| 11783053 |
Entity behavior catalog architecture |
Raffael Marty, Alan Ross, Nicolas Christian Fischbach, Chad Anson |
2023-10-10 |
| 11675910 |
Using an entity behavior catalog when performing security operations |
Alan Ross, Raffael Marty, Nicolas Christian Fischbach, Chad Anson |
2023-06-13 |
| 11487883 |
Inferring a scenario when performing a security operation using an entity behavior catalog |
Raffael Marty, Alan Ross, Nicolas Christian Fischbach, Chad Anson |
2022-11-01 |
| 11295022 |
Entity behavior catalog architecture |
Raffael Marty, Alan Ross, Nicolas Christian Fischbach, Chad Anson |
2022-04-05 |
| 10776497 |
Assessment and analysis of software security flaws |
Christopher J. Wysopal, Christopher J. Eng |
2020-09-15 |
| 10542013 |
User behavior profile in a blockchain |
Richard A. Ford, Brandon L. Swafford, Christopher Brian Shirey, Richard Heath Thompson |
2020-01-21 |
| 10275600 |
Assessment and analysis of software security flaws |
Christopher J. Wysopal, Christopher J. Eng |
2019-04-30 |
| 10264012 |
User behavior profile |
Richard A. Ford, Christopher Brian Shirey, Brandon L. Swafford, Richard Heath Thompson |
2019-04-16 |
| 10171488 |
User behavior profile |
Richard A. Ford, Christopher Brian Shirey, Brandon L. Swafford, Richard Heath Thompson |
2019-01-01 |
| 10063568 |
User behavior profile in a blockchain |
Richard A. Ford, Brandon L. Swafford, Christopher Brian Shirey, Richard Heath Thompson |
2018-08-28 |
| 9882918 |
User behavior profile in a blockchain |
Richard A. Ford, Brandon L. Swafford, Christopher Brian Shirey, Richard Heath Thompson |
2018-01-30 |
| 9069967 |
Assessment and analysis of software security flaws |
Christopher J. Wysopal, Christopher J. Eng |
2015-06-30 |
| 8613080 |
Assessment and analysis of software security flaws in virtual machines |
Christopher J. Wysopal, Jon R. Stevenson |
2013-12-17 |
| 8499353 |
Assessment and analysis of software security flaws |
Malcolm W. Lockhart, Christopher J. Wysopal, Christopher J. Eng, Simeon Simeonov |
2013-07-30 |