AS

Angelos Stavrou

GM George Mason: 13 patents #5 of 65Top 8%
CU Columbia University: 12 patents #89 of 2,492Top 4%
GP George Mason Intellectual Properties: 1 patents #69 of 158Top 45%
📍 Springfield, VA: #10 of 553 inventorsTop 2%
🗺 Virginia: #653 of 34,511 inventorsTop 2%
Overall (All Time): #116,933 of 4,157,543Top 3%
31
Patents All Time

Issued Patents All Time

Showing 1–25 of 31 patents

Patent #TitleCo-InventorsDate
11916933 Malware detector Sushil Jajodia, Anup K. Ghosh, Rhandi Martin, Charalampos Andrianakis 2024-02-27
11330000 Malware detector Sushil Jajodia, Anup K. Ghosh, Rhandi Martin, Charalampos Andrianakis 2022-05-10
11310252 Methods and apparatus for application isolation Anup K. Ghosh, Yih Huang, Jiang Wang 2022-04-19
10776463 Active authentication of users Rahul Murmuria, Ryan Johnson, Daniel Barbara 2020-09-15
10567414 Methods and apparatus for application isolation Anup K. Ghosh, Yih Huang, Jiang Wang 2020-02-18
10387627 Systems and methods for analyzing software Ryan Johnson, Nikolaos Kiourtis 2019-08-20
10289819 Active authentication of users Rahul Murmuria, Ryan Johnson, Daniel Barbara 2019-05-14
10243975 Malware detector Sushil Jajodia, Anup K. Ghosh, Rhandi Martin, Charalampos Andrianakis 2019-03-26
10187417 Methods and apparatus for application isolation Anup K. Ghosh, Yih Huang, Jiang Wang 2019-01-22
10178113 Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models Gabriela F. Ciocarlie, Salvatore J. Stolfo, Angelos D. Keromytis 2019-01-08
10127137 Methods and systems for increased debugging transparency Fengwei Zhang, Kevin Leach, Haining Wang 2018-11-13
9992222 Systems and methods for inhibiting attacks with a network Angelos D. Keromytis 2018-06-05
9871812 Methods and apparatus for application isolation Anup K. Ghosh, Yih Huang, Jiang Wang 2018-01-16
9602524 Methods and apparatus for application isolation Anup K. Ghosh, Yih Huang, Jiang Wang 2017-03-21
9531747 Malware detector Sushil Jajodia, Anup K. Ghosh, Rhandi Martin, Charalampos Andrianakis 2016-12-27
9344418 Systems and methods for inhibiting attacks with a network Angelos D. Keromytis 2016-05-17
9270697 Hardware-assisted integrity monitor Anup K. Ghosh, Kun Sun, Jiang Wang 2016-02-23
9218254 Systems, methods, and media for recovering an application from a fault or attack Michael E. Locasto, Angelos D. Keromytis, Gabriela F. Ciocarlie 2015-12-22
9098698 Methods and apparatus for application isolation Anup K. Ghosh, Yih Huang, Jiang Wang 2015-08-04
9088596 Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models Gabriela F. Ciocarlie, Salvatore J. Stolfo, Angelos D. Keromytis 2015-07-21
9043818 Adaptive feedback loop based on a sensor for streaming static and interactive media content to animals Margaret Lee Perry-Flippin 2015-05-26
8935773 Malware detector Sushil Jajodia, Anup K. Ghosh, Rhandi Martin, Charalampos Andrianakis 2015-01-13
8924782 Systems, methods, and media for recovering an application from a fault or attack Michael E. Locasto, Angelos D. Keromytis, Gabriela F. Ciocarlie 2014-12-30
8819225 Hardware-assisted integrity monitor Jiang Wang, Anup K. Ghosh, Kun Sun 2014-08-26
8726005 Website matching based on network traffic Mohammed A. Alhussein, Brian Sanders 2014-05-13