| 12079346 |
Exploit prediction based on machine learning |
Edward T. Bellis, Jeffrey Heuer |
2024-09-03 |
| 11888887 |
Risk-based vulnerability remediation timeframe recommendations |
Edward T. Bellis, Jason Rolleston |
2024-01-30 |
| 11861016 |
Multi-stage training of machine learning models |
Jay C. Jacobs |
2024-01-02 |
| 11275844 |
Exploit prediction based on machine learning |
Edward T. Bellis, Jeffrey Heuer |
2022-03-15 |
| 11250137 |
Vulnerability assessment based on machine inference |
Edward T. Bellis, David N. Bortz, Jared Davis |
2022-02-15 |
| 10970400 |
Multi-stage training of machine learning models |
Jay C. Jacobs |
2021-04-06 |
| 10762212 |
Exploit prediction based on machine learning |
Edward T. Bellis, Jeffrey Heuer |
2020-09-01 |
| 10503908 |
Vulnerability assessment based on machine inference |
Edward T. Bellis, David N. Bortz, Jared Davis |
2019-12-10 |
| 10305925 |
Ordered computer vulnerability remediation reporting |
Edward T. Bellis, Jeffrey Heuer |
2019-05-28 |
| 10114954 |
Exploit prediction based on machine learning |
Edward T. Bellis, Jeffrey Heuer |
2018-10-30 |
| 9825981 |
Ordered computer vulnerability remediation reporting |
Edward T. Bellis, Jeffrey Heuer |
2017-11-21 |
| 9270695 |
Identifying vulnerabilities of computing assets based on breach data |
Edward T. Bellis, Jeffrey Heuer |
2016-02-23 |
| 8966639 |
Internet breach correlation |
Edward T. Bellis, Jeffrey Heuer |
2015-02-24 |
| 6484200 |
Distinguished name scoping system for event filtering |
Rajeev Angal, Shivaram Bhat, Subodh Bapat |
2002-11-19 |
| 6356282 |
Alarm manager system for distributed network management system |
Plamen Petrov |
2002-03-12 |