| 12199993 |
Highly collaborative deceptive network alliance |
Doga Tav, Ronald B. Williams, Jeb R. Linton |
2025-01-14 |
| 11973671 |
Signal based node relationship identification |
Cheng-Ta Lee, Iosif V. Onut, Mattias Johansson |
2024-04-30 |
| 11228619 |
Security threat management framework |
Jason Flood, Aidan Butler, Wayne F. Tackabury, Patrick Hourigan |
2022-01-18 |
| 11159566 |
Countering phishing attacks |
Cheng-Ta Lee, Andrii Iesiev, Iosif V. Onut |
2021-10-26 |
| 11100046 |
Intelligent security context aware elastic storage |
Vijay Dheap, Derek T Lohnes, Ben A. Wuest |
2021-08-24 |
| 10887251 |
Fault-tolerant architecture for packet capture |
Wayne F. Tackabury, William A. Bird, Thomas D. Silliman, Alex Omo Agerholm, Michael Milde Lilja +2 more |
2021-01-05 |
| 10826935 |
Phishing detection through secure testing implementation |
Iosif V. Onut, Aviv Ron, Avishay Bartik, Gregor von Bochmann, Guy-Vincent Jourdan +1 more |
2020-11-03 |
| 10819730 |
Automatic user session profiling system for detecting malicious intent |
Michael Hanner, Iosif V. Onut, Ronald B. Williams |
2020-10-27 |
| 10693796 |
Persistent flow identifiers enabling disparate applications |
William A. Bird, Vijay Dheap, Patrick V. Johnstone, Ben A. Wuest, Alex Omø Agerholm |
2020-06-23 |
| 10601729 |
Packet capture ring: reliable, scalable packet capture for security applications |
William A. Bird, Thomas D. Silliman, Wayne F. Tackabury, Alex Omo Agerholm, Michael Milde Lilja +2 more |
2020-03-24 |
| 10250511 |
Persistent flow identifiers enabling disparate applications |
William A. Bird, Vijay Dheap, Patrick V. Johnstone, Ben A. Wuest, Alex Omø Agerholm |
2019-04-02 |
| 10044634 |
Packet capture ring: reliable, scalable packet capture for security applications |
William A. Bird, Thomas D. Silliman, Wayne F. Tackabury, Alex Omo Agerholm, Michael Milde Lilja +2 more |
2018-08-07 |
| 9703845 |
Representing identity data relationships using graphs |
Andrii Iesiev, Shawn Richard Delton, Darshan Gencarelle |
2017-07-11 |
| 8830840 |
Network search methods and systems |
Patrick V. Johnstone, John H. Ricketson |
2014-09-09 |
| 8406141 |
Network search methods and systems |
Patrick V. Johnstone, John H. Ricketson |
2013-03-26 |
| 7620989 |
Network testing methods and systems |
Dinkar Chivaluri |
2009-11-17 |
| 7111204 |
Protocol sleuthing system and method for load-testing a network server |
Patrick V. Johnstone |
2006-09-19 |