| 9208321 |
Method for administration of computer security threat countermeasures to a computer system |
Jeffrey Scott Bardsley, Charles K. Davis, III, Nathaniel Kim, John J. McKenna, Carlos F. Villegas |
2015-12-08 |
| 8676923 |
Use of discovery scanning and method of IP only communication to identify owners and administrators of network attached devices |
Charles S. Lingafelt, Scott Alex Creeley, Charles Victor Jolla, Mark Alan Techmeier, Ronald Jerome Walter |
2014-03-18 |
| 7845004 |
Correlating network information and intrusion information to find the entry point of an attack upon a protected computer |
Jeffrey Scott Bardsley, Nathaniel Kim, Charles S. Lingafelt |
2010-11-30 |
| 7730537 |
Method of operating an intrusion detection system |
Jeffrey Scott Bardsley, Nathaniel Kim, Charles S. Lingafelt |
2010-06-01 |
| 7386883 |
Systems, methods and computer program products for administration of computer security threat countermeasures to a computer system |
Jeffrey Scott Bardsley, Charles K. Davis, III, Nathaniel Kim, John J. McKenna, Carlos F. Villegas |
2008-06-10 |
| 7370345 |
Domain controlling systems, methods and computer program products for administration of computer security threat countermeasures to a domain of target computer systems |
Jeffrey Scott Bardsley, Charles K. Davis, III, Nathaniel Kim, John J. McKenna, Carlos F. Villegas |
2008-05-06 |
| 7308714 |
Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack |
Jeffrey Scott Bardsley, Nathaniel Kim, Charles S. Lingafelt |
2007-12-11 |
| 7150043 |
Intrusion detection method and signature table |
Nathaniel Kim, Kevin Thomas McClain |
2006-12-12 |
| 6928549 |
Dynamic intrusion detection for computer systems |
Nathaniel Kim, Charles S. Lingafelt |
2005-08-09 |