| 11265340 |
Exception remediation acceptable use logic platform |
Julia A. Ward, Jonathan Michael Nauss |
2022-03-01 |
| 10819731 |
Exception remediation logic rolling platform |
Julia A. Ward, Jonathan Michael Nauss |
2020-10-27 |
| 9667644 |
Risk identification |
Adam James Blake, Jennifer Ann Zuhde, Thomas Bradley |
2017-05-30 |
| 9219746 |
Risk identification based on identified parts of speech of terms in a string of terms |
Adam James Blake, Jennifer Ann Zuhde, Thomas Bradley |
2015-12-22 |
| 9172720 |
Detecting malware using revision control logs |
Alexander Foley, Ronald Read |
2015-10-27 |
| 9038187 |
Insider threat correlation tool |
Brian McHugh, Ronald Ramcharran, Timothy C. Metzger, Dan P. Antilley, Jonathan W. Deats |
2015-05-19 |
| 8799462 |
Insider threat correlation tool |
Brian McHugh, Ronald Ramcharran, Timothy C. Metzger, Dan P. Antilley, Jonathan W. Deats |
2014-08-05 |
| 8800034 |
Insider threat correlation tool |
Brian McHugh, Ronald Ramcharran, Timothy C. Metzger, Dan P. Antilley, Jonathan W. Deats |
2014-08-05 |
| 8782209 |
Insider threat correlation tool |
Brian McHugh, Ronald Ramcharran, Timothy C. Metzger, Dan P. Antilley, Jonathan W. Deats |
2014-07-15 |
| 8613086 |
Ping and scan of computer systems |
Kaushal A. Patel, Jordan P. Havranek, Ronald Ramcharran, Iesha A. Scott |
2013-12-17 |
| 8418229 |
Systems and methods for performing access entitlement reviews |
Igor A. Baikalov, Dan P. Antilley, Jonathan W. Deats, Robert Alan Hansen, Cris T. Paltenghe +3 more |
2013-04-09 |