| 11768752 |
Optimizing large scale data analysis |
Evgeny Skvortsov, Yip Man Tsang, William George Kahn Bradbury, Andreas Ulbrich, Zhaosheng Bao +1 more |
2023-09-26 |
| 9832209 |
Systems and methods for managing network security |
Shaun Cooley |
2017-11-28 |
| 9569619 |
Systems and methods for assessing internet addresses |
Carey Nachenberg |
2017-02-14 |
| 9565093 |
Systems and methods for anticipating file-security queries |
Joseph Chen |
2017-02-07 |
| 9268940 |
Systems and methods for assessing internet addresses |
Carey Nachenberg |
2016-02-23 |
| 9270467 |
Systems and methods for trust propagation of signed files across devices |
Joseph Chen |
2016-02-23 |
| 9171152 |
Systems and methods for preventing chronic false positives |
Joseph Chen |
2015-10-27 |
| 9171253 |
Identifying predictive models resistant to concept drift |
Adam Wright, Sourabh Satish |
2015-10-27 |
| 9124472 |
Providing file information to a client responsive to a file download stability prediction |
Scott Schneider |
2015-09-01 |
| 9088604 |
Systems and methods for treating locally created files as trustworthy |
Joseph Chen |
2015-07-21 |
| 8925088 |
Method and apparatus for automatically excluding false positives from detection as malware |
Abubakar Wawda |
2014-12-30 |
| 8819049 |
Frame injection blocking |
Matthew Yeo, Frank Barajas, Pak Wai Yung, James Croall |
2014-08-26 |
| 8650214 |
Dynamic frame buster injection |
— |
2014-02-11 |
| 8631498 |
Techniques for identifying potential malware domain names |
Michael Hart, Sharada Sundaram |
2014-01-14 |
| 8627469 |
Systems and methods for using acquisitional contexts to prevent false-positive malware classifications |
Joseph Chen |
2014-01-07 |
| 8555385 |
Techniques for behavior based malware analysis |
Sandeep Bhatkar, Susanta K. Nanda |
2013-10-08 |
| 8402539 |
Systems and methods for detecting malware |
Joseph Chen, Adam Glick |
2013-03-19 |
| 8286241 |
Identifying legitimate content using user-agent-based white listing |
Matthew Yeo |
2012-10-09 |
| 8201254 |
Detection of e-mail threat acceleration |
Carey Nachenberg |
2012-06-12 |
| 8127360 |
Method and apparatus for detecting leakage of sensitive information |
Carey Nachenberg |
2012-02-28 |
| 7814544 |
API-profile guided unpacking |
— |
2010-10-12 |
| 7739740 |
Detecting polymorphic threats |
Carey Nachenberg |
2010-06-15 |
| 7721330 |
Utility computing firewall |
Carey Nachenberg, Alfred C. Hartmann, Frank Barajas |
2010-05-18 |
| 7624446 |
Efficient signature packing for an intrusion detection system |
— |
2009-11-24 |
| 7558796 |
Determining origins of queries for a database intrusion detection system |
Adam Bromwich |
2009-07-07 |