JR

Josyula R. Rao

IBM: 32 patents #3,111 of 70,183Top 5%
📍 Briarcliff Manor, NY: #26 of 223 inventorsTop 15%
🗺 New York: #3,677 of 115,490 inventorsTop 4%
Overall (All Time): #112,363 of 4,157,543Top 3%
32
Patents All Time

Issued Patents All Time

Showing 1–25 of 32 patents

Patent #TitleCo-InventorsDate
11775637 Recurrent neural network based anomaly detection Heqing Huang, Taesung Lee, Ian M. Molloy, Zhongshu Gu, Jialong Zhang 2023-10-03
11301563 Recurrent neural network based anomaly detection Heqing Huang, Taesung Lee, Ian M. Molloy, Zhongshu Gu, Jialong Zhang 2022-04-12
10958672 Cognitive offense analysis using contextual data and knowledge graphs William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Youngja Park +1 more 2021-03-23
10891371 Detecting malicious user activity Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Wilfried Teiken 2021-01-12
10599837 Detecting malicious user activity Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Wilfried Teiken 2020-03-24
10546121 Security within a software-defined infrastructure Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom +5 more 2020-01-28
10542015 Cognitive offense analysis using contextual data and knowledge graphs William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Youngja Park +1 more 2020-01-21
10534911 Security within a software-defined infrastructure Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom +5 more 2020-01-14
10503911 Automatic generation of data-centric attack graphs Suresh N. Chari, Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis 2019-12-10
10482265 Data-centric monitoring of compliance of distributed applications Suresh N. Chari, Ted A. Habeck, Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis +1 more 2019-11-19
10375101 Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure Stefan Berger, Yangyi Chen, Xin Hu, Dimitrious Pendarakis, Reiner Sailer +2 more 2019-08-06
10108803 Automatic generation of data-centric attack graphs Suresh N. Chari, Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis 2018-10-23
10043007 Security within a software-defined infrastructure Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom +5 more 2018-08-07
9854057 Network data collection and response system Suresh N. Chari, Pau-Chen Cheng, Xin Hu, Lawrence Koved, Reiner Sailer +3 more 2017-12-26
9832217 Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure Stefan Berger, Yangyi Chen, Xin Hu, Dimitrios Pendarakis, Reiner Sailer +2 more 2017-11-28
9652612 Security within a software-defined infrastructure Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom +5 more 2017-05-16
9582674 Risk adaptive information flow based access control Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser 2017-02-28
9185121 Detecting malicious circumvention of virtual private network Suresh N. Chari, Willliam J. Rippon, Wilfried Teiken, Wietse Z. Venema 2015-11-10
9129108 Systems, methods and computer programs providing impact mitigation of cyber-security failures Youssef Drissi, Rick A. Hamilton, II, Colin G. Harrison, Jack L. Kouloheris, Pratap C. Pattnaik +1 more 2015-09-08
9032521 Adaptive cyber-security analytics Lisa Amini, Mihai Christodorescu, Mitchell A. Cohen, Srinivasan Parthasarathy, Reiner Sailer +3 more 2015-05-12
8972510 Method and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales 2015-03-03
8938511 Method and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales 2015-01-20
8650623 Risk adaptive information flow based access control Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser 2014-02-11
8560722 System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values Stephen C. Gates, Youngja Park, Wilfried Teiken 2013-10-15
8135766 Method, apparatus and system for resistance to side channel attacks on random number generators Suresh N. Chari, Vincenzo V. Diluoffo, Paul A. Karger, Elaine R. Palmer, Tal Rabin +4 more 2012-03-13