| 10187275 |
Monitoring network traffic by using event log information |
Yingxian Wang, Ramachandran V. Marti, Maxine R. Erlund |
2019-01-22 |
| 9584522 |
Monitoring network traffic by using event log information |
Yingxian Wang, Ramachandran V. Marti, Maxine R. Erlund |
2017-02-28 |
| 8312522 |
Monitoring network traffic by using a monitor device |
Tsehua A. Chen, Mitchell T. Christensen, Maxine R. Erlund |
2012-11-13 |
| 8214875 |
Network security policy enforcement using application session information and object attributes |
Ai-Lan Chang, Daniel J. Lassig, Rendell K. Fong, Emmanuel W. Jee |
2012-07-03 |
| 8166554 |
Secure enterprise network |
— |
2012-04-24 |
| 8024779 |
Verifying user authentication |
Ramachandran V. Marti, Yingxian Wang, Maxine R. Erlund |
2011-09-20 |
| 7941827 |
Monitoring network traffic by using a monitor device |
Tsehua A. Chen, Mitchell T. Christensen, Maxine R. Erlund |
2011-05-10 |