce, Matthew Donovan | 2020-10-27 |
| 10812562 | Bandwidth dependent media stream compression | Tyler J. Mitchell, Scott Aloisio, Matthew A. Stillerman, Valentino Felipe | 2020-10-20 |
| 10757132 | System and method for evaluating and optimizing training effectiveness | Matthew Donovan | 2020-08-25 |
| 10749890 | Systems and methods for improving the ranking and prioritization of attack-related events | Scott Aloisio, Robert A. Joyce | 2020-08-18 |