| 12166761 |
Distinguishing between functional tracking domains and nonfunctional tracking domains on a host web page |
Iskander Sanchez Rola, Johann Roturier, David Luz Silva, Daniel Marino, Petros Efstathopoulos |
2024-12-10 |
| 11949679 |
Distinguishing between functional tracking domains and nonfunctional tracking domains on a host web page |
Iskander Sanchez Rola, Johann Roturier, David Luz Silva, Daniel Marino, Petros Efstathopoulos |
2024-04-02 |
| 11849002 |
Assigning privacy ratings to tracking domains in order to increase user awareness of online privacy violations |
Iskander Sanchez Rola |
2023-12-19 |
| 11777909 |
Identifying and removing a tracking capability from an external domain that performs a tracking activity on a host web page |
Iskander Sanchez Rola, David Luz Silva, Daniel Marino, Petros Efstathopoulos |
2023-10-03 |
| 11640479 |
Mitigating website privacy issues by automatically identifying cookie sharing risks in a cookie ecosystem |
Iskander Sanchez |
2023-05-02 |
| 11528257 |
Identifying and removing a tracking capability from an external domain that performs a tracking activity on a host web page |
Iskander Sanchez Rola, David Luz Silva, Daniel Marino, Petros Efstathopoulos |
2022-12-13 |
| 11381596 |
Analyzing and mitigating website privacy issues by automatically classifying cookies |
Iskander Sanchez |
2022-07-05 |
| 11354440 |
Analyzing and mitigating privacy issues on a computing device using cookie generation flows |
Iskander Sanchez |
2022-06-07 |
| 10623426 |
Building a ground truth dataset for a machine learning-based security application |
Petros Efstathopoulos |
2020-04-14 |
| 10547623 |
Security network devices by forecasting future security incidents for a network based on past security incidents |
Yufei Han, Yun Shen, Pierre-Antoine Vervier, Petros Efstathopoulos |
2020-01-28 |
| 10547633 |
Systems and methods for mapping services utilized by network domains |
Matteo Dell'Amico, Pierre-Antoine Vervier |
2020-01-28 |
| 10410158 |
Systems and methods for evaluating cybersecurity risk |
Laurent Heslault, Roxane Divol |
2019-09-10 |
| 10367845 |
Systems and methods for evaluating infection risks based on profiled user behaviors |
Yufei Han, Pierre-Antoine Vervier, Matteo Dell'Amico |
2019-07-30 |
| 10169584 |
Systems and methods for identifying non-malicious files on computing devices within organizations |
Kevin Roundy, Sandeep Bhatkar, Aleatha Parker-Wood, Yin-Chen Liu, Anand Kashyap +1 more |
2019-01-01 |
| 10116680 |
Systems and methods for evaluating infection risks based on profiled user behaviors |
Yufei Han, Pierre-Antoine Vervier, Matteo Dell'Amico |
2018-10-30 |
| 10104097 |
Systems and methods for preventing targeted malware attacks |
Olivier Thonnard, Anand Kashyap |
2018-10-16 |
| 10055586 |
Systems and methods for determining the trustworthiness of files within organizations |
Kevin Roundy, Sandeep Bhatkar, Christopher Gates, Anand Kashyap, Yin-Chen Liu +1 more |
2018-08-21 |
| 10025937 |
Practical and dynamic approach to enterprise hardening |
Anand Kashyap, Kevin Roundy, Sandeep Bhatkar, Aleatha Parker-Wood, Christopher Gates +1 more |
2018-07-17 |
| 9813437 |
Systems and methods for determining malicious-download risk based on user behavior |
— |
2017-11-07 |
| 9807094 |
Systems and methods for dynamic access control over shared resources |
Yin-Chen Liu, Sandeep Bhatkar, Kevin Roundy, Anand Kashyap, Aleatha Parker-Wood +1 more |
2017-10-31 |
| 9800606 |
Systems and methods for evaluating network security |
— |
2017-10-24 |
| 9800590 |
Systems and methods for threat detection using a software program update profile |
Christopher Gates, Kevin Roundy, Sandeep Bhatkar, Anand Kashyap, Yin-Chen Liu +1 more |
2017-10-24 |
| 9798876 |
Systems and methods for creating security profiles |
Aleatha Parker-Wood, Anand Kashyap, Christopher Gates, Kevin Roundy, Sandeep Bhatkar +1 more |
2017-10-24 |
| 9158915 |
Systems and methods for analyzing zero-day attacks |
Tudor Dumitras |
2015-10-13 |