| 9692772 |
Detection of malware using time spans and periods of activity for network requests |
Michael Hart, Peter Ashley |
2017-06-27 |
| 9571372 |
Systems and methods for estimating ages of network devices |
Nathan Evans, Matthew Elder |
2017-02-14 |
| 9419986 |
System to identify machines infected by malware applying linguistic analysis to network requests from endpoints |
Michael Hart, Peter Ashley |
2016-08-16 |
| 9317692 |
System and method for vulnerability risk analysis |
Matthew Elder, Pratyusa K. Manadhata, Ryan Persaud |
2016-04-19 |
| 9219655 |
Systems and methods for discovering network topologies |
Nathan Evans, Matthew Elder |
2015-12-22 |
| 9135293 |
Determining model information of devices based on network device identifiers |
Matthew Elder, Nathan Evans |
2015-09-15 |
| 9007955 |
Systems and methods for mapping network topologies |
Matthew Elder, Ryan Persaud |
2015-04-14 |
| 8844041 |
Detecting network devices and mapping topology using network introspection by collaborating endpoints |
William Gauvin, Matthew Elder, Robert Walters, Adam Schepis, Brian Hernacki |
2014-09-23 |
| 7934257 |
On-box active reconnaissance |
Paul Swinton |
2011-04-26 |
| 7634811 |
Validation of secure sockets layer communications |
Matthew Elder |
2009-12-15 |
| 7529785 |
Efficient backups using dynamically shared storage pools in peer-to-peer networks |
Michael Spertus, Slava Kritov, Hans F. van Rietschote, Anthony T. Orling, William E. Sobel |
2009-05-05 |
| 7516488 |
Preventing data from being submitted to a remote system in response to a malicious e-mail |
James Croall |
2009-04-07 |