| 12316652 |
Invoking response(s) based on analysis of a dataset obtained from searching a security endpoint |
Sulakshan Vajipayajula, Xiaokui Shu |
2025-05-27 |
| 12267404 |
Transparent inline content inspection and modification in a TCP session |
Gregory L. Galloway, David Allen Dennerline, Steven Mazur |
2025-04-01 |
| 11522880 |
Analytics engine for data exploration and analytics |
Sulakshan Vajipayajula, James B. Peterson, Michael Vu Le, Ian M. Molloy |
2022-12-06 |
| 10742499 |
Distributed dynamic sizing and load self-management for a relay infrastructure |
Bradford A. Fisher, Nathan P. Frith, Jian Lin |
2020-08-11 |
| 10708348 |
High availability in packet processing for high-speed networks |
Gregory L. Galloway, Cheng-Ta Lee, Wei-Shiau Suen, Ming-Hsun Wu |
2020-07-07 |
| 10397054 |
Distributed dynamic sizing and load self-management for a relay infrastructure |
Bradford A. Fisher, Nathan P. Frith, Jian Lin |
2019-08-27 |
| 10382591 |
Transparent inline content inspection and modification in a TCP session |
Gregory L. Galloway, David Allen Dennerline, Steven Mazur |
2019-08-13 |
| 9961103 |
Intercepting, decrypting and inspecting traffic over an encrypted channel |
Ronald B. Williams, John William Court, Gregory L. Galloway, Matthew Joseph Kubilus, Steven Mazur +1 more |
2018-05-01 |
| 7177295 |
Wireless routing protocol for ad-hoc networks |
Peter Sholander, Tracey Oakes |
2007-02-13 |