| 11431751 |
Live forensic browsing of URLs |
Amar Patel, Nitin Kumar Goel |
2022-08-30 |
| 10505954 |
Detecting malicious lateral movement across a computer network |
Jack Wilson Stokes, III, Robert Mead, Tim W. Burrell, Ian Hellen, Weidong Cui +2 more |
2019-12-10 |
| 9871811 |
Identifying security properties of systems from application crash traffic |
Matthew Bucher, Darren Ernest Canavor, Matthew Ryan Miller |
2018-01-16 |
| 8996866 |
Unobtrusive assurance of authentic user intent |
Crispin Cowan, Matthew Z. Tamayo-Rios, Tanmoy Dutta, Paul J. Leach, Scott A. Field +1 more |
2015-03-31 |
| 8745703 |
Identifying exploitation of vulnerabilities using error report |
Matthew W. Thomlinson, Alexander R. G. Lucas, James P. Kelly, David S. Carter, Matthew I. Diver +1 more |
2014-06-03 |
| 8627475 |
Early detection of potential malware |
Shawn D. Loveland, Darren Ernest Canavor, Ryan Colvin |
2014-01-07 |
| 8413246 |
Evaluating shellcode findings |
Jinwook Shin, Joshua Lackey |
2013-04-02 |
| 7464270 |
Application identification and license enforcement |
Vishnu A. Patankar, Robert P. Reichel, Kedarnath A. Dubhashi, Jim E. Thatcher |
2008-12-09 |
| 7350204 |
Policies for secure software execution |
Praerit Garg, Jeffrey A. Lawson |
2008-03-25 |
| 7290138 |
Credentials and digitally signed objects |
Trevor W. Freeman |
2007-10-30 |
| 7240194 |
Systems and methods for distributing trusted certification authorities |
Philip J. Hallin, Klaus Schutz, Sunil Pai |
2007-07-03 |
| 6769068 |
Dynamic credential refresh in a distributed system |
Mathew James Brozowski, David Cox, Jonathan Scott Greenfield, Anne Renee Reidelbach, Sundari M. Revanur |
2004-07-27 |