Issued Patents All Time
Showing 1–10 of 10 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10530799 | Non-harmful insertion of data mimicking computer network attacks | Joshua Charles Neil, Curtis Lee Hash, Jr., Michael Edward Fisk, Alexander William Brugh, Curtis Byron Storlie +1 more | 2020-01-07 |
| 10375095 | Modeling behavior in a network using event logs | Melissa Turcotte, Nicholas Heard | 2019-08-06 |
| 10356107 | Detecting anomalous behavior via user authentication graphs | Joshua Charles Neil, Lorie Liebrock | 2019-07-16 |
| 10243984 | Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness | Joshua Charles Neil, Michael Edward Fisk, Alexander William Brugh, Curtis Lee Hash, Jr., Curtis Byron Storlie +1 more | 2019-03-26 |
| 10122741 | Non-harmful insertion of data mimicking computer network attacks | Joshua Charles Neil, Curtis Lee Hash, Jr., Michael Edward Fisk, Alexander William Brugh, Curtis Byron Storlie +1 more | 2018-11-06 |
| 10015175 | Detecting anomalous behavior via user authentication graphs | Joshua Charles Neil, Lorie Liebrock | 2018-07-03 |
| 9825979 | Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness | Joshua Charles Neil, Michael Edward Fisk, Alexander William Brugh, Curtis Lee Hash, Jr., Curtis Byron Storlie +1 more | 2017-11-21 |
| 9560065 | Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness | Joshua Charles Neil, Michael Edward Fisk, Alexander William Brugh, Curtis Lee Hash, Jr., Curtis Byron Storlie +1 more | 2017-01-31 |
| 9374380 | Non-harmful insertion of data mimicking computer network attacks | Joshua Charles Neil, Curtis Lee Hash, Jr. | 2016-06-21 |
| 7421576 | Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes | — | 2008-09-02 |