| 11563641 |
Shifting network traffic from a network device |
Dzianis Lisouski, Michal Zygmunt Zawirski, Robert A. Kennedy, Paul A. Stancik, Matthew Dean Rehder +1 more |
2023-01-24 |
| 10411972 |
Determining impact of network failures |
Eoin Francis Cavanagh, Sonali Roy, Carlos Vara Callau, Tyson J. Lamoreaux, Alan M. Judge +1 more |
2019-09-10 |
| 10243785 |
Active monitoring of border network fabrics |
John Corrigan, Eoin Francis Cavanagh |
2019-03-26 |
| 10164836 |
Shifting network traffic from a network device |
Dzianis Lisouski, Michal Zygmunt Zawirski, Robert A. Kennedy, Paul A. Stancik, Matthew Dean Rehder +1 more |
2018-12-25 |
| 10129089 |
Shifting network traffic |
Dzianis Lisouski, Michal Zygmunt Zawirski, Robert A. Kennedy, Paul A. Stancik, Matthew Dean Rehder +1 more |
2018-11-13 |
| 10129278 |
Detecting malware in content items |
Jon A. McClintock, Eric J. Martin, Thibault Candebat, Adam Cecchetti, David Erdmann |
2018-11-13 |
| 9742638 |
Determining impact of network failures |
Eoin Francis Cavanagh, Sonali Roy, Carlos Vara Callau, Tyson J. Lamoreaux, Alan M. Judge +1 more |
2017-08-22 |
| 9348977 |
Detecting malware in content items |
Jon A. McClintock, Eric J. Martin, Thibault Candebat, Adam Cecchetti, David Erdmann |
2016-05-24 |
| 9130976 |
Techniques for identifying sources of unauthorized code |
Jon Arron McClintock, David Erdmann |
2015-09-08 |
| 9021310 |
Policy-driven automatic network fault remediation |
Brian A. White, Brian Joseph Callan, Robert A. Kennedy |
2015-04-28 |
| 8910284 |
Detecting malware |
David Erdmann, Jon A. McClintock |
2014-12-09 |
| 8621613 |
Detecting malware in content items |
Jon A. McClintock, Eric J. Martin, Thibault Candebat, Adam Cecchetti, David Erdmann |
2013-12-31 |
| 8595843 |
Techniques for identifying sources of unauthorized code |
Jon A. McClintock, David Erdmann |
2013-11-26 |
| 8364811 |
Detecting malware |
David Erdmann, Jon A. McClintock |
2013-01-29 |