| 10013569 |
Privacy-preserving data collection, publication, and analysis |
Samuel Wu |
2018-07-03 |
| 8842690 |
System, method, and media for network traffic measurement on high-speed routers |
Jih-Kwon Peir, Myungkeun Yoon, Tao Li |
2014-09-23 |
| 8001475 |
Method and apparatus for creating a network topograph that includes all select objects that are in a network |
Branimir Liker, Partha Bhattacharya, Imin Lee |
2011-08-16 |
| 7636937 |
Method and apparatus for comparing access control lists for configuring a security policy on a network |
Partha Bhattacharya |
2009-12-22 |
| 7516475 |
Method and apparatus for managing security policies on a network |
Liman Wei |
2009-04-07 |
| 7464409 |
Perimeter-based defense against data flooding in a data communication network |
— |
2008-12-09 |
| 7143283 |
Simplifying the selection of network paths for implementing and managing security policies on a network |
Bo Zou |
2006-11-28 |
| 7107613 |
Method and apparatus for reducing the number of tunnels used to implement a security policy on a network |
Partha Bhattacharya, Susan Hinrichs |
2006-09-12 |
| 7096356 |
Method and apparatus for negotiating Diffie-Hellman keys among multiple parties using a distributed recursion approach |
Liman Wei |
2006-08-22 |
| 7093283 |
Method and apparatus for deploying configuration instructions to security devices in order to implement a security policy on a network |
Partha Bhattacharya |
2006-08-15 |
| 7082531 |
Method and apparatus for determining enforcement security devices in a network topology |
Partha Bhattacharya, Liman Wei |
2006-07-25 |
| 7036119 |
Method and apparatus for creating a network topograph that includes all select objects that are in a network |
Branimir Liker, Partha Bhattacharya, Imin Lee |
2006-04-25 |
| 7007032 |
Method and apparatus for removing redundancies from a list of data structures |
Partha Bhattacharya, Liman Wei |
2006-02-28 |
| 7000006 |
Implementing network management policies using topology reduction |
— |
2006-02-14 |