Issued Patents All Time
Showing 26–40 of 40 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9485271 | Systems and methods for anomaly-based detection of compromised IT administration accounts | Kevin Roundy, Fanglu Guo | 2016-11-01 |
| 9401925 | Systems and methods for detecting security threats based on user profiles | Fanglu Guo, Kevin Roundy | 2016-07-26 |
| 9317679 | Systems and methods for detecting malicious documents based on component-object reuse | Fanglu Guo, Susanta K. Nanda | 2016-04-19 |
| 9275226 | Systems and methods for detecting selective malware attacks | Kevin Roundy, Fanglu Guo | 2016-03-01 |
| 9256739 | Systems and methods for using event-correlation graphs to generate remediation procedures | Kevin Roundy | 2016-02-09 |
| 9230111 | Systems and methods for protecting document files from macro threats | Susanta K. Nanda, Fanglu Guo | 2016-01-05 |
| 9225736 | Techniques for detecting anomalous network traffic | Kevin Roundy, Jie Fu, Tao Cheng, Zhi Kai Li, Fanglu Guo | 2015-12-29 |
| 9208314 | Systems and methods for distinguishing code of a program obfuscated within a packed program | — | 2015-12-08 |
| 9166997 | Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems | Fanglu Guo, Kevin Roundy | 2015-10-20 |
| 9148441 | Systems and methods for adjusting suspiciousness scores in event-correlation graphs | Acar Tamersoy, Kevin Roundy, Elias Khalil | 2015-09-29 |
| 9141790 | Systems and methods for using event-correlation graphs to detect attacks on computing systems | Kevin Roundy, Fanglu Guo, Tao Cheng, Jie Fu, Zhi Kai Li +4 more | 2015-09-22 |
| 9009459 | Systems and methods for neutralizing file-format-specific exploits included within files contained within electronic communications | Carey Nachenberg, Fanglu Guo, Susanta K. Nanda, Darren Shou, Marc Dacier | 2015-04-14 |
| 8826439 | Encoding machine code instructions for static feature based malware clustering | Xin Hu, Kent E. Griffin | 2014-09-02 |
| 8555385 | Techniques for behavior based malware analysis | Susanta K. Nanda, Jeffrey Wilhelm | 2013-10-08 |
| 8214365 | Measuring confidence of file clustering and clustering based file classification | Pratyusa K. Manadhata, Kent E. Griffin | 2012-07-03 |