| 8176553 |
Secure gateway with firewall and intrusion detection capabilities |
James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Nishad P. Herath |
2012-05-08 |
| 7549168 |
Network-based risk-assessment tool for remotely detecting local computer vulnerabilities |
James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Nishad P. Herath |
2009-06-16 |
| 7146642 |
System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device |
James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Nishad P. Herath |
2006-12-05 |
| 7124181 |
System, method and computer program product for improved efficiency in network assessment utilizing variable timeout values |
James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Nishad P. Herath |
2006-10-17 |
| 7096503 |
Network-based risk-assessment tool for remotely detecting local computer vulnerabilities |
James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Nishad P. Herath |
2006-08-22 |
| 7003561 |
System, method and computer program product for improved efficiency in network assessment utilizing a port status pre-qualification procedure |
James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Nishad P. Herath |
2006-02-21 |
| 6687833 |
System and method for providing a network host decoy using a pseudo network protocol stack implementation |
Bruce Leidl, Gerhard Eschelbeck, Andrea Villa |
2004-02-03 |
| 6513122 |
Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities |
James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Nishad P. Herath |
2003-01-28 |