| 11991268 |
Sharing cryptographic session keys among a cluster of network security platforms monitoring network traffic flows |
Anil Abraham |
2024-05-21 |
| 11805097 |
Decrypting transport layer security traffic without Man-in-the-Middle proxy |
Shelendra Sharma, Anil Abraham |
2023-10-31 |
| 11671371 |
Synchronization of multi-stack nodes |
Anil Abraham, Ashok Babu Thangamani |
2023-06-06 |
| 11070363 |
Sharing cryptographic session keys among a cluster of network security platforms monitoring network traffic flows |
Anil Abraham |
2021-07-20 |
| 10880268 |
Decrypting transport layer security traffic without man-in-the-middle proxy |
Shelendra Sharma, Anil Abraham |
2020-12-29 |
| 10778642 |
Decrypting transport layer security traffic without man-in-the-middle proxy |
Shelendra Sharma, Anil Abraham |
2020-09-15 |
| 10354072 |
System and method for detection of malicious hypertext transfer protocol chains |
Alexander Burt, Mikola Bilogorskiy, McEnroe Navaraj, Frank Jas, Liang Han +4 more |
2019-07-16 |
| 9953163 |
System and method for detection of malicious hypertext transfer protocol chains |
Alexander Burt, Mikola Bilogorskiy, McEnroe Navaraj, Frank Jas, Liang Han +4 more |
2018-04-24 |
| 9686293 |
Systems and methods for malware detection and mitigation |
Ali Golshan, Fengmin Gong, Frank Jas, Nick Bilogorskiy, Neal Vu +3 more |
2017-06-20 |
| 7426182 |
Method of managing signal processing resources |
Jianxin Wang, Sitaram Vishnu Yaji, Pankaj Malhotra |
2008-09-16 |