| 12328325 |
Probabilistic event linking |
Sseziwa A. Mukasa |
2025-06-10 |
| 12323438 |
Malicious incident visualization |
Thomas R. Hobson, Hyacinth D. Diehl, Alexander J. Graul |
2025-06-03 |
| 11907370 |
Malicious/benign computational behavior detection using parametric behavioral pattern definition |
David F. Diehl, Aaron Javan Marks, Kirby Koster, Daniel T. Martin |
2024-02-20 |
| 11792210 |
Mapping unbounded incident scores to a fixed range |
Sseziwa A. Mukasa |
2023-10-17 |
| 11588832 |
Malicious incident visualization |
Thomas R. Hobson, Hyacinth D. Diehl, Alexander J. Graul |
2023-02-21 |
| 11582246 |
Advanced incident scoring |
— |
2023-02-14 |
| 11277423 |
Anomaly-based malicious-behavior detection |
— |
2022-03-15 |
| 11086987 |
Malware detection in event loops |
— |
2021-08-10 |
| 11063966 |
Data-graph information retrieval using automata |
David F. Diehl |
2021-07-13 |
| 10983995 |
Information retrieval using automata |
David F. Diehl |
2021-04-20 |
| 10803172 |
Malicious/benign computational behavior detection using canonic patterns of behavior |
David F. Diehl, Aaron Javon Marks, Kirby Koster, Daniel T. Martin |
2020-10-13 |
| 10685111 |
File-modifying malware detection |
— |
2020-06-16 |
| 10635806 |
Least recently used (LRU)-based event suppression |
— |
2020-04-28 |
| 10243972 |
Correlation-based detection of exploit activity |
— |
2019-03-26 |
| 10216934 |
Inferential exploit attempt detection |
Ion-Alexandru Ionescu, Loren C. Robinson |
2019-02-26 |
| 7357955 |
Acid beverage composition utilizing an aqueous protein component |
Cheng Shen, Theresa Cox, Jonathan W. Delcamp |
2008-04-15 |