| 10797974 |
Enterprise server behavior profiling |
Paul Giura, Stanislav Nurilov, Makonnen Sankore |
2020-10-06 |
| 10516595 |
Managing large volumes of event data records |
Daniel Sheleheda, Samuel Alexander, John H. Hardenbergh, Joseph Harten, James Pace |
2019-12-24 |
| 10367704 |
Enterprise server behavior profiling |
Paul Giura, Stanislav Nurilov, Makonnen Sankore |
2019-07-30 |
| 10103964 |
Managing large volumes of event data records |
Daniel Sheleheda, Samuel Alexander, John H. Hardenbergh, Joseph Harten, James Pace |
2018-10-16 |
| 9444836 |
Modeling and outlier detection in threat management system data |
Jeremy Huntley Wright, John Hogoboom |
2016-09-13 |
| 9276949 |
Modeling and outlier detection in threat management system data |
Jeremy Huntley Wright, John Hogoboom |
2016-03-01 |
| 9055012 |
Bot-network detection based on simple mail transfer protocol (SMTP) characteristics of e-mail senders within IP address aggregates |
Willa Ehrlich, David Hoeflin, Danielle Liu, Stephen Wood |
2015-06-09 |
| 8528088 |
Modeling and outlier detection in threat management system data |
Jeremy Huntley Wright, John Hogoboom |
2013-09-03 |
| 8516104 |
Method and apparatus for detecting anomalies in aggregated traffic volume data |
Danielle Liu |
2013-08-20 |
| 8516573 |
Method and apparatus for port scan detection in a network |
Philip E. Brown, Jeanette LaRosa |
2013-08-20 |
| 8438638 |
Bot-network detection based on simple mail transfer protocol (SMTP) characteristics of e-mail senders within IP address aggregates |
Willa Ehrlich, David Hoeflin, Danielle Liu, Stephen Wood |
2013-05-07 |
| 8117655 |
Detecting anomalous web proxy activity |
— |
2012-02-14 |
| 7920542 |
Method and apparatus for providing secure voice/multimedia communications over internet protocol |
Harbir S. Brar, Koan S. Chong, Kevin B. Kealy, William Todd Marshall, Israel Rosencrantz +1 more |
2011-04-05 |
| 7661136 |
Detecting anomalous web proxy activity |
— |
2010-02-09 |
| 7639621 |
Method and apparatus for analyzing source internet protocol activity in a network |
Jeanette LaRosa |
2009-12-29 |