| 12375270 |
Quantum key distribution networking as a service |
Moshiur Rahman, William Trost, Daniel Solero |
2025-07-29 |
| 12143363 |
CANBUS cybersecurity firewall |
Steven Adams, Maureen Langevin, Christine Murphy, Toby Avino, John Liefert +2 more |
2024-11-12 |
| 11683165 |
Quantum key distribution networking as a service |
Moshiur Rahman, William Trost, Daniel Solero |
2023-06-20 |
| 10516595 |
Managing large volumes of event data records |
Samuel Alexander, John H. Hardenbergh, Joseph Harten, James Pace, Chaim Spielman |
2019-12-24 |
| 10103964 |
Managing large volumes of event data records |
Samuel Alexander, John H. Hardenbergh, Joseph Harten, James Pace, Chaim Spielman |
2018-10-16 |
| 9825973 |
Website security |
Edward G. Amoroso, Cynthia Cama, Junlan Feng, Gregory Leibolt, Sanjay Macwan +3 more |
2017-11-21 |
| 9736174 |
Method and apparatus for machine to machine network security monitoring in a communications network |
Donald J. Bowen, Cynthia Cama, Lusheng Ji |
2017-08-15 |
| 9521165 |
Method of detecting potential phishing by analyzing universal resource locators |
Junlan Feng, Valerie Torres |
2016-12-13 |
| 9450973 |
Method and apparatus for machine to machine network security monitoring in a communications network |
Donald J. Bowen, Cynthia Cama, Lusheng Ji |
2016-09-20 |
| 9286784 |
Method and apparatus for suppressing duplicate alarms |
Michael Singer |
2016-03-15 |
| 9172712 |
Method and system for improving website security |
Edward G. Amoroso, Cynthia Cama, Junlan Feng, Gregory Leibolt, Sanjay Macwan +3 more |
2015-10-27 |
| 9058487 |
Method of detecting potential phishing by analyzing universal resource locators |
Junlan Feng, Valerie Torres |
2015-06-16 |
| 8661147 |
Monitoring requested content |
Edward G. Amoroso, Cynthia Cama, Sanjay Macwan, William O'Hern |
2014-02-25 |
| 8643485 |
Method and apparatus for suppressing duplicate alarms |
Michael Singer |
2014-02-04 |
| 8626691 |
Methods, systems, and products for estimating answers to questions |
Matti Hiltunen, Robin Berthier, Michel Cukier, David Kormann, Gregory T. Vesonder |
2014-01-07 |
| 8438642 |
Method of detecting potential phishing by analyzing universal resource locators |
Junlan Feng, Valerie Torres |
2013-05-07 |
| 8248227 |
Method and apparatus for suppressing duplicate alarms |
Michael Singer |
2012-08-21 |
| 7930746 |
Method and apparatus for detecting anomalous network activities |
Michael Singer |
2011-04-19 |
| 7408458 |
Method and apparatus for suppressing duplicate alarms |
Michael Singer |
2008-08-05 |