| 11947694 |
Dynamic virtual honeypot utilizing honey tokens and data masking |
Richard Ory Jerrell, Chun-Shuo Lin, Wei-Hsiang Hsiung, Cheng-Ta Lee, Wei-Jie Liau |
2024-04-02 |
| 11847122 |
Unique SQL query transfer for anomaly detection |
Cheng-Ta Lee, Chun-Shuo Lin, Richard Ory Jerrell, Leonid Rodniansky |
2023-12-19 |
| 11562095 |
Reinforcing SQL transactions dynamically to prevent injection attacks |
Leonid Rodniansky, Cheng-Ta Lee, Chun-Shuo Lin, Richard Ory Jerrell |
2023-01-24 |
| 11502855 |
Certificate mirroring |
Richard Ory Jerrell, Mae Rockar |
2022-11-15 |
| 11334569 |
Unique SQL query transfer for anomaly detection |
Cheng-Ta Lee, Chun-Shuo Lin, Richard Ory Jerrell, Leonid Rodniansky |
2022-05-17 |
| 11283880 |
Termination of database connection |
Richard Ory Jerrell, Chun-Shuo Lin, Cheng-Ta Lee |
2022-03-22 |
| 11228607 |
Graceful termination of security-violation client connections in a network protection system (NPS) |
Leonid Rodniansky, Viktor Ginzburg, Richard Ory Jerrell |
2022-01-18 |
| 10742657 |
Accessing shared resources without system groups |
Richard Ory Jerrell, Paul S. Spencer |
2020-08-11 |
| 9069628 |
Spooling system call data to facilitate data transformation |
Richard Ory Jerrell, Ury Segal |
2015-06-30 |