| 9208321 |
Method for administration of computer security threat countermeasures to a computer system |
Jeffrey Scott Bardsley, Ashley Brock, Charles K. Davis, III, John J. McKenna, Carlos F. Villegas |
2015-12-08 |
| 7845004 |
Correlating network information and intrusion information to find the entry point of an attack upon a protected computer |
Jeffrey Scott Bardsley, Ashley Brock, Charles S. Lingafelt |
2010-11-30 |
| 7818580 |
Control of port based authentication protocols and process to support transfer of connection information |
Jeffrey Scott Bardsley, Charles S. Lingafelt, Allen Leonid Roginsky, Norman C. Strole |
2010-10-19 |
| 7730537 |
Method of operating an intrusion detection system |
Jeffrey Scott Bardsley, Ashley Brock, Charles S. Lingafelt |
2010-06-01 |
| 7386883 |
Systems, methods and computer program products for administration of computer security threat countermeasures to a computer system |
Jeffrey Scott Bardsley, Ashley Brock, Charles K. Davis, III, John J. McKenna, Carlos F. Villegas |
2008-06-10 |
| 7370345 |
Domain controlling systems, methods and computer program products for administration of computer security threat countermeasures to a domain of target computer systems |
Jeffrey Scott Bardsley, Ashley Brock, Charles K. Davis, III, John J. McKenna, Carlos F. Villegas |
2008-05-06 |
| 7308714 |
Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack |
Jeffrey Scott Bardsley, Ashley Brock, Charles S. Lingafelt |
2007-12-11 |
| 7280931 |
Method and system for calibrating an electrical device |
Charles S. Lingafelt |
2007-10-09 |
| 7150043 |
Intrusion detection method and signature table |
Ashley Brock, Kevin Thomas McClain |
2006-12-12 |
| 7036148 |
Method of operating an intrusion detection system according to a set of business rules |
Ashley Anderson Brook, Charles S. Lingafelt |
2006-04-25 |
| 6928549 |
Dynamic intrusion detection for computer systems |
Ashley Brock, Charles S. Lingafelt |
2005-08-09 |