| 12341814 |
Implementing decoys in a network environment |
Venu Vissamsetty, Pavan Patel, Prashanth Srinivas Mysore |
2025-06-24 |
| 11888897 |
Implementing decoys in a network environment |
Venu Vissamsetty, Pavan Patel, Prashanth Srinivas Mysore |
2024-01-30 |
| 11470115 |
Implementing decoys in a network environment |
Venu Vissamsetty, Pavan Patel, Prashanth Srinivas Mysore |
2022-10-11 |
| 10542044 |
Authentication incident detection and management |
Venu Vissamsetty, Srikant Vissamsetti, Harinath Vishwanath Ramchetty |
2020-01-21 |
| 9852296 |
Rollback feature |
Prabhat Singh, Gangadharasa Srinivasa |
2017-12-26 |
| 9703958 |
Rollback feature |
Prabhat Singh, Gangadharasa Srinivasa |
2017-07-11 |
| 9607150 |
Rollback feature |
Prabhat Singh, Gangadharasa Srinivasa |
2017-03-28 |
| 9323928 |
System and method for non-signature based detection of malicious processes |
Romanch Agarwal, Prabhat Singh, Harinath Ramachetty Vishwanath, Palasamudram Ramagopal Prashanth |
2016-04-26 |
| 9032523 |
Rollback feature |
Prabhat Singh, Gangadharasa Srinivasa |
2015-05-12 |
| 8732296 |
System, method, and computer program product for redirecting IRC traffic identified utilizing a port-independent algorithm and controlling IRC based malware |
Vinoo Thomas, Cedric Cochin, Rachit Mathur |
2014-05-20 |
| 8677493 |
Dynamic cleaning for malware using cloud technology |
Prabhat Singh, Palasamudram Ramagopal Prashanth |
2014-03-18 |
| 8667582 |
System, method, and computer program product for directing predetermined network traffic to a honeypot |
Vinoo Thomas |
2014-03-04 |
| 8539583 |
Rollback feature |
Prabhat Singh, Gangadharasa Srinivasa |
2013-09-17 |
| 8528092 |
System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking |
Vinoo Thomas |
2013-09-03 |
| 8306988 |
System, method, and computer program product for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database |
Prabhat Singh, Zhenyu Zhong, Guy Roberts, Jeffrey Martin Green, Sven Krasser |
2012-11-06 |
| 8156541 |
System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking |
Vinoo Thomas |
2012-04-10 |