Issued Patents All Time
Showing 1–25 of 32 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11775637 | Recurrent neural network based anomaly detection | Heqing Huang, Taesung Lee, Ian M. Molloy, Zhongshu Gu, Jialong Zhang | 2023-10-03 |
| 11301563 | Recurrent neural network based anomaly detection | Heqing Huang, Taesung Lee, Ian M. Molloy, Zhongshu Gu, Jialong Zhang | 2022-04-12 |
| 10958672 | Cognitive offense analysis using contextual data and knowledge graphs | William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Youngja Park +1 more | 2021-03-23 |
| 10891371 | Detecting malicious user activity | Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Wilfried Teiken | 2021-01-12 |
| 10599837 | Detecting malicious user activity | Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Wilfried Teiken | 2020-03-24 |
| 10546121 | Security within a software-defined infrastructure | Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom +5 more | 2020-01-28 |
| 10542015 | Cognitive offense analysis using contextual data and knowledge graphs | William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Youngja Park +1 more | 2020-01-21 |
| 10534911 | Security within a software-defined infrastructure | Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom +5 more | 2020-01-14 |
| 10503911 | Automatic generation of data-centric attack graphs | Suresh N. Chari, Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis | 2019-12-10 |
| 10482265 | Data-centric monitoring of compliance of distributed applications | Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis +1 more | 2019-11-19 |
| 10375101 | Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure | Stefan Berger, Yangyi Chen, Xin Hu, Dimitrious Pendarakis, Reiner Sailer +2 more | 2019-08-06 |
| 10108803 | Automatic generation of data-centric attack graphs | Suresh N. Chari, Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis | 2018-10-23 |
| 10043007 | Security within a software-defined infrastructure | Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom +5 more | 2018-08-07 |
| 9854057 | Network data collection and response system | Suresh N. Chari, Pau-Chen Cheng, Xin Hu, Lawrence Koved, Reiner Sailer +3 more | 2017-12-26 |
| 9832217 | Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure | Stefan Berger, Yangyi Chen, Xin Hu, Dimitrios Pendarakis, Reiner Sailer +2 more | 2017-11-28 |
| 9652612 | Security within a software-defined infrastructure | Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom +5 more | 2017-05-16 |
| 9582674 | Risk adaptive information flow based access control | Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser | 2017-02-28 |
| 9185121 | Detecting malicious circumvention of virtual private network | Suresh N. Chari, Willliam J. Rippon, Wilfried Teiken, Wietse Z. Venema | 2015-11-10 |
| 9129108 | Systems, methods and computer programs providing impact mitigation of cyber-security failures | Youssef Drissi, Rick A. Hamilton, II, Colin G. Harrison, Jack L. Kouloheris, Pratap C. Pattnaik +1 more | 2015-09-08 |
| 9032521 | Adaptive cyber-security analytics | Lisa Amini, Mihai Christodorescu, Mitchell A. Cohen, Srinivasan Parthasarathy, Reiner Sailer +3 more | 2015-05-12 |
| 8972510 | Method and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network | Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales | 2015-03-03 |
| 8938511 | Method and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network | Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales | 2015-01-20 |
| 8650623 | Risk adaptive information flow based access control | Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser | 2014-02-11 |
| 8560722 | System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values | Stephen C. Gates, Youngja Park, Wilfried Teiken | 2013-10-15 |
| 8135766 | Method, apparatus and system for resistance to side channel attacks on random number generators | Suresh N. Chari, Vincenzo V. Diluoffo, Paul A. Karger, Elaine R. Palmer, Tal Rabin +4 more | 2012-03-13 |