| 12430617 |
Business email compromise detection system |
Umalatha Batchu, Torsten Zeppenfeld, Blake Darche |
2025-09-30 |
| 11949707 |
Isolating suspicious links in email messages |
Michelle H. Chen, Jeremy Eckman, Michael Flester, Shalabh Mohan, Timothy Obezuk |
2024-04-02 |
| 11861563 |
Business email compromise detection system |
Umalatha Batchu, Torsten Zeppenfeld, Blake Darche |
2024-01-02 |
| 10581883 |
In-transit visual content analysis for selective message transfer |
Michael Flester, Umalatha Batchu, Rajiv Jain |
2020-03-03 |
| 10528731 |
Detecting malicious program code using similarity of hashed parsed trees |
Torsten Zeppenfeld, Peter Stein |
2020-01-07 |
| 10419478 |
Identifying malicious messages based on received message data of the sender |
Oren Falkowitz, Michael Flester |
2019-09-17 |
| 10084815 |
Remediating computer security threats using distributed sensor computers |
Oren Falkowitz, Blake Darche |
2018-09-25 |
| 9923920 |
Detecting computer security threats in electronic documents based on structure |
Oren Falkowitz |
2018-03-20 |
| 9712557 |
Remediating computer security threats using distributed sensor computers |
Oren Falkowitz, Blake Darche |
2017-07-18 |
| 9674208 |
Detecting computer security threats in electronic documents based on structure |
Oren Falkowitz |
2017-06-06 |
| 9609013 |
Detecting computer security threats in electronic documents based on structure |
Oren Falkowitz |
2017-03-28 |
| 9374385 |
Remediating computer security threats using distributed sensor computers |
Oren Falkowitz, Blake Darche |
2016-06-21 |
| 9350757 |
Detecting computer security threats in electronic documents based on structure |
Oren Falkowitz |
2016-05-24 |
| 9124622 |
Detecting computer security threats in electronic documents based on structure |
Oren Falkowitz |
2015-09-01 |