| 12212584 |
Systems and methods identifying malicious communications in multiple message stores |
Steffan Perry, Amanda Lewis |
2025-01-28 |
| 11847579 |
Systems and methods for adaptation of SCORM packages at runtime with an extended LMS |
Carl Kritzinger, Francisco Barreto |
2023-12-19 |
| 11729206 |
Systems and methods for effective delivery of simulated phishing campaigns |
Daniel Cormier, Greg Kras |
2023-08-15 |
| 11599810 |
Systems and methods for adaptation of SCORM packages at runtime with an extended LMS |
Carl Kritzinger, Francisco Barreto |
2023-03-07 |
| 11552982 |
Systems and methods for effective delivery of simulated phishing campaigns |
Daniel Cormier, Greg Kras |
2023-01-10 |
| 11038914 |
Systems and methods for effective delivery of simulated phishing campaigns |
Daniel Cormier, Greg Kras |
2021-06-15 |
| 10949760 |
Systems and methods for adaptation of SCORM packages at runtime with an extended LMS |
Carl Kritzinger, Francisco Barreto |
2021-03-16 |
| 10917429 |
Systems and methods for effective delivery of simulated phishing campaigns |
Daniel Cormier, Greg Kras |
2021-02-09 |
| 10623445 |
Endpoint agent for enterprise security system |
Kevin Douglas Breton |
2020-04-14 |
| 10257232 |
Endpoint agent for enterprise security system |
Kevin Douglas Breton |
2019-04-09 |
| 10250623 |
Generating analytical data from detection events of malicious objects |
Darren Kazuo Chinen, Braydon Michael Davis, Ragesh Damodaran, Manikandan Vellore Muneeswaran, Vijay Arumugam Velayutham |
2019-04-02 |
| 10229269 |
Detecting ransomware based on file comparisons |
Zohiartze Herce San Martín, Jorge Alejandro Duran Royo, Sherab Giovannini |
2019-03-12 |
| 10193918 |
Behavior-based ransomware detection using decoy files |
Nathan David Scott, Ramon Gutierrez, Sherab Giovannini |
2019-01-29 |
| 10032025 |
Behavior-based ransomware detection |
Ares Lopez Ituiño |
2018-07-24 |
| 9734337 |
Behavior-based ransomware detection |
Ares Lopez Ituiño |
2017-08-15 |