Issued Patents All Time
Showing 51–75 of 86 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8375447 | System and method for monitoring network traffic | Edward G. Amoroso, Albert Greenberg | 2013-02-12 |
| 8307431 | Method and apparatus for identifying phishing websites in network traffic using generated regular expressions | Oliver Spatscheck, Jacobus Van der Merwe, Anirudh Ramachandran | 2012-11-06 |
| 8161155 | Filtering unwanted data traffic via a per-customer blacklist | Jacobus Van der Merwe, Karim El Defrawy | 2012-04-17 |
| 8156556 | Method and apparatus for providing mobile honeypots | — | 2012-04-10 |
| 8141150 | Method and apparatus for automatic identification of phishing sites from low-level network traffic | — | 2012-03-20 |
| 8098686 | Method and apparatus for providing an application-level utility metric | Oliver Spatscheck | 2012-01-17 |
| 8091131 | Method and apparatus for communicating intrusion-related information between internet service providers | — | 2012-01-03 |
| 8069150 | Method and apparatus for improving end to end performance of a data network | Edith Cohen, Jennifer Lynn Rexford | 2011-11-29 |
| 7979413 | Automatic generation of embedded signatures for duplicate detection on a public network | Saurabh Kumar, Lakshminarayanan Subramanian | 2011-07-12 |
| 7933745 | System and method for profiling resource constraints of web servers | Srinivasa Aditya Akella, Pratap Ramamurthy, Vyas Sekar, Anees A. Shaikh | 2011-04-26 |
| 7916664 | Reverse engineering peering at Internet exchange point | Walter Willinger, Brice Augustin | 2011-03-29 |
| 7751325 | Method and apparatus for sketch-based detection of changes in network traffic | Subhabrata Sen, Yin Zhang, Yan Chen | 2010-07-06 |
| 7742409 | Method and apparatus for compensating for performance degradation of an application session | Jia Wang | 2010-06-22 |
| 7657735 | System and method for monitoring network traffic | Edward G. Amoroso, Albert Greenberg | 2010-02-02 |
| 7657553 | Method and apparatus for improving end to end performance of a data network | Edith Cohen, Jennifer Lynn Rexford | 2010-02-02 |
| 7627691 | Method for fast network-aware clustering | Adam Louis Buchsbaum, Glenn Stephen Fowler, Jia Wang | 2009-12-01 |
| 7296089 | Method for improving web performance by adapting servers based on client cluster characterization | Craig Ellis Wills | 2007-11-13 |
| 7219160 | Method for fast network-aware clustering | Adam Louis Buchsbaum, Glenn Stephen Fowler, Jia Wang | 2007-05-15 |
| 7191168 | Fast prefix matching of bounded strings | Adam Louis Buchsbaum, Glenn Stephen Fowler, Kiem-Phong Vo, Jia Wang | 2007-03-13 |
| 6928485 | Method for network-aware clustering of clients in a network | Jia Wang | 2005-08-09 |
| 6912562 | Cache invalidation technique with spurious resource change indications | Michael Rabinovich | 2005-06-28 |
| 6751608 | Method and apparatus for improving end to end performance of a data network | Edith Cohen, Jennifer Lynn Rexford | 2004-06-15 |
| 6606639 | Method for effective indexing of partially dynamic documents | Guy Jacobson, Divesh Srivastava | 2003-08-12 |
| 6578113 | Method for cache validation for proxy caches | Craig Ellis Wills | 2003-06-10 |
| 6434573 | Method for effective indexing of partially dynamic documents | Guy Jacobson, Divesh Srivastava | 2002-08-13 |