| 11522882 |
Detection of adversary lateral movement in multi-domain IIOT environments |
Amin Hassanzadeh, Robin Lynn Burkett, Apoorv Krishak, Chien-An Chen, Nahid Farhady Ghalaty |
2022-12-06 |
| 10936725 |
Container image vulnerability reduction |
Chien-An Chen, Lei Ding |
2021-03-02 |
| 10824752 |
Utilizing heuristic and machine learning models to generate a mandatory access control policy for an application |
Chien-An Chen, Lei Ding |
2020-11-03 |
| 10812499 |
Detection of adversary lateral movement in multi-domain IIOT environments |
Amin Hassanzadeh, Robin Lynn Burkett, Apoorv Krishak, Chien-An Chen, Nahid Farhady Ghalaty |
2020-10-20 |
| 10572663 |
Systems and methods for identifying malicious file droppers |
Yun Shen, Nathan Evans |
2020-02-25 |
| 10447720 |
Systems and methods for performing application container introspection |
Nathan Evans |
2019-10-15 |
| 10278074 |
Systems and methods for categorizing mobile devices as rooted |
Yun Shen, Nathan Evans |
2019-04-30 |
| 10243963 |
Systems and methods for generating device-specific security policies for applications |
Nathan Evans, Yun Shen |
2019-03-26 |
| 10225284 |
Techniques of obfuscation for enterprise data center services |
Nathan Evans, Yun Shen |
2019-03-05 |
| 10185838 |
Methods to impede common file/process hiding techniques |
Nathan Evans, Yun Shen |
2019-01-22 |
| 10146893 |
Systems and methods for evaluating electronic control units within vehicle emulations |
Nathan Evans, Yun Shen |
2018-12-04 |
| 10114947 |
Systems and methods for logging processes within containers |
Nathan Evans, Yun Shen |
2018-10-30 |
| 9953158 |
Systems and methods for enforcing secure software execution |
Nathan Evans |
2018-04-24 |
| 9898615 |
Methods to impede common file/process hiding techniques |
Nathan Evans, Yun Shen |
2018-02-20 |
| 9898272 |
Virtual layer rollback |
Nathan Evans, Yun Shen |
2018-02-20 |
| 9843594 |
Systems and methods for detecting anomalous messages in automobile networks |
Nathan Evans, Yun Shen |
2017-12-12 |
| 9794275 |
Lightweight replicas for securing cloud-based services |
Nathan Evans |
2017-10-17 |
| 9612852 |
Techniques for redirecting input/output |
Nathan Evans |
2017-04-04 |
| 9582669 |
Systems and methods for detecting discrepancies in automobile-network data |
Yun Shen, Nathan Evans |
2017-02-28 |
| 9525665 |
Systems and methods for obscuring network services |
Nathan Evans, Matthew Elder |
2016-12-20 |
| 8640208 |
Authentication enforcement at resource level |
Paul El Khoury, Cedric Ulmer |
2014-01-28 |
| 8527954 |
Method for automatically creating a behavior pattern of a computer program for model-based testing techniques |
Paul El Khoury |
2013-09-03 |
| 8495744 |
Evaluation of risk of conflict for security solutions integration |
Paul El Khoury, Smriti Kumar Sinha |
2013-07-23 |
| 8245045 |
Computer-implemented methods, systems and computer program products for generating and verifying signatures |
Smriti Kumar Sinha, Paul El Khoury |
2012-08-14 |