Issued Patents All Time
Showing 1–20 of 20 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11947956 | Software intelligence as-a-service | Jiyong Jang, Marc Philippe Stoecklin | 2024-04-02 |
| 11936661 | Detecting malicious beaconing communities using lockstep detection and co-occurrence graph | Jiyong Jang, Bum Jun Kwon, Douglas Lee Schales, Marc Philippe Stoecklin | 2024-03-19 |
| 11818145 | Characterizing user behavior in a computer system by automated learning of intention embedded in a system-generated event graph | Xiaorui Pan, Xiaokui Shu, Jiyong Jang, Marc Philippe Stoecklin | 2023-11-14 |
| 11520939 | Protecting computer systems from malicious USB devices via a USB firewall | Anton Beitler, Jiyong Jang, Anil Kurmus, Matthias Neugschwandtner, Marc Philippe Stoecklin | 2022-12-06 |
| 11171982 | Optimizing ingestion of structured security information into graph databases for security analytics | Sulakshan Vajipayajula, Stephen C. Will, Kaushal Kiran Kapadia, Anne Tilstra | 2021-11-09 |
| 11144642 | Deactivating evasive malware | Zhongshu Gu, Heqing Huang, Jiyong Jang, Xiaokui Shu, Marc Philippe Stoecklin +1 more | 2021-10-12 |
| 11089040 | Cognitive analysis of security data with signal flow-based graph exploration | Jiyong Jang, Youngja Park, Marc Philippe Stoecklin | 2021-08-10 |
| 11082434 | Inferring temporal relationships for cybersecurity events | Preeti Ravindra, Youngja Park, Jiyong Jang, Marc Philippe Stoecklin | 2021-08-03 |
| 11032251 | AI-powered cyber data concealment and targeted mission execution | Jiyong Jang, Marc Philippe Stoecklin | 2021-06-08 |
| 10958672 | Cognitive offense analysis using contextual data and knowledge graphs | William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Youngja Park, Josyula R. Rao +1 more | 2021-03-23 |
| 10887323 | Detecting malicious beaconing communities using lockstep detection and co-occurrence graph | Jiyong Jang, Bum Jun Kwon, Douglas Lee Schales, Marc Philippe Stoecklin | 2021-01-05 |
| 10686830 | Corroborating threat assertions by consolidating security and threat intelligence with kinetics data | Jiyong Jang, Youngja Park, Marc Philippe Stoecklin | 2020-06-16 |
| 10681061 | Feedback-based prioritized cognitive analysis | Jiyong Jang, Marc Philippe Stoecklin | 2020-06-09 |
| 10546128 | Deactivating evasive malware | Zhongshu Gu, Heqing Huang, Jiyong Jang, Xiaokui Shu, Marc Philippe Stoecklin +1 more | 2020-01-28 |
| 10542015 | Cognitive offense analysis using contextual data and knowledge graphs | William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Youngja Park, Josyula R. Rao +1 more | 2020-01-21 |
| 10536472 | Cognitive analysis of security data with signal flow-based graph exploration | Jiyong Jang, Youngja Park, Marc Philippe Stoecklin | 2020-01-14 |
| 10367837 | Optimizing security analyses in SaaS environments | Kaushal Kiran Kapadia, Youngja Park, Marc Philippe Stoecklin, Sulakshan Vajipayajula | 2019-07-30 |
| 10313365 | Cognitive offense analysis using enriched graphs | Jiyong Jang, Youngja Park, Marc Philippe Stoecklin | 2019-06-04 |
| 10216673 | USB device firmware sanitization | Anton Beitler, Jiyong Jang, Anil Kurmus, Matthias Neugschwandtner, Marc Philippe Stoecklin | 2019-02-26 |
| 10084804 | Optimizing security analyses in SaaS environment | Kaushal Kiran Kapadia, Youngja Park, Marc Philippe Stoecklin, Sulakshan Vajipayajula | 2018-09-25 |