| 9830458 |
Discovery and classification of enterprise assets via host characteristics |
Kevin M. McBride, Quentin Liu, Hari Veladanda, George Tomic |
2017-11-28 |
| 9736178 |
Systems and methods for detecting suspicious internet addresses |
— |
2017-08-15 |
| 9692772 |
Detection of malware using time spans and periods of activity for network requests |
Michael Hart, Darrell Kienzle |
2017-06-27 |
| 9639693 |
Techniques for detecting a security vulnerability |
Shireen Rivera |
2017-05-02 |
| 9501649 |
Systems and methods for determining potential impacts of applications on the security of computing systems |
Piyush Sharma |
2016-11-22 |
| 9444829 |
Systems and methods for protecting computing resources based on logical data models |
— |
2016-09-13 |
| 9419986 |
System to identify machines infected by malware applying linguistic analysis to network requests from endpoints |
Michael Hart, Darrell Kienzle |
2016-08-16 |
| 9418222 |
Techniques for detecting advanced security threats |
Shireen Rivera |
2016-08-16 |
| 9384336 |
Systems and methods for modifying security based on reputation information |
— |
2016-07-05 |
| 9332022 |
Systems and methods for detecting suspicious internet addresses |
— |
2016-05-03 |
| 9258269 |
Methods and systems for managing delivery of email to local recipients using local reputations |
— |
2016-02-09 |
| 9065849 |
Systems and methods for determining trustworthiness of software programs |
Shireen Rivera |
2015-06-23 |
| 8650245 |
Systems and methods for providing adaptive views of domain name system reputation data |
— |
2014-02-11 |
| 8601577 |
Using configured error codes to enable spam blocking downstream from a mail transfer agent |
— |
2013-12-03 |
| D680438 |
Fluid dispensary device |
— |
2013-04-23 |
| 8214490 |
Compact input compensating reputation data tracking mechanism |
Jacob J Vos, Igor Moochnick, Scott Gregory WASSON |
2012-07-03 |
| 7014599 |
Selectable force exercise machine |
— |
2006-03-21 |