Issued Patents All Time
Showing 51–75 of 75 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9825986 | Systems and methods for generating contextually meaningful animated visualizations of computer security events | Sandeep Bhatkar, Sharada Sundaram, David Luz Silva | 2017-11-21 |
| 9805192 | Systems and methods for file classification | Christopher Gates | 2017-10-31 |
| 9807094 | Systems and methods for dynamic access control over shared resources | Yin-Chen Liu, Sandeep Bhatkar, Leylya Yumer, Anand Kashyap, Aleatha Parker-Wood +1 more | 2017-10-31 |
| 9798876 | Systems and methods for creating security profiles | Aleatha Parker-Wood, Anand Kashyap, Christopher Gates, Leylya Yumer, Sandeep Bhatkar +1 more | 2017-10-24 |
| 9800590 | Systems and methods for threat detection using a software program update profile | Christopher Gates, Sandeep Bhatkar, Anand Kashyap, Yin-Chen Liu, Aleatha Parker-Wood +1 more | 2017-10-24 |
| 9774615 | Techniques for detecting anomalous network traffic | Jie Fu, Tao Cheng, Zhi Kai Li, Fanglu Guo, Sandeep Bhatkar | 2017-09-26 |
| 9754106 | Systems and methods for classifying security events as targeted attacks | Sandeep Bhatkar | 2017-09-05 |
| 9665715 | Systems and methods for detecting malware-induced crashes | Sandeep Bhatkar, Fanglu Guo, Daniel Marino | 2017-05-30 |
| 9659182 | Systems and methods for protecting data files | Sandeep Bhatkar, Fanglu Guo, Scott Schneider | 2017-05-23 |
| 9652597 | Systems and methods for detecting information leakage by an organizational insider | Anand Kashyap | 2017-05-16 |
| 9548988 | Systems and methods for attributing potentially malicious email campaigns to known threat groups | Olivier Thonnard | 2017-01-17 |
| 9485271 | Systems and methods for anomaly-based detection of compromised IT administration accounts | Sandeep Bhatkar, Fanglu Guo | 2016-11-01 |
| 9485272 | Systems and methods for estimating confidence scores of unverified signatures | — | 2016-11-01 |
| 9407644 | Systems and methods for detecting malicious use of digital certificates | Tao Cheng, Jie Fu, Zhi Kai Li, Ying Li | 2016-08-02 |
| 9401925 | Systems and methods for detecting security threats based on user profiles | Fanglu Guo, Sandeep Bhatkar | 2016-07-26 |
| 9323924 | Systems and methods for establishing reputations of files | Acar Tamersoy, Sourabh Satish | 2016-04-26 |
| 9275226 | Systems and methods for detecting selective malware attacks | Sandeep Bhatkar, Fanglu Guo | 2016-03-01 |
| 9256739 | Systems and methods for using event-correlation graphs to generate remediation procedures | Sandeep Bhatkar | 2016-02-09 |
| 9225736 | Techniques for detecting anomalous network traffic | Jie Fu, Tao Cheng, Zhi Kai Li, Fanglu Guo, Sandeep Bhatkar | 2015-12-29 |
| 9189626 | Techniques for detecting malicious code | Adam Overfield, Jie Fu, Tao Cheng, Zhi Kai Li | 2015-11-17 |
| 9185119 | Systems and methods for detecting malware using file clustering | Acar Tamersoy, Daniel Marino | 2015-11-10 |
| 9166995 | Systems and methods for using user-input information to identify computer security threats | — | 2015-10-20 |
| 9166997 | Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems | Fanglu Guo, Sandeep Bhatkar | 2015-10-20 |
| 9148441 | Systems and methods for adjusting suspiciousness scores in event-correlation graphs | Acar Tamersoy, Sandeep Bhatkar, Elias Khalil | 2015-09-29 |
| 9141790 | Systems and methods for using event-correlation graphs to detect attacks on computing systems | Fanglu Guo, Sandeep Bhatkar, Tao Cheng, Jie Fu, Zhi Kai Li +4 more | 2015-09-22 |