| 12323436 |
Modulation and regulation of system event monitoring streams |
Frederico Araujo |
2025-06-03 |
| 11985165 |
Detecting web resources spoofing through stylistic fingerprints |
Xu Lin, Frederico Araujo |
2024-05-14 |
| 11829879 |
Detecting adversarial attacks through decoy training |
Jialong Zhang, Frederico Araujo, Marc Philippe Stoecklin |
2023-11-28 |
| 11775638 |
Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views |
Frederico Araujo, Anne E. Kohlbrenner, Marc Philippe Stoecklin |
2023-10-03 |
| 11748473 |
Intrusion detection in micro-services through container telemetry and behavior modeling |
Frederico Araujo, Jiyong Jang, Will Blair |
2023-09-05 |
| 11720667 |
Stateful microservice-aware intrusion detection |
Frederico Araujo, William Blair |
2023-08-08 |
| 11562086 |
Filesystem view separation for data confidentiality and integrity using lattice-based security domains |
Frederico Araujo, Marc Phillipe Stoecklin |
2023-01-24 |
| 11501156 |
Detecting adversarial attacks through decoy training |
Jialong Zhang, Frederico Araujo, Marc Philippe Stoecklin |
2022-11-15 |
| 11163878 |
Integrity, theft protection and cyber deception using a deception-based filesystem |
Frederico Araujo, Douglas Lee Schales, Marc Philippe Stoecklin |
2021-11-02 |
| 10979453 |
Cyber-deception using network port projection |
Frederico Araujo, Douglas Lee Schales, Marc Philippe Stoecklin |
2021-04-13 |
| 10887346 |
Application-level sandboxing |
Frederico Araujo, Douglas Lee Schales, Marc Philippe Stoecklin |
2021-01-05 |
| 10733292 |
Defending against model inversion attacks on neural networks |
Frederico Araujo, Jialong Zhang, Marc Philippe Stoecklin |
2020-08-04 |
| 10560471 |
Detecting web exploit kits by tree-based structural similarity search |
Xin Hu, Jiyong Jang, Fabian Monrose, Marc Philippe Stoecklin, Ting Wang |
2020-02-11 |
| 10528733 |
Integrity, theft protection and cyber deception using a deception-based filesystem |
Frederico Araujo, Douglas Lee Schales, Marc Philippe Stoecklin |
2020-01-07 |
| 10498763 |
On-demand injection of software booby traps in live processes |
Frederico Araujo, Douglas Lee Schales, Marc Philippe Stoecklin |
2019-12-03 |
| 9992217 |
Methods, systems, and computer readable media for detecting malicious network traffic |
Kevin Snow, Nathan Otterness, Fabian Monrose |
2018-06-05 |
| 9934379 |
Methods, systems, and computer readable media for detecting a compromised computing host |
Fabian Monrose, Srinivas Krishnan, John McHugh |
2018-04-03 |
| 9723016 |
Detecting web exploit kits by tree-based structural similarity search |
Xin Hu, Jiyong Jang, Fabian Monrose, Marc Philippe Stoecklin, Ting Wang |
2017-08-01 |
| 9516051 |
Detecting web exploit kits by tree-based structural similarity search |
Xin Hu, Jiyong Jang, Fabian Monrose, Marc Philippe Stoecklin, Ting Wang |
2016-12-06 |