| 12032705 |
Detecting an operational state of antivirus software |
Todd Joseph Kalauhala Manning, Muqeet Ali, Josiah Dede Hagen, Richard Lawshae, Haoping Liu |
2024-07-09 |
| 11882148 |
Automated mitigation of cyber threats using a semantic cybersecurity database |
Josiah Dede Hagen, David Girard, Vincenzo Ciancaglini, Jannis Weigend, Ahmed M. Ibrahim +1 more |
2024-01-23 |
| 11128664 |
Intrusion prevention system with machine learning model for real-time inspection of network traffic |
Josiah Dede Hagen, Brandon Niemczyk |
2021-09-21 |
| 11080398 |
Identifying signatures for data sets |
Josiah Dede Hagen |
2021-08-03 |
| 11063969 |
Detection of periodic transmissions for identifying malicious computers |
Shoufu Luo, Josiah Dede Hagen |
2021-07-13 |
| 11044265 |
Methods and apparatus for intrusion prevention using global and local feature extraction contexts |
Josiah Dede Hagen, Shoufu Luo, Brandon Niemczyk, Leslie Zsohar, Craig D. Botkin +1 more |
2021-06-22 |
| 11017079 |
Identifying malicious activity using data complexity anomalies |
Josiah Dede Hagen |
2021-05-25 |
| 10878088 |
Identifying randomly generated character strings |
Richard Lawshae, Josiah Dede Hagen, Mathew Robert Powell, Elvis Collado, Stephen David Povolny |
2020-12-29 |
| 10728268 |
Methods and apparatus for intrusion prevention using global and local feature extraction contexts |
Josiah Dede Hagen, Shoufu Luo, Brandon Niemczyk, Leslie Zsohar, Craig D. Botkin +1 more |
2020-07-28 |
| 10528732 |
Identifying a signature for a data set |
Josiah Dede Hagen |
2020-01-07 |
| 10135785 |
Network security system to intercept inline domain name system requests |
James M. Rolette, Wei Lu |
2018-11-20 |
| 8745304 |
USB to SD bridge |
Jorge Enrique Muyshondt |
2014-06-03 |
| 7204416 |
System and method for uncontrolled velocity scanning |
Manish J. Desai, Mohammad Aamir Husain |
2007-04-17 |
| 6851608 |
System and method for uncontrolled velocity scanning |
Manish J. Desai, Husain Mohammad |
2005-02-08 |