| 11797826 |
Machine learning model for analysis of instruction sequences |
Xuan Zhao, Matthew Wolff, John Brock, Andy Wortman, Jian Luan +8 more |
2023-10-24 |
| 11568185 |
Centroid for improving machine learning classification and info retrieval |
Jian Luan, Matthew Wolff |
2023-01-31 |
| 11501120 |
Indicator centroids for malware handling |
Eric G. Petersen, Michael Alan Hohimer, Jian Luan, Matthew Wolff |
2022-11-15 |
| 11283818 |
Container file analysis using machine learning model |
Xuan Zhao, Matthew Wolff, John Brock, Andy Wortman, Jian Luan +7 more |
2022-03-22 |
| 11188646 |
Training a machine learning model for container file analysis |
Xuan Zhao, Matthew Wolff, John Brock, Andy Wortman, Jian Luan +7 more |
2021-11-30 |
| 11074494 |
Machine learning model for analysis of instruction sequences |
Xuan Zhao, Matthew Wolff, John Brock, Andy Wortman, Jian Luan +8 more |
2021-07-27 |
| 10922604 |
Training a machine learning model for analysis of instruction sequences |
Xuan Zhao, Matthew Wolff, John Brock, Andy Wortman, Jian Luan +8 more |
2021-02-16 |
| 10810470 |
Centroid for improving machine learning classification and info retrieval |
Jian Luan, Matthew Wolff |
2020-10-20 |
| 10637874 |
Container file analysis using machine learning model |
Xuan Zhao, Matthew Wolff, John Brock, Andrew Wortman, Jian Luan +7 more |
2020-04-28 |
| 10503901 |
Training a machine learning model for container file analysis |
Xuan Zhao, Matthew Wolff, John Brock, Andy Wortman, Jian Luan +7 more |
2019-12-10 |
| 10417530 |
Centroid for improving machine learning classification and info retrieval |
Jian Luan, Matthew Wolff |
2019-09-17 |
| 9781150 |
Man in the middle attack detection using active learning |
Xuan Zhao |
2017-10-03 |
| 9762611 |
Endpoint-based man in the middle attack detection using machine learning models |
Xuan Zhao, Jonathan Miller |
2017-09-12 |
| 9680860 |
Endpoint-based man in the middle attack detection using multiple types of detection tests |
Jonathan Miller |
2017-06-13 |
| 9602531 |
Endpoint-based man in the middle attack detection |
Jonathan Miller |
2017-03-21 |