| 12411945 |
Large language model to detect and emulate malicious activity |
Joshua Scott Hansen, Christopher Miller, Matthew Michael Sommer, Alexander Noble Adkins, Daniel Azuara |
2025-09-09 |
| 12149549 |
Peer-based inference of unused identity and access management rights |
Matthew Michael Sommer, Alexander Noble Adkins, Christopher Miller, Kimberly A. Young |
2024-11-19 |
| 12124559 |
Peer-based, angular distance detection of anomalous rights |
Matthew Michael Sommer, Christopher Miller |
2024-10-22 |
| 12079574 |
Anomalous source detection in high-dimensional sequence data |
Jason Thalken, Aaron Boswell, Matthew Michael Sommer, Kellen K. Axten |
2024-09-03 |
| 12058157 |
Anomalous computer activity detection and prevention |
Lance Dennis Leishman, Matthew Michael Sommer, Alexander Noble Adkins, Samantha Felice, Christopher Miller +7 more |
2024-08-06 |
| 12047408 |
Detection of anomalous computer-implemented service activity |
Matt Michael Sommer, Joshua Scott Hansen, Dennis N. Brown |
2024-07-23 |
| 11463475 |
Click-to-call fraud detection |
Manraj Tatla, Christopher Miller |
2022-10-04 |
| 11374968 |
Detection of adversarial networks |
Jason Thalken, Adam Edward Powers, Manraj Tatla, Lev Ufimtsev |
2022-06-28 |