| 11870795 |
Identifying attack behavior based on scripting language activity |
Rodolfo Soto, Madhupreetha Chandrasekaran, Yijiang Li |
2024-01-09 |
| 11463464 |
Anomaly detection based on changes in an entity relationship graph |
Rodolfo Soto, George Apostolopoulos, John Clifton Pierce |
2022-10-04 |
| 11257010 |
Automated determination of booking availability for user sourced accommodations |
Nathan Blecharczyk, Maxim Charkov, Matt Weisinger, Riley Newman |
2022-02-22 |
| 11258807 |
Anomaly detection based on communication between entities over a network |
Sudhakar Muddu, Christos Tryfonas, Alexander Beebe Bond, Ashwin Athalye |
2022-02-22 |
| 11038905 |
Identifying attack behavior based on scripting language activity |
Rodolfo Soto, Madhupreetha Chandrasekaran, Yijiang Li |
2021-06-15 |
| 10693900 |
Anomaly detection based on information technology environment topology |
Rodolfo Soto, George Apostolopoulos, John Clifton Pierce |
2020-06-23 |
| 10467553 |
Automated determination of booking availability for user sourced accommodations |
Nathan Blecharczyk, Maxim Charkov, Matt Weisinger, Riley Newman |
2019-11-05 |
| 10389738 |
Malware communications detection |
Sudhakar Muddu, Christos Tryfonas, Alexander Beebe Bond, Ashwin Athalye |
2019-08-20 |
| 10237294 |
Fingerprinting entities based on activity in an information technology environment |
Rodolfo Soto, George Apostolopoulos, John Clifton Pierce |
2019-03-19 |
| 9195826 |
Graph-based method to detect malware command-and-control infrastructure |
Chunsheng Fang, Derek Lin |
2015-11-24 |