Issued Patents All Time
Showing 26–42 of 42 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9489379 | Predicting data unavailability and data loss events in large database systems | Ben Wu, Deepesh Chaudhary, Lubomir P. Petrov, Sagy Volkov | 2016-11-08 |
| 9479518 | Low false positive behavioral fraud detection | Chunsheng Fang | 2016-10-25 |
| 9460390 | Analyzing device similarity | Alon Kaufman, Yael Villa | 2016-10-04 |
| 9369479 | Detection of malware beaconing activities | — | 2016-06-14 |
| 9344442 | Finding command and control center computers by communication link tracking | Jin Yu | 2016-05-17 |
| 9344443 | Finding command and control center computers by communication link tracking | Jin Yu | 2016-05-17 |
| 9292793 | Analyzing device similarity | Yael Villa, Alon Kaufman | 2016-03-22 |
| 9244711 | Virtual machine capacity planning | Anirudh Kondaveeti | 2016-01-26 |
| 9202052 | Dynamic graph anomaly detection framework and scalable system architecture | Chunsheng Fang, Teng Wang | 2015-12-01 |
| 9195826 | Graph-based method to detect malware command-and-control infrastructure | Chunsheng Fang, Joseph Auguste Zadeh | 2015-11-24 |
| 9189623 | Historical behavior baseline modeling and anomaly detection in machine generated end to end event log | Chunsheng Fang | 2015-11-17 |
| 9112895 | Anomaly detection system for enterprise network security | — | 2015-08-18 |
| 9060018 | Finding command and control center computers by communication link tracking | Jin Yu | 2015-06-16 |
| 9038178 | Detection of malware beaconing activities | — | 2015-05-19 |
| 8925058 | Authentication involving authentication operations which cross reference authentication factors | Yedidya Dotan, William M. Duane, John G. Linn, Roy Hodgman | 2014-12-30 |
| 8880441 | Click stream analysis for fraud detection | Jidong Chen, Alon Kaufman, Yael Villa | 2014-11-04 |
| 8479302 | Access control via organization charts | — | 2013-07-02 |