| 12058167 |
Model based methodology for translating high-level cyber threat descriptions into system-specific actionable defense tactics |
Kymie Tan, Jeremy L. Pecharich, Marc I. Pomerantz, Deniz E. Celik, Bryan Joseph Johnson +1 more |
2024-08-06 |
| 11860870 |
High efficiency data querying |
Eric Michael Machleder, Murabbat Riffaquat Hussain |
2024-01-02 |
| 11425157 |
Model based methodology for translating high-level cyber threat descriptions into system-specific actionable defense tactics |
Kymie Tan, Jeremy L. Pecharich, Marc I. Pomerantz, Deniz E. Celik, Bryan Joseph Johnson +1 more |
2022-08-23 |
| 11238031 |
Systems and methods of metadata monitoring and analysis |
Vilas Athavale, Swati Ajit Deshmukh, Ravinder Matte, Preksha Gupta |
2022-02-01 |
| 11188525 |
Systems and methods of platform-agnostic metadata analysis |
Vilas Athavale, Swati Ajit Deshmukh, Ravinder Matte, Preksha Gupta |
2021-11-30 |
| 8259726 |
Method and apparatus for forwarding table reduction |
Krishnamurthy Subramanian |
2012-09-04 |
| 8190960 |
Guaranteed inter-process communication |
Sachin Bahadur |
2012-05-29 |
| 7864706 |
Border gateway protocol peer dampening |
Kalpesh Zinjuwadia |
2011-01-04 |
| 6148000 |
Merging of data cells at network nodes |
Nancy Karen Feldman, Richard Woundy, Richard H. Boivie |
2000-11-14 |
| 6130889 |
Determining and maintaining hop-count for switched networks |
Nancy Karen Feldman, Richard Woundy, Richard H. Boivie |
2000-10-10 |
| 6069889 |
Aggregation of data flows on switched network paths |
Nancy Karen Feldman, Richard Woundy, Richard H. Boivie |
2000-05-30 |
| 6055561 |
Mapping of routing traffic to switching networks |
Nancy Karen Feldman, Richard Woundy, Richard H. Boivie |
2000-04-25 |