| 12375505 |
Endpoint-assisted inspection of encrypted network traffic |
David McGrew, Blake Harrell Anderson, Scott William Dunlop |
2025-07-29 |
| 12348386 |
Automatically detecting authorized remote administration sessions in a network monitoring system |
David McGrew, Blake Harrell Anderson, Sunil Amin |
2025-07-01 |
| 12088607 |
Endpoint-assisted inspection of encrypted network traffic |
David McGrew, Blake Harrell Anderson, Scott William Dunlop |
2024-09-10 |
| 11936533 |
Automatically detecting authorized remote administration sessions in a network monitoring system |
David McGrew, Blake Harrell Anderson, Sunil Amin |
2024-03-19 |
| 11916932 |
Endpoint-assisted inspection of encrypted network traffic |
David McGrew, Blake Harrell Anderson, Scott William Dunlop |
2024-02-27 |
| 11632309 |
Automatically detecting authorized remote administration sessions in a network monitoring system |
David McGrew, Blake Harrell Anderson, Sunil Amin |
2023-04-18 |
| 11310246 |
Endpoint-assisted inspection of encrypted network traffic |
David McGrew, Blake Harrell Anderson, Scott William Dunlop |
2022-04-19 |
| 11075820 |
Automatically detecting authorized remote administration sessions in a network monitoring system |
David McGrew, Blake Harrell Anderson, Sunil Amin |
2021-07-27 |
| 11038900 |
Structural command and control detection of polymorphic malware |
Jan Jusko, Danila Khikhlukha, Harshit Nayyar |
2021-06-15 |
| 10855698 |
Leveraging endpoint and network environment inferences for malware traffic classification |
Blake Harrell Anderson, David McGrew, Martin Vejman, Tomas Pevny, Martin Grill +1 more |
2020-12-01 |
| 10574679 |
Identifying a security threat to a web-based resource |
— |
2020-02-25 |
| 10440035 |
Identifying malicious communication channels in network traffic by generating data based on adaptive sampling |
Karel Bartos |
2019-10-08 |
| 10264005 |
Identifying malicious network traffic based on collaborative sampling |
Karel Bartos |
2019-04-16 |
| 10178107 |
Detection of malicious domains using recurring patterns in domain names |
Ji{hacek over (r)}í Havelka, Michal Sofka |
2019-01-08 |
| 10015192 |
Sample selection for data analysis for use in malware detection |
Jan Stiborek |
2018-07-03 |
| 9888020 |
Global clustering of incidents based on malware similarity and online trustfulness |
Karel Bartos, Michal Sofka |
2018-02-06 |
| 9813442 |
Server grouping system |
Jan Jusko, Tomas Pevny |
2017-11-07 |
| 9596321 |
Server grouping system |
Jan Jusko, Tomas Pevny |
2017-03-14 |
| 9531742 |
Detection of malicious network connections |
Jan Kohout, Jan Jusko, Tomas Pevny |
2016-12-27 |
| 9432393 |
Global clustering of incidents based on malware similarity and online trustfulness |
Karel Bartos, Michal Sofka |
2016-08-30 |
| 9344441 |
Detection of malicious network connections |
Jan Kohout, Jan Jusko, Tomas Pevny |
2016-05-17 |