| 12259956 |
User equipment auto-unlock optimization |
Naresh Kumar Chinnathambi Kailasam, Vasilios E. ANTON, Ramanujam Jagannath, Shannon Shih |
2025-03-25 |
| 12132760 |
Credential input detection and threat analysis |
Paresh Maisuria, Ali ALABBAS, Abhishek Sagar, Mara Beth Fortini, Rupo Zhang +9 more |
2024-10-29 |
| 12032687 |
Command classification using active learning |
Jack Wilson Stokes, III, Jonathan Bar Or, Talha Ongun, Farid Tajaddodianfar |
2024-07-09 |
| 11689561 |
Detecting unknown malicious content in computer systems |
Jack Wilson Stokes, III, Kristian Holsheimer |
2023-06-27 |
| 11431745 |
Techniques for curating threat intelligence data |
Andrew White WICKER, Peter A. Cap |
2022-08-30 |
| 11275643 |
Dynamic configuration of anomaly detection |
Robert Lee McCann |
2022-03-15 |
| 9819689 |
Large scale malicious process detection |
Himanshu Chandola, Jack Wilson Stokes, III, Gil Lapid Shafriri, Craig Wittenberg, Timothy William Burrell |
2017-11-14 |
| 9398036 |
Chunk-based file acquisition and file reputation evaluation |
Robert Alexander SIM, Anthony Penta, Elliott Jeb Haber, Tomasz Kasperkiewicz |
2016-07-19 |
| 9130988 |
Scareware detection |
Jack Wilson Stokes, III, Long Lu, David E. Heckerman, Christina Colcernian, Sasi Parthasarathy +1 more |
2015-09-08 |
| 9038185 |
Execution of multiple execution paths |
Benjamin Livshits, Benjamin G. Zorn, Clemens Kolbitsch |
2015-05-19 |
| 8713679 |
Detection of code-based malware |
Benjamin G. Zorn, Benjamin Livshits, Charles M. Curtsinger |
2014-04-29 |
| 7860903 |
Techniques for generic data extraction |
Anish Shah, Scott Shelton, David Brophy, David Carmer, Jason Figge +1 more |
2010-12-28 |
| 4196058 |
Electrical galvanic bath contact element |
— |
1980-04-01 |