| 11729207 |
Hierarchical novelty detection using intended states for network security |
Zhen Mo, Vijay Ganti, Debessay Fesehaye Kassa, Honglei Li |
2023-08-15 |
| 11689545 |
Performing cybersecurity operations based on impact scores of computing events over a rolling time interval |
Zhen Mo, Ereli Eran, Vijay Ganti |
2023-06-27 |
| 11645339 |
Creating a clustering model for evaluating a command line interface (CLI) of a process |
Vamsi Krishna Akkineni |
2023-05-09 |
| 11449638 |
Assisting a scanning session |
Ming Sum Sam Ng, Sasi Siddharth Muthurajan |
2022-09-20 |
| 11431792 |
Determining contextual information for alerts |
Manish Marwah, Renato Keshet, Brent James Miller |
2022-08-30 |
| 11240256 |
Grouping alerts into bundles of alerts |
Tomasz Jaroslaw Bania, William G. Horne, Renato Keshet, Pratyusa K. Manadhata, Manish Marwah +2 more |
2022-02-01 |
| 11108794 |
Indicating malware generated domain names using n-grams |
Pratyusa K. Manadhata, Kyle Williams, Martin Arlitt |
2021-08-31 |
| 10965697 |
Indicating malware generated domain names using digits |
Pratyusa K. Manadhata, Kyle Williams, Martin Arlitt |
2021-03-30 |
| 10911481 |
Malware-infected device identifications |
Pratyusa K. Manadhata, Kyle Williams, Martin Arlitt |
2021-02-02 |
| 10681069 |
Time-based detection of malware communications |
Sasi Siddharth Muthurajan |
2020-06-09 |
| 9003537 |
CVSS information update by analyzing vulnerability information |
Ben Feher |
2015-04-07 |
| 8893283 |
Performing an automated compliance audit by vulnerabilities |
Ben Feher |
2014-11-18 |