| 11657317 |
Automated systems and methods for generative multimodel multiclass classification and similarity analysis using machine learning |
Ryan Permeh, Matthew Wolff, Gary Golomb, Derek A. Soeder, Seagen Levites +3 more |
2023-05-23 |
| 10817599 |
Application execution control utilizing ensemble machine learning for discernment |
Ryan Permeh, Derek A. Soeder, Glenn Chisholm, Braden Russell, Gary Golomb +1 more |
2020-10-27 |
| 10235518 |
Application execution control utilizing ensemble machine learning for discernment |
Ryan Permeh, Derek A. Soeder, Glenn Chisholm, Braden Russell, Gary Golomb +1 more |
2019-03-19 |
| 8997234 |
System and method for network-based asset operational dependence scoring |
Michael Price |
2015-03-31 |
| 8621073 |
System and method for network vulnerability detection and reporting |
George Robert Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise +2 more |
2013-12-31 |
| 8621060 |
System and method for network vulnerability detection and reporting |
George Robert Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise +2 more |
2013-12-31 |
| 8615582 |
System and method for network vulnerability detection and reporting |
George Robert Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise +2 more |
2013-12-24 |
| 8201257 |
System and method of managing network security risks |
Steven G. Andres, David M. Cole, Thomas Gregory Cummings, Roberto Garcia, Brian Michael Kenyon +4 more |
2012-06-12 |
| 8135830 |
System and method for network vulnerability detection and reporting |
George Robert Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise +2 more |
2012-03-13 |
| 7793338 |
System and method of network endpoint security |
Marshall A. Beddoe |
2010-09-07 |
| 7543056 |
System and method for network vulnerability detection and reporting |
George Robert Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise +2 more |
2009-06-02 |
| 7152105 |
System and method for network vulnerability detection and reporting |
George Robert Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise +2 more |
2006-12-19 |