| 11539721 |
Correlating endpoint and network views to identify evasive applications |
Blake Harrell Anderson, David McGrew, Vincent E. Parla, Martin Grill, Martin Vejman |
2022-12-27 |
| 11451561 |
Automated creation of lightweight behavioral indicators of compromise (IOCS) |
Danila Khikhlukha, Harshit Nayyar |
2022-09-20 |
| 11038900 |
Structural command and control detection of polymorphic malware |
Martin Rehak, Danila Khikhlukha, Harshit Nayyar |
2021-06-15 |
| 10904271 |
Active prioritization of investigation targets in network security |
Jan Stiborek, Tomas Pevny |
2021-01-26 |
| 10735441 |
Correlating endpoint and network views to identify evasive applications |
Blake Harrell Anderson, David McGrew, Vincent E. Parla, Martin Grill, Martin Vejman |
2020-08-04 |
| 10382462 |
Network security classification |
Michal Sofka |
2019-08-13 |
| 10027562 |
Detecting network services based on network flow data |
Ivan Nikolaev, Martin Grill |
2018-07-17 |
| 9813442 |
Server grouping system |
Tomas Pevny, Martin Rehak |
2017-11-07 |
| 9596321 |
Server grouping system |
Tomas Pevny, Martin Rehak |
2017-03-14 |
| 9531742 |
Detection of malicious network connections |
Jan Kohout, Tomas Pevny, Martin Rehak |
2016-12-27 |
| 9344441 |
Detection of malicious network connections |
Jan Kohout, Tomas Pevny, Martin Rehak |
2016-05-17 |