| 11470094 |
Bi-directional content replication logic for enterprise threat detection |
Thomas Kunz, Omar-Alexander Al-Hujaj, Harish Mehta, Florian Chrosziel, Marco Rodeck +1 more |
2022-10-11 |
| 11093608 |
Anomaly detection in enterprise threat detection |
Jona Hassforther, Thorsten Menke, Volker Guzman, Florian Kraemer, Anne Jacobi +3 more |
2021-08-17 |
| 10764306 |
Distributing cloud-computing platform content to enterprise threat detection systems |
Thanh-Phong Lam, Florian Kraemer, Volker Guzman, Anne Jacobi, Kathrin Nos +4 more |
2020-09-01 |
| 10552605 |
Anomaly detection in enterprise threat detection |
Jona Hassforther, Thorsten Menke, Volker Guzman, Florian Kraemer, Anne Jacobi +3 more |
2020-02-04 |
| 10534907 |
Providing semantic connectivity between a java application server and enterprise threat detection system using a J2EE data |
Thanh-Phong Lam, Florian Kraemer, Volker Guzman, Anne Jacobi, Kathrin Nos +4 more |
2020-01-14 |
| 7590614 |
Method, apparatus, and computer program product for implementing techniques for visualizing data dependencies |
Ulf Fildebrandt, Christian Georgi, Jade Sripad |
2009-09-15 |
| 7562347 |
Reusable software components |
Reiner Hammerich, Jens Ittel, Johannes Lauterbach, Gilad Parann-Nissany, Frank Stienhans |
2009-07-14 |
| 7543268 |
Development environment for developing applications using a metamodel and a metadata API |
Markus Cherdron, Stefan Beck, Bjoern Goerke, Jens Ittel, Johannes Knoeppler +1 more |
2009-06-02 |
| 7353456 |
Prototype page for simulating navigation in computer programs |
Udo Arend, Bjoern Goerke |
2008-04-01 |