AO

Alina Oprea

EM Emc: 21 patents #120 of 3,345Top 4%
EC Emc Ip Holding Company: 10 patents #463 of 4,608Top 15%
UH University Of North Carolina At Chapel Hill: 2 patents #408 of 1,688Top 25%
IN Intel: 2 patents #13,213 of 30,777Top 45%
DE Decho: 1 patents #14 of 25Top 60%
DL Draper Laboratory: 1 patents #495 of 921Top 55%
Overall (All Time): #97,627 of 4,157,543Top 3%
35
Patents All Time

Issued Patents All Time

Showing 1–25 of 35 patents

Patent #TitleCo-InventorsDate
12144562 Systems and methods for surgical navigation with a tracker instrument Andre Novomir Hladio, Kevin Morency, Samantha McCabe 2024-11-19
11259878 Systems and methods for surgical navigation with a tracker instrument Andre Novomir Hladio, Kevin Morency, Samantha McCabe 2022-03-01
10635824 Methods and apparatus for private set membership using aggregation for reduced communications Nikolaos Triandopoulos, Kevin D. Bowers, James A. Kelley, Ronald L. Rivest 2020-04-28
10122742 Classifying software modules based on comparisons using a neighborhood distance metric Zhou Li, Ahmet Buyukkayhan 2018-11-06
10063562 Flexible access management framework based on measuring application usage behavior Andres D. Molina-Markham, Kevin D. Bowers 2018-08-28
9998484 Classifying potentially malicious and benign software modules through similarity analysis Ahmet Buyukkayhan, Zhou Li, Martin Rosa 2018-06-12
9838407 Detection of malicious web activity in enterprise computer networks Zhou Li, Robin Norris, Kevin D. Bowers 2017-12-05
9674210 Determining risk of malware infection in enterprise hosts Ting-Fang Yen, Viktor Heorhiadi, Michael Kendrick Reiter, Ari Juels 2017-06-06
9635049 Detection of suspicious domains through graph inference algorithm processing of host-domain contacts Zhou Li, Sang H. Chin, Ting-Fang Yen 2017-04-25
9621576 Detecting malicious websites Sumayah Alrwais, Kevin D. Bowers, Todd Leetham, Zhou Li, Ronald L. Rivest 2017-04-11
9516039 Behavioral detection of suspicious host activities in an enterprise Ting-Fang Yen, Kaan Onarlioglu, Todd Leetham, William Gordon Robertson, Ari Juels +1 more 2016-12-06
9503468 Detecting suspicious web traffic from an enterprise network Ting-Fang Yen, Kaan Onarlioglu 2016-11-22
9471777 Scheduling of defensive security actions in information processing systems Ari Juels, Marten Van Dijk, Ronald L. Rivest 2016-10-18
9430501 Time sanitization of network logs from a geographically distributed computer system Ting-Fang Yen, Ari Juels, Kaan Onarlioglu 2016-08-30
9378361 Anomaly sensor framework for detecting advanced persistent threat attacks Ting-Fang Yen, Ari Juels, Aditya Kuppa, Kaan Onarlioglu 2016-06-28
9338187 Modeling user working time using authentication events within an enterprise network Ting-Fang Yen 2016-05-10
9323765 Scalable cloud file system with efficient integrity checks Emil P. Stefanov, Marten Van Dijk, Ari Juels 2016-04-26
9256725 Credential recovery with the assistance of trusted entities Kevin D. Bowers, Nikolaos Triandopoulos, Ting-Fang Yen, Ari Juels 2016-02-09
9231962 Identifying suspicious user logins in enterprise networks Ting-Fang Yen 2016-01-05
9230114 Remote verification of file protections for cloud data storage Ari Juels, Marten Van Dijk, Emil P. Stefanov 2016-01-05
9049221 Detecting suspicious web traffic from an enterprise network Ting-Fang Yen, Kaan Onarlioglu 2015-06-02
9009385 Co-residency detection in a cloud-based system Ari Juels, Michael Kendrick Reiter, Yinqian Zhang 2015-04-14
8984363 Proof of retrievability for archived files Ari Juels, Burton S. Kaliski, Jr., Kevin D. Bowers 2015-03-17
8984384 Distributed storage system with efficient handling of file updates Ari Juels, Kevin D. Bowers 2015-03-17
8978159 Methods and apparatus for mediating access to derivatives of sensitive data Marten Van Dijk, Samuel J. Curry, Robert D. Hopley, John G. Linn, Kenneth D. Ray 2015-03-10