| 12401673 |
Prioritization of attack techniques against an organization |
Constantin Mircea Adam, Muhammed Fatih Bulut |
2025-08-26 |
| 12386970 |
Combining policy compliance and vulnerability management for risk assessment |
Muhammed Faith Bulut, Abdulhamid Adebowale Adebayo, Lilian Mathias Ngweta, Ting Dai, Constantin Mircea Adam +1 more |
2025-08-12 |
| 12326941 |
Dynamic prioritization of vulnerability exclusion renewals |
Johnny Al Shaieb, Michael Redford, Jason A. Nikolai, Jason Bornheimer, Robert M. Maier +2 more |
2025-06-10 |
| 12058161 |
Vulnerability remediation complexity (VRC) system |
Johnny Al Shaieb, Jason A. Nikolai, Michael Redford, Jason Bornheimer, Robert M. Maier |
2024-08-06 |
| 12032702 |
Automated health-check risk assessment of computing assets |
Muhammed Fatih Bulut, Milton H. Hernandez, Robert Filepp, Sai Zeng, Srinivas B. Tummalapenta +1 more |
2024-07-09 |
| 11924239 |
Vulnerability and attack technique association |
Lilian Mathias Ngweta, Constantin Mircea Adam, Sai Zeng, Muhammed Fatih Bulut, Milton H. Hernandez |
2024-03-05 |
| 11621975 |
Prioritizing vulnerability scan results |
Nevenko Zunic, Tamer Aboualy, Johnny Al Shaieb |
2023-04-04 |
| 11057418 |
Prioritizing vulnerability scan results |
Nevenko Zunic, Tamer Aboualy, Johnny Al Shaieb |
2021-07-06 |
| 11048803 |
Portable security testing device |
Jason A. Nikolai, Johnny Al Shaieb |
2021-06-29 |
| 8756697 |
Systems and methods for determining vulnerability to session stealing |
Wendel Guglielmetti Henrique |
2014-06-17 |
| 7570625 |
Detection of wireless devices |
— |
2009-08-04 |
| 7499999 |
Security apparatus and method for local area networks |
Brian A. Lauer, David A. Dziadziola |
2009-03-03 |
| 7448076 |
Peer connected device for protecting access to local area networks |
Brian A. Lauer, David A. Dziadziola |
2008-11-04 |
| 7124197 |
Security apparatus and method for local area networks |
Brian A. Lauer, David A. Dziadziola |
2006-10-17 |