| 9654499 |
System and Method for mitigating TOC/TOU attacks in a cloud computing enviroment |
Angelo Sapello, Alexander Poylisher, C. Jason Chiang, Ayumu Kubota, Takashi Matsunaka |
2017-05-16 |
| 9386030 |
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks |
Akshay Vashist, Ritu Chadha, Alexander Poylisher, Yukiko Sawaya, Akira Yamada +1 more |
2016-07-05 |
| 9130982 |
System and method for real-time reporting of anomalous internet protocol attacks |
Yitzchak Gottlieb, Aditya Naidu, Akira Yamada, Yukiko Sawaya, Ayumu Kubota |
2015-09-08 |
| 9025771 |
Security optimization for IMS/MMD architecture |
Ashutosh Dutta, Subir Das, Fuchun Joesph Lin, Kyriakos Manousakis, Dana Chee +3 more |
2015-05-05 |
| 8971291 |
P-CSCF fast handoff for IMS/MMS architecture |
Ashutosh Dutta, Subir Das, Dana Chee, Kyriakos Manousakis, Funchun Joseph Lin +4 more |
2015-03-03 |
| 8938804 |
System and method for creating BGP route-based network traffic profiles to detect spoofed traffic |
Ravichander Vaidyanathan, Akira Yamada, Yukiko Sawaya, Ayumu Kubota |
2015-01-20 |
| 8925079 |
Method, apparatus and program for detecting spoofed network traffic |
Ravichander Vaidyanathan, Aditya Naidu, Akira Yamada, Ayumu Kubota, Yukiko Sawaya +1 more |
2014-12-30 |
| 8769677 |
System and method for spammer host detection from network flow data profiles |
Akshay Vashist, Yitzchak Gottlieb, Yukiko Sawaya, Ayumu Kubota |
2014-07-01 |
| 8665715 |
Method and system for providing end-to-end QoS in converged networks using probabilistic preferential admission control |
Alexander Poylisher, Ricardo Martija, Ritu Chadha, Latha Kant |
2014-03-04 |
| 8565186 |
Methods of mitigation of trombone routing in an IMS/MMD network |
Ashutosh Dutta, John Lee, Subir Das, Joe Lin, Kyriakos Manousakis +3 more |
2013-10-22 |
| 8306026 |
Last hop topology sensitive multicasting key management |
Farooq Anjum |
2012-11-06 |
| 8281397 |
Method and apparatus for detecting spoofed network traffic |
Ravichander Vaidyanathan, Yuu-Heng Alice Cheng, Akira Yamada, Yutaka Miyake |
2012-10-02 |
| 8145236 |
Approach to secure localization in wireless networks |
Vikram Kaul, David Famolari |
2012-03-27 |
| 8098627 |
P-CSCF fast handoff for IMS/MMS architecture |
Ashutosh Dutta, Subir Das, Dana Chee, Kyriakos Manousakis, Funchun Joseph Lin +4 more |
2012-01-17 |
| 7349378 |
Local area network resource manager |
Moncef Elaoud, Ravichander Vaidyanathan, Prathima Agrawal, Toshikazu Kodama, Yasuhiro Katsube |
2008-03-25 |
| 6185519 |
Method and system for feature interaction detection in a telecommunication network |
Fuchun Joseph Lin, Hong-Wen Liu |
2001-02-06 |