| 11228612 |
Identifying cyber adversary behavior |
Sulakshan Vajipayajula, Stephen C. Will, Ilgen Banu Yuceer, Kevin Tabb |
2022-01-18 |
| 11171982 |
Optimizing ingestion of structured security information into graph databases for security analytics |
Sulakshan Vajipayajula, Stephen C. Will, Dhilung Hang Kirat, Anne Tilstra |
2021-11-09 |
| 11082414 |
Context aware recertification |
Manjeri Ramanathan Dharmarajan, Vigneshwarnath Miriyala, Nataraj Nagaratnam, Darshini G. Swamy, Suyesh R. Tiwari |
2021-08-03 |
| 11050773 |
Selecting security incidents for advanced automatic analysis |
Stephen C. Will, Kevin Tabb, Ilgen Banu Yuceer, Sulakshan Vajipayajula |
2021-06-29 |
| 10834100 |
Dynamically defined virtual private network tunnels in hybrid cloud environments |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam |
2020-11-10 |
| 10713031 |
Enforcing security policies for software containers |
Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam, Sulakshan Vajipayajula |
2020-07-14 |
| 10673885 |
User state tracking and anomaly detection in software-as-a-service environments |
Ravi Krishnan Muthukrishnan, Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Nataraj Nagaratnam |
2020-06-02 |
| 10673900 |
Application-based security rights in cloud environments |
Nataraj Nagaratnam, Jeffrey R. Hoy, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer |
2020-06-02 |
| 10628682 |
Augmenting gesture based security technology using mobile devices |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam |
2020-04-21 |
| 10505904 |
Dynamically defined virtual private network tunnels in hybrid cloud environments |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam |
2019-12-10 |
| 10367837 |
Optimizing security analyses in SaaS environments |
Dhilung Hang Kirat, Youngja Park, Marc Philippe Stoecklin, Sulakshan Vajipayajula |
2019-07-30 |
| 10255054 |
Enforcing security policies for software containers |
Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam, Sulakshan Vajipayajula |
2019-04-09 |
| 10244002 |
Secure application zones for cloud burst environments |
Jeffrey R. Hoy, Nataraj Nagaratnam, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer |
2019-03-26 |
| 10237064 |
Using everyday objects as cryptographic keys |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam |
2019-03-19 |
| 10200387 |
User state tracking and anomaly detection in software-as-a-service environments |
Ravi Krishnan Muthukrishnan, Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Nataraj Nagaratnam |
2019-02-05 |
| 10142293 |
Dynamically defined virtual private network tunnels in hybrid cloud environments |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam |
2018-11-27 |
| 10084804 |
Optimizing security analyses in SaaS environment |
Dhilung Hang Kirat, Youngja Park, Marc Philippe Stoecklin, Sulakshan Vajipayajula |
2018-09-25 |
| 10028139 |
Leveraging mobile devices to enforce restricted area security |
Sreekanth Ramakrishna Iyer, Jeffrey R. Hoy, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam |
2018-07-17 |
| 9916461 |
Identity context-based access control |
Rahul Prabhakar Kulkarni, Nataraj Nagaratnam, Anindya Neogi, Magesh Rajamani |
2018-03-13 |
| 9912477 |
Using everyday objects as cryptographic keys |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam |
2018-03-06 |
| 9888040 |
Secure application zones for cloud burst environments |
Jeffrey R. Hoy, Nataraj Nagaratnam, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer |
2018-02-06 |
| 9875399 |
Augmenting gesture based security technology for improved classification and learning |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam |
2018-01-23 |
| 9762616 |
Application-based security rights in cloud environments |
Nataraj Nagaratnam, Jeffrey R. Hoy, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer |
2017-09-12 |
| 9756173 |
Leveraging mobile devices to enforce restricted area security |
Sreekanth Ramakrishna Iyer, Jeffrey R. Hoy, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam |
2017-09-05 |
| 9729318 |
Using everyday objects as cryptographic keys |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam |
2017-08-08 |