Issued Patents All Time
Showing 25 most recent of 40 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11997118 | Scripting attack detection and mitigation using content security policy violation reports | Siddhesh Yawalkar, Hemant Puri, Swapnil Bhalode, Anant Agrawal, Sangam Shankar +2 more | 2024-05-28 |
| 11210397 | Systems and methods for training malware classifiers | Mahmood Sharif, Saurabh Shintre, Kevin Roundy | 2021-12-28 |
| 11184162 | Privacy preserving secure task automation | Susanta K. Nanda, Yuqiong Sun, Saurabh Shintre | 2021-11-23 |
| 11048809 | Systems and methods for detecting misuse of online service access tokens | Yuqiong Sun, Susanta K. Nanda, Mingliang Pei | 2021-06-29 |
| 11032319 | Systems and methods for preparing honeypot computer files | Kevin Roundy, Michael Rinehart, Xiaolin Wang | 2021-06-08 |
| 11010680 | Memory efficiency of production rule systems | Daniel Marino, Kevin Roundy, Acar Tamersoy | 2021-05-18 |
| 10686816 | Insider threat detection under user-resource bi-partite graphs | Saurabh Shintre, Ashwin Kayyoor | 2020-06-16 |
| 10452841 | Modeling malicious behavior that occurs in the absence of users | Acar Tamersoy, Daniel Marino, Kevin Roundy | 2019-10-22 |
| 10425435 | Systems and methods for detecting anomalous behavior in shared data repositories | Ashwin Kayyoor, Saurabh Shintre | 2019-09-24 |
| 10341373 | Automatically detecting insider threats using user collaboration patterns | Saurabh Shintre, Ashwin Kayyoor | 2019-07-02 |
| 10169584 | Systems and methods for identifying non-malicious files on computing devices within organizations | Kevin Roundy, Aleatha Parker-Wood, Yin-Chen Liu, Anand Kashyap, Leylya Yumer +1 more | 2019-01-01 |
| 10075454 | Using telemetry data to detect false positives | Jugal Parikh | 2018-09-11 |
| 10055586 | Systems and methods for determining the trustworthiness of files within organizations | Kevin Roundy, Christopher Gates, Anand Kashyap, Yin-Chen Liu, Aleatha Parker-Wood +1 more | 2018-08-21 |
| 10025937 | Practical and dynamic approach to enterprise hardening | Anand Kashyap, Kevin Roundy, Aleatha Parker-Wood, Christopher Gates, Yin-Chen Liu +1 more | 2018-07-17 |
| 10007786 | Systems and methods for detecting malware | Jugal Parikh, Carey Nachenberg | 2018-06-26 |
| 9825986 | Systems and methods for generating contextually meaningful animated visualizations of computer security events | Sharada Sundaram, Kevin Roundy, David Luz Silva | 2017-11-21 |
| 9807094 | Systems and methods for dynamic access control over shared resources | Yin-Chen Liu, Kevin Roundy, Leylya Yumer, Anand Kashyap, Aleatha Parker-Wood +1 more | 2017-10-31 |
| 9798876 | Systems and methods for creating security profiles | Aleatha Parker-Wood, Anand Kashyap, Christopher Gates, Kevin Roundy, Leylya Yumer +1 more | 2017-10-24 |
| 9800590 | Systems and methods for threat detection using a software program update profile | Christopher Gates, Kevin Roundy, Anand Kashyap, Yin-Chen Liu, Aleatha Parker-Wood +1 more | 2017-10-24 |
| 9774615 | Techniques for detecting anomalous network traffic | Kevin Roundy, Jie Fu, Tao Cheng, Zhi Kai Li, Fanglu Guo | 2017-09-26 |
| 9754106 | Systems and methods for classifying security events as targeted attacks | Kevin Roundy | 2017-09-05 |
| 9686304 | Systems and methods for healing infected document files | Fanglu Guo, Susanta K. Nanda | 2017-06-20 |
| 9665715 | Systems and methods for detecting malware-induced crashes | Kevin Roundy, Fanglu Guo, Daniel Marino | 2017-05-30 |
| 9659182 | Systems and methods for protecting data files | Kevin Roundy, Fanglu Guo, Scott Schneider | 2017-05-23 |
| 9652616 | Techniques for classifying non-process threats | Kent E. Griffin, Pratyusa K. Manadhata | 2017-05-16 |