Issued Patents All Time
Showing 1–23 of 23 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11936683 | Analyzing encrypted traffic behavior using contextual traffic data | Jan Kohout, Blake Harrell Anderson, Martin Grill, David McGrew, Martin Kopp | 2024-03-19 |
| 11700275 | Detection of malware and malicious applications | David McGrew, Andrew Zawadowskiy, Donovan O'Hara, Saravanan Radhakrishnan, Daniel G. Wing | 2023-07-11 |
| 11451578 | Analyzing encrypted traffic behavior using contextual traffic data | Jan Kohout, Blake Harrell Anderson, Martin Grill, David McGrew, Martin Kopp | 2022-09-20 |
| 11113397 | Detection of malicious executable files using hierarchical models | Jan Franco̊, Petr Somol | 2021-09-07 |
| 11057420 | Detection of malware and malicious applications | David McGrew, Andrew Zawadowskiy, Donovan O'Hara, Saravanan Radhakrishnan, Daniel G. Wing | 2021-07-06 |
| 10904271 | Active prioritization of investigation targets in network security | Jan Jusko, Jan Stiborek | 2021-01-26 |
| 10855698 | Leveraging endpoint and network environment inferences for malware traffic classification | Blake Harrell Anderson, Martin Rehak, David McGrew, Martin Vejman, Martin Grill +1 more | 2020-12-01 |
| 10805338 | Analyzing encrypted traffic behavior using contextual traffic data | Jan Kohout, Blake Harrell Anderson, Martin Grill, David McGrew, Martin Kopp | 2020-10-13 |
| 10785247 | Service usage model for traffic analysis | Ivan Nikolaev | 2020-09-22 |
| 10708284 | Private-learned IDS | Martin Kopp, Petr Somol, David McGrew | 2020-07-07 |
| 10491614 | Illegitimate typosquatting detection with internet protocol information | Martin Grill, Jan Kohout, Martin Kopp | 2019-11-26 |
| 10375143 | Learning indicators of compromise with hierarchical models | Petr Somol | 2019-08-06 |
| 10305928 | Detection of malware and malicious applications | David McGrew, Andrew Zawadowskiy, Donovan O'Hara, Saravanan Radhakrishnan, Daniel G. Wing | 2019-05-28 |
| 10230747 | Explaining network anomalies using decision trees | Martin Kopp | 2019-03-12 |
| 10218718 | Rapid, targeted network threat detection | Martin Kopp | 2019-02-26 |
| 10079768 | Framework for joint learning of network traffic representations and traffic classifiers | Jan Kohout | 2018-09-18 |
| 9992216 | Identifying malicious executables by analyzing proxy logs | Petr Somol | 2018-06-05 |
| 9973520 | Explaining causes of network anomalies | — | 2018-05-15 |
| 9813442 | Server grouping system | Jan Jusko, Martin Rehak | 2017-11-07 |
| 9596321 | Server grouping system | Jan Jusko, Martin Rehak | 2017-03-14 |
| 9531742 | Detection of malicious network connections | Jan Kohout, Jan Jusko, Martin Rehak | 2016-12-27 |
| 9374383 | Events from network flows | Gustav Sourek, Karel Bartos, Filip Zelezny, Petr Somol | 2016-06-21 |
| 9344441 | Detection of malicious network connections | Jan Kohout, Jan Jusko, Martin Rehak | 2016-05-17 |