| 11496489 |
Knowledge-aware detection of attacks on a client device conducted with dual-use tools |
Johann Roturier, Pratyush Banerjee, David Luz Silva |
2022-11-08 |
| 11297083 |
Identifying and protecting against an attack against an anomaly detector machine learning classifier |
Aditya Kuppa |
2022-04-05 |
| 11288369 |
Systems and methods for detecting and protecting against malicious use of legitimate computing-system tools |
Aditya Kuppa |
2022-03-29 |
| 11275831 |
Systems and methods for detecting anomalous system command line data |
Lamine Aouad |
2022-03-15 |
| 11178170 |
Systems and methods for detecting anomalous behavior within computing sessions |
Aditya Kuppa, Sidharth Pipriya |
2021-11-16 |
| 10977374 |
Method to assess internal security posture of a computing system using external variables |
Aditya Kuppa, Pierre-Antoine Vervier, Yun Shen |
2021-04-13 |
| 10482244 |
Systems and methods for efficiently matching files |
Piotr Krysiuk |
2019-11-19 |
| 9667575 |
Systems and methods for detecting webpages belonging to spam campaigns |
— |
2017-05-30 |
| 9565209 |
Detecting electronic messaging threats by using metric trees and similarity hashes |
Alejandro Lopez, Dylan Morss, Lamine Aouad |
2017-02-07 |
| 8411854 |
Method and apparatus for authenticating a user |
Wojciech Zaremba |
2013-04-02 |