| 12316652 |
Invoking response(s) based on analysis of a dataset obtained from searching a security endpoint |
Sulakshan Vajipayajula, Paul Coccoli |
2025-05-27 |
| 12141704 |
Neural flow attestation |
Zhongshu Gu, Hani T. Jamjoom, Tengfei Ma |
2024-11-12 |
| 11941054 |
Iterative constraint solving in abstract graph matching for cyber incident reasoning |
Douglas Lee Schales, Marc Philippe Stoecklin, Frederico Araujo |
2024-03-26 |
| 11818145 |
Characterizing user behavior in a computer system by automated learning of intention embedded in a system-generated event graph |
Xiaorui Pan, Dhilung Hang Kirat, Jiyong Jang, Marc Philippe Stoecklin |
2023-11-14 |
| 11783201 |
Neural flow attestation |
Zhongshu Gu, Hani T. Jamjoom, Tengfei Ma |
2023-10-10 |
| 11544527 |
Fuzzy cyber detection pattern matching |
Zhongshu Gu, Marc Philippe Stoecklin, Hani T. Jamjoom |
2023-01-03 |
| 11368470 |
Real-time alert reasoning and priority-based campaign discovery |
Yushan Liu, Douglas Lee Schales, Marc Philippe Stoecklin |
2022-06-21 |
| 11330007 |
Graphical temporal graph pattern editor |
Alexander Fong, Marc Philippe Stoecklin |
2022-05-10 |
| 11184374 |
Endpoint inter-process activity extraction and pattern matching |
Zhongshu Gu, Heqing Huang, Marc Philippe Stoecklin, Jialong Zhang |
2021-11-23 |
| 11144642 |
Deactivating evasive malware |
Zhongshu Gu, Heqing Huang, Jiyong Jang, Dhilung Hang Kirat, Marc Philippe Stoecklin +1 more |
2021-10-12 |
| 10956566 |
Multi-point causality tracking in cyber incident reasoning |
Douglas Lee Schales, Marc Philippe Stoecklin |
2021-03-23 |
| 10643141 |
User action prediction |
Nikolay Laptev |
2020-05-05 |
| 10631168 |
Advanced persistent threat (APT) detection in a mobile device |
Suresh N. Chari, Zhongshu Gu, Heqing Huang, Jialong Zhang |
2020-04-21 |
| 10546128 |
Deactivating evasive malware |
Zhongshu Gu, Heqing Huang, Jiyong Jang, Dhilung Hang Kirat, Marc Philippe Stoecklin +1 more |
2020-01-28 |