| 12361010 |
Hierarchical scoring system for distributed networks |
Olivier Huynh Van, Tim Silverline, Kyle Scarmardo, Kevin Irwin, Jeffrey T. Boone +1 more |
2025-07-15 |
| 12298937 |
Network activity identification and characterization based on characteristic active directory (AD) event segments |
Satheesh Kumar Joseph Durairaj, George Apostolopulous, Dimitrios Terzis |
2025-05-13 |
| 12199997 |
Systems and methods for detecting beaconing communications using machine learning techniques |
Cui Lin |
2025-01-14 |
| 12088611 |
Systems and methods for training a machine learning model to detect beaconing communications |
Cui Lin |
2024-09-10 |
| 11936545 |
Systems and methods for detecting beaconing communications in aggregated traffic data |
Cui Lin |
2024-03-19 |
| 11658992 |
Lateral movement candidate detection in a computer network |
Satheesh Kumar Joseph Durairaj, Georgios Apostolopoulos |
2023-05-23 |
| 11044264 |
Graph-based detection of lateral movement |
Satheesh Kumar Joseph Durairaj, Georgios Apostolopoulos |
2021-06-22 |
| 11010342 |
Network activity identification and characterization based on characteristic active directory (AD) event segments |
Satheesh Kumar Joseph Durairaj, George Apostolopulous, Dimitrios Terzis |
2021-05-18 |
| 10783169 |
Inferring user interests from geo-location reports |
Mario Baldi, Ning Xia, Aleksandar Kuzmanovic |
2020-09-22 |
| 10462169 |
Lateral movement detection through graph-based candidate selection |
Satheesh Kumar Joseph Durairaj, Georgios Apostolopoulos |
2019-10-29 |
| 10419351 |
System and method for extracting signatures from controlled execution of applications and application codes retrieved from an application source |
Mario Baldi, Yong Liao, Antonio Nucci |
2019-09-17 |
| 10332005 |
System and method for extracting signatures from controlled execution of applications and using them on traffic traces |
Yong Liao, Mario Baldi, Antonio Nucci, Qiang Xu |
2019-06-25 |
| 10263868 |
User-specific policy enforcement based on network traffic fingerprinting |
Mario Baldi, Yong Liao, Antonio Nucci, Han Hee Song |
2019-04-16 |
| 10242187 |
Systems and methods for providing integrated security management |
Kevin Roundy, Matteo Dell'Amico, Chris Gates, Michael Hart |
2019-03-26 |
| 10178109 |
Discovery of groupings of security alert types and corresponding complex multipart attacks, from analysis of massive security telemetry |
— |
2019-01-08 |
| 10091231 |
Systems and methods for detecting security blind spots |
Chris Gates, Michael Hart, Kevin Roundy |
2018-10-02 |
| 9871810 |
Using tunable metrics for iterative discovery of groups of alert types identifying complex multipart attacks with different properties |
— |
2018-01-16 |
| 8959643 |
Detecting malware infestations in large-scale networks |
Luca Invernizzi, Ruben Torres, Sabyasachi Saha, Christopher Kruegel, Antonio Nucci +2 more |
2015-02-17 |
| 8843627 |
System and method for extracting signatures from seeded flow groups to classify network traffic |
Mario Baldi, Yong Liao, Qiang Xu |
2014-09-23 |