| 11936683 |
Analyzing encrypted traffic behavior using contextual traffic data |
Jan Kohout, Blake Harrell Anderson, Martin Grill, David McGrew, Martin Kopp |
2024-03-19 |
| 11700275 |
Detection of malware and malicious applications |
David McGrew, Andrew Zawadowskiy, Donovan O'Hara, Saravanan Radhakrishnan, Daniel G. Wing |
2023-07-11 |
| 11451578 |
Analyzing encrypted traffic behavior using contextual traffic data |
Jan Kohout, Blake Harrell Anderson, Martin Grill, David McGrew, Martin Kopp |
2022-09-20 |
| 11113397 |
Detection of malicious executable files using hierarchical models |
Jan Franco̊, Petr Somol |
2021-09-07 |
| 11057420 |
Detection of malware and malicious applications |
David McGrew, Andrew Zawadowskiy, Donovan O'Hara, Saravanan Radhakrishnan, Daniel G. Wing |
2021-07-06 |
| 10904271 |
Active prioritization of investigation targets in network security |
Jan Jusko, Jan Stiborek |
2021-01-26 |
| 10855698 |
Leveraging endpoint and network environment inferences for malware traffic classification |
Blake Harrell Anderson, Martin Rehak, David McGrew, Martin Vejman, Martin Grill +1 more |
2020-12-01 |
| 10805338 |
Analyzing encrypted traffic behavior using contextual traffic data |
Jan Kohout, Blake Harrell Anderson, Martin Grill, David McGrew, Martin Kopp |
2020-10-13 |
| 10785247 |
Service usage model for traffic analysis |
Ivan Nikolaev |
2020-09-22 |
| 10708284 |
Private-learned IDS |
Martin Kopp, Petr Somol, David McGrew |
2020-07-07 |
| 10491614 |
Illegitimate typosquatting detection with internet protocol information |
Martin Grill, Jan Kohout, Martin Kopp |
2019-11-26 |
| 10375143 |
Learning indicators of compromise with hierarchical models |
Petr Somol |
2019-08-06 |
| 10305928 |
Detection of malware and malicious applications |
David McGrew, Andrew Zawadowskiy, Donovan O'Hara, Saravanan Radhakrishnan, Daniel G. Wing |
2019-05-28 |
| 10230747 |
Explaining network anomalies using decision trees |
Martin Kopp |
2019-03-12 |
| 10218718 |
Rapid, targeted network threat detection |
Martin Kopp |
2019-02-26 |
| 10079768 |
Framework for joint learning of network traffic representations and traffic classifiers |
Jan Kohout |
2018-09-18 |
| 9992216 |
Identifying malicious executables by analyzing proxy logs |
Petr Somol |
2018-06-05 |
| 9973520 |
Explaining causes of network anomalies |
— |
2018-05-15 |
| 9813442 |
Server grouping system |
Jan Jusko, Martin Rehak |
2017-11-07 |
| 9596321 |
Server grouping system |
Jan Jusko, Martin Rehak |
2017-03-14 |
| 9531742 |
Detection of malicious network connections |
Jan Kohout, Jan Jusko, Martin Rehak |
2016-12-27 |
| 9374383 |
Events from network flows |
Gustav Sourek, Karel Bartos, Filip Zelezny, Petr Somol |
2016-06-21 |
| 9344441 |
Detection of malicious network connections |
Jan Kohout, Jan Jusko, Martin Rehak |
2016-05-17 |