| 12280689 |
Power charging control systems and methods for electric vehicles |
Jennifer Kay Light-Holets, Julie Furber, Thomas A. Dollmeyer, Vivek A. Sujan |
2025-04-22 |
| 12242397 |
System and method for replay of peripheral device attacks |
John Teddy, Imityaz Yunus Pathan, Raja Kannan, Rajendra Kumar Sharma |
2025-03-04 |
| 11926236 |
Power charging control systems and methods for electric vehicles |
Jennifer Kay Light-Holets, Julie Furber, Thomas A. Dollmeyer, Vivek A. Sujan |
2024-03-12 |
| 10747879 |
System, method, and computer program product for identifying a file used to automatically launch content as unwanted |
Palasamudram Ramagopal Prashanth, Rahul Mohandas |
2020-08-18 |
| 10521212 |
Alerting the presence of bundled software during an installation |
Babu Nath Giri, Prashanth P. Ramagopal |
2019-12-31 |
| 10255053 |
Alerting the presence of bundled software during an installation |
Babu Nath Giri, Prashanth P. Ramagopal |
2019-04-09 |
| 10169582 |
System, method, and computer program product for identifying a file used to automatically launch content as unwanted |
Palasamudram Ramagopal Prashanth, Rahul Mohandas |
2019-01-01 |
| 10089095 |
Alerting the presence of bundled software during an installation |
Babu Nath Giri, Prashanth P. Ramagopal |
2018-10-02 |
| 8990943 |
System, method, and computer program product for identifying a file used to automatically launch content as unwanted |
Palasamudram Ramagopal Prashanth, Rahul Mohandas |
2015-03-24 |
| 8732296 |
System, method, and computer program product for redirecting IRC traffic identified utilizing a port-independent algorithm and controlling IRC based malware |
Nitin Jyoti, Cedric Cochin, Rachit Mathur |
2014-05-20 |
| 8667582 |
System, method, and computer program product for directing predetermined network traffic to a honeypot |
Nitin Jyoti |
2014-03-04 |
| 8528092 |
System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking |
Nitin Jyoti |
2013-09-03 |
| 8510829 |
Systems and methods to detect malicious media files |
Rahul Mohandas, Plasamudram Ramagopal Prashanth |
2013-08-13 |
| 8156541 |
System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking |
Nitin Jyoti |
2012-04-10 |
| 6810725 |
Exhaust gas recirculation measurement device |
Gregory H. Henderson, Michael J. Marthaler, Jeffrey J. Braun, Guangping Pan, Thomas L. McKinley |
2004-11-02 |