| 9094457 |
Automated network deployment of cloud services into a network |
Georg Ochs, Matthias Schunter |
2015-07-28 |
| 8826455 |
Method and apparatus for automated assignment of access permissions to users |
Guenter Karjoth |
2014-09-02 |
| 8615803 |
Method, computer program element and a system for processing alarms triggered by a monitoring system |
Marc Dacier |
2013-12-24 |
| 8544092 |
Integrity verification using a peripheral device |
Reto Hermann, Matthias Schunter |
2013-09-24 |
| 7953677 |
Computer-implemented method, computer program and system for analyzing data records by generalizations on redundant attributes |
Birgit Baum-Waidner, Andreas Wespi |
2011-05-31 |
| 7437762 |
Method, computer program element and a system for processing alarms triggered by a monitoring system |
Marc Dacier |
2008-10-14 |
| 7406606 |
Method and system for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis |
Anil Chawla, David Greene, AARON RANKIN, Jonathan Michael Seeber, Rhys D. Ulerich |
2008-07-29 |