| 11233810 |
Multi-signal analysis for compromised scope identification |
Pengcheng Luo, Reeves Hoppe Briggs, Naveed Ahmad |
2022-01-25 |
| 10614222 |
Validation of security monitoring through automated attack testing |
Benjamin J. Godard, Travis W. Rhodes, David Marshall, Richard A. Lundeen |
2020-04-07 |
| 10491616 |
Multi-signal analysis for compromised scope identification |
Pengcheng Luo, Reeves Hoppe Briggs, Naveed Ahmad |
2019-11-26 |
| 10073726 |
Detection of outage in cloud based service using usage data based error signals |
Olga B. Ivanova, Venkat Narayanan, Smita Ojha, Lei He, Yi Wang +1 more |
2018-09-11 |
| 10037366 |
End to end validation of data transformation accuracy |
Rustam Xing Lalkaka, Felix Antonio Deschamps, Jungrak Kim |
2018-07-31 |
| 9692665 |
Failure analysis in cloud based service using synthetic measurements |
Timur Sadykov, Venkat Narayanan, Smita Ojha, Jon Avner |
2017-06-27 |
| 9558093 |
Visual tools for failure analysis in distributed systems |
Venkat Narayanan, Smita Ojha |
2017-01-31 |
| 9444708 |
Detection of outage in cloud based service using synthetic measurements and anonymized usage data |
Olga B. Ivanova, Venkat Narayanan, Smita Ojha |
2016-09-13 |
| 9436553 |
Recovering usability of cloud based service from system failure |
Timur Sadykov, Ashish Premaraj, Venkat Narayanan, Smita Ojha |
2016-09-06 |
| 9210183 |
Detecting anomalous activity from accounts of an online service |
Rustam Xing Lalkaka, Vivek Sharma, Rajmohan Rajagopalan, Alexander MacLeod |
2015-12-08 |