| 10419474 |
Selection of countermeasures against cyber attacks |
Gustavo Gonzalez Granadillo |
2019-09-17 |
| 7891002 |
Generic method for detecting attack programs hidden in data chains |
Dominique Assing, Benjamin Morin |
2011-02-15 |
| 7810157 |
Method of managing alerts issued by intrusion detection sensors of an information security system |
Benjamin Morin |
2010-10-05 |
| 7571480 |
Presentation of correlated events as situation classes |
Steven Charles Black, John Michael Garrison |
2009-08-04 |
| 7506373 |
Method of automatically classifying a set of alarms emitted by sensors for detecting intrusions of an information security system |
Benjamin Morin, Elvis Tombini |
2009-03-17 |
| 7308689 |
Method, apparatus, and program for associating related heterogeneous events in an event handler |
Steven Charles Black, John Michael Garrison, Andreas Wespi |
2007-12-11 |
| 7278160 |
Presentation of correlated events as situation classes |
Steven Charles Black, John Michael Garrison |
2007-10-02 |
| 7149895 |
Personal device, terminal, server and methods for establishing a trustworthy connection between a user and a terminal |
Nadarajah Asokan, Michael Steiner, Michael Waidner |
2006-12-12 |
| 7039953 |
Hierarchical correlation of intrusion detection events |
Steven Charles Black, John Michael Garrison, Andreas Wespi |
2006-05-02 |
| 6928556 |
Method and apparatus in a data processing system for managing situations from correlated events |
Steven Charles Black, John Michael Garrison, RoseAnne Swart |
2005-08-09 |