Issued Patents All Time
Showing 25 most recent of 49 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12045713 | Detecting adversary attacks on a deep neural network (DNN) | Jialong Zhang, Zhongshu Gu, Jiyong Jang, Ian M. Molloy | 2024-07-23 |
| 11947956 | Software intelligence as-a-service | Jiyong Jang, Dhilung Hang Kirat | 2024-04-02 |
| 11941054 | Iterative constraint solving in abstract graph matching for cyber incident reasoning | Xiaokui Shu, Douglas Lee Schales, Frederico Araujo | 2024-03-26 |
| 11936661 | Detecting malicious beaconing communities using lockstep detection and co-occurrence graph | Jiyong Jang, Dhilung Hang Kirat, Bum Jun Kwon, Douglas Lee Schales | 2024-03-19 |
| 11829879 | Detecting adversarial attacks through decoy training | Jialong Zhang, Frederico Araujo, Teryl Paul Taylor | 2023-11-28 |
| 11818145 | Characterizing user behavior in a computer system by automated learning of intention embedded in a system-generated event graph | Xiaorui Pan, Xiaokui Shu, Dhilung Hang Kirat, Jiyong Jang | 2023-11-14 |
| 11775638 | Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views | Frederico Araujo, Anne E. Kohlbrenner, Teryl Paul Taylor | 2023-10-03 |
| 11632393 | Detecting and mitigating malware by evaluating HTTP errors | Jialong Zhang, Jiyong Jang | 2023-04-18 |
| 11544527 | Fuzzy cyber detection pattern matching | Xiaokui Shu, Zhongshu Gu, Hani T. Jamjoom | 2023-01-03 |
| 11533325 | Automatic categorization of IDPS signatures from multiple different IDPS systems | Xin Hu, Jiyong Jang, Douglas Lee Schales, Ting Wang | 2022-12-20 |
| 11520939 | Protecting computer systems from malicious USB devices via a USB firewall | Anton Beitler, Jiyong Jang, Dhilung Hang Kirat, Anil Kurmus, Matthias Neugschwandtner | 2022-12-06 |
| 11501156 | Detecting adversarial attacks through decoy training | Jialong Zhang, Frederico Araujo, Teryl Paul Taylor | 2022-11-15 |
| 11368470 | Real-time alert reasoning and priority-based campaign discovery | Yushan Liu, Xiaokui Shu, Douglas Lee Schales | 2022-06-21 |
| 11330007 | Graphical temporal graph pattern editor | Alexander Fong, Xiaokui Shu | 2022-05-10 |
| 11184374 | Endpoint inter-process activity extraction and pattern matching | Xiaokui Shu, Zhongshu Gu, Heqing Huang, Jialong Zhang | 2021-11-23 |
| 11163878 | Integrity, theft protection and cyber deception using a deception-based filesystem | Frederico Araujo, Douglas Lee Schales, Teryl Paul Taylor | 2021-11-02 |
| 11144642 | Deactivating evasive malware | Zhongshu Gu, Heqing Huang, Jiyong Jang, Dhilung Hang Kirat, Xiaokui Shu +1 more | 2021-10-12 |
| 11089040 | Cognitive analysis of security data with signal flow-based graph exploration | Jiyong Jang, Dhilung Hang Kirat, Youngja Park | 2021-08-10 |
| 11082434 | Inferring temporal relationships for cybersecurity events | Preeti Ravindra, Youngja Park, Dhilung Hang Kirat, Jiyong Jang | 2021-08-03 |
| 11032251 | AI-powered cyber data concealment and targeted mission execution | Dhilung Hang Kirat, Jiyong Jang | 2021-06-08 |
| 11025656 | Automatic categorization of IDPS signatures from multiple different IDPS systems | Xin Hu, Jiyong Jang, Douglas Lee Schales, Ting Wang | 2021-06-01 |
| 10979453 | Cyber-deception using network port projection | Frederico Araujo, Douglas Lee Schales, Teryl Paul Taylor | 2021-04-13 |
| 10958672 | Cognitive offense analysis using contextual data and knowledge graphs | William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Youngja Park +1 more | 2021-03-23 |
| 10956566 | Multi-point causality tracking in cyber incident reasoning | Xiaokui Shu, Douglas Lee Schales | 2021-03-23 |
| 10887346 | Application-level sandboxing | Frederico Araujo, Douglas Lee Schales, Teryl Paul Taylor | 2021-01-05 |