| 12256222 |
Apparatuses and methods for identifying suspicious activities in one or more portions of a network or system and techniques for alerting and initiating actions from subscribers and operators |
Joseph Golan |
2025-03-18 |
| 11677643 |
Traffic classification of elephant and mice data flows in managing data networks |
Carolyn Roche Johnson, Swapna Buccapatnam Tirumala, Fei Wu, Kathleen Meier-Hellstern, Brian Freeman +4 more |
2023-06-13 |
| 11641510 |
Facilitation of video session optimization for 5G or other next generation network |
Joseph Golan |
2023-05-02 |
| 11625264 |
Increasing blade utilization in a dynamic virtual environment |
Eric Rosenberg |
2023-04-11 |
| 11533246 |
Network probe placement optimization |
Kevin D'Souza |
2022-12-20 |
| 11381594 |
Denial of service detection and mitigation in a multi-access edge computing environment |
Yaron Koral, Arun Jotshi, Ashwin Sridharan |
2022-07-05 |
| 11275604 |
Increasing blade utilization in a dynamic virtual environment |
Eric Rosenberg |
2022-03-15 |
| 10966121 |
Centralized management of wireless relay node equipment in a fifth generation (5G) or other next generation networks |
Shweta Vachhani, Tzuu-Yi Wang, Steven A. Monetti, Kenichi Futamura, Simon Tse +1 more |
2021-03-30 |
| 10620987 |
Increasing blade utilization in a dynamic virtual environment |
Eric Rosenberg |
2020-04-14 |