KR

Kevin Roundy

Broadcom: 56 patents #99 of 9,346Top 2%
NO Nortonlifelock: 9 patents #12 of 159Top 8%
GD Gen Digital: 7 patents #4 of 48Top 9%
CA Ca: 3 patents #240 of 1,424Top 20%
📍 Culver City, CA: #7 of 898 inventorsTop 1%
🗺 California: #3,836 of 386,348 inventorsTop 1%
Overall (All Time): #25,511 of 4,157,543Top 1%
75
Patents All Time

Issued Patents All Time

Showing 51–75 of 75 patents

Patent #TitleCo-InventorsDate
9825986 Systems and methods for generating contextually meaningful animated visualizations of computer security events Sandeep Bhatkar, Sharada Sundaram, David Luz Silva 2017-11-21
9805192 Systems and methods for file classification Christopher Gates 2017-10-31
9807094 Systems and methods for dynamic access control over shared resources Yin-Chen Liu, Sandeep Bhatkar, Leylya Yumer, Anand Kashyap, Aleatha Parker-Wood +1 more 2017-10-31
9798876 Systems and methods for creating security profiles Aleatha Parker-Wood, Anand Kashyap, Christopher Gates, Leylya Yumer, Sandeep Bhatkar +1 more 2017-10-24
9800590 Systems and methods for threat detection using a software program update profile Christopher Gates, Sandeep Bhatkar, Anand Kashyap, Yin-Chen Liu, Aleatha Parker-Wood +1 more 2017-10-24
9774615 Techniques for detecting anomalous network traffic Jie Fu, Tao Cheng, Zhi Kai Li, Fanglu Guo, Sandeep Bhatkar 2017-09-26
9754106 Systems and methods for classifying security events as targeted attacks Sandeep Bhatkar 2017-09-05
9665715 Systems and methods for detecting malware-induced crashes Sandeep Bhatkar, Fanglu Guo, Daniel Marino 2017-05-30
9659182 Systems and methods for protecting data files Sandeep Bhatkar, Fanglu Guo, Scott Schneider 2017-05-23
9652597 Systems and methods for detecting information leakage by an organizational insider Anand Kashyap 2017-05-16
9548988 Systems and methods for attributing potentially malicious email campaigns to known threat groups Olivier Thonnard 2017-01-17
9485271 Systems and methods for anomaly-based detection of compromised IT administration accounts Sandeep Bhatkar, Fanglu Guo 2016-11-01
9485272 Systems and methods for estimating confidence scores of unverified signatures 2016-11-01
9407644 Systems and methods for detecting malicious use of digital certificates Tao Cheng, Jie Fu, Zhi Kai Li, Ying Li 2016-08-02
9401925 Systems and methods for detecting security threats based on user profiles Fanglu Guo, Sandeep Bhatkar 2016-07-26
9323924 Systems and methods for establishing reputations of files Acar Tamersoy, Sourabh Satish 2016-04-26
9275226 Systems and methods for detecting selective malware attacks Sandeep Bhatkar, Fanglu Guo 2016-03-01
9256739 Systems and methods for using event-correlation graphs to generate remediation procedures Sandeep Bhatkar 2016-02-09
9225736 Techniques for detecting anomalous network traffic Jie Fu, Tao Cheng, Zhi Kai Li, Fanglu Guo, Sandeep Bhatkar 2015-12-29
9189626 Techniques for detecting malicious code Adam Overfield, Jie Fu, Tao Cheng, Zhi Kai Li 2015-11-17
9185119 Systems and methods for detecting malware using file clustering Acar Tamersoy, Daniel Marino 2015-11-10
9166995 Systems and methods for using user-input information to identify computer security threats 2015-10-20
9166997 Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems Fanglu Guo, Sandeep Bhatkar 2015-10-20
9148441 Systems and methods for adjusting suspiciousness scores in event-correlation graphs Acar Tamersoy, Sandeep Bhatkar, Elias Khalil 2015-09-29
9141790 Systems and methods for using event-correlation graphs to detect attacks on computing systems Fanglu Guo, Sandeep Bhatkar, Tao Cheng, Jie Fu, Zhi Kai Li +4 more 2015-09-22