| 12368747 |
Using a logical graph to monitor an environment |
Vikram Kapoor |
2025-07-22 |
| 12309181 |
Establishing a location profile for a user device |
Vikram Kapoor, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2025-05-20 |
| 12244621 |
Using activity monitored by multiple data sources to identify shadow systems |
Vikram Kapoor, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2025-03-04 |
| 12120140 |
Detecting threats against computing resources based on user behavior changes |
Vikram Kapoor, Murat Bog, Yijou Chen |
2024-10-15 |
| 12032634 |
Graph reclustering based on different clustering criteria |
Yijou Chen, Murat Bog, Vikram Kapoor |
2024-07-09 |
| 12034750 |
Tracking of user login sessions |
Murat Bog, Vikram Kapoor, Samuel Joseph Pullara, III, Yijou Chen |
2024-07-09 |
| 11991198 |
User-specific data-driven network security |
Vikram Kapoor, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2024-05-21 |
| 11979422 |
Elastic privileges in a secure access service edge |
Vikram Kapoor, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2024-05-07 |
| 11954130 |
Alerting based on pod communication-based logical graph |
Yijou Chen, Murat Bog, Vikram Kapoor |
2024-04-09 |
| 11916947 |
Generating user-specific polygraphs for network activity |
Vikram Kapoor, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2024-02-27 |
| 11909752 |
Detecting deviations from typical user behavior |
Vikram Kapoor, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2024-02-20 |
| 11895135 |
Detecting anomalous behavior of a device |
Vikram Kapoor, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock, Ying Xie +1 more |
2024-02-06 |
| 11831668 |
Using a logical graph to model activity in a network environment |
Vikram Kapoor |
2023-11-28 |
| 11689553 |
User session-based generation of logical graphs and detection of anomalies |
Vikram Kapoor, Murat Bog, Yijou Chen |
2023-06-27 |
| 11483329 |
Using a logical graph of a containerized network environment |
Vikram Kapoor |
2022-10-25 |
| 11256759 |
Hierarchical graph analysis |
Yijou Chen, Murat Bog, Vikram Kapoor |
2022-02-22 |
| 11188571 |
Pod communication graph |
Yijou Chen, Murat Bog, Vikram Kapoor |
2021-11-30 |
| 11134093 |
Extended user session tracking |
Murat Bog, Vikram Kapoor, Samuel Joseph Pullara, III, Yijou Chen |
2021-09-28 |
| 10986114 |
Graph-based user tracking and threat detection |
Vikram Kapoor, Murat Bog, Yijou Chen |
2021-04-20 |
| 10873592 |
Kubernetes launch graph |
Vikram Kapoor |
2020-12-22 |
| 10425437 |
Extended user session tracking |
Murat Bog, Vikram Kapoor, Samuel Joseph Pullara, III, Yijou Chen |
2019-09-24 |
| 10419469 |
Graph-based user tracking and threat detection |
Vikram Kapoor, Murat Bog, Yijou Chen |
2019-09-17 |