| 9336379 |
Reputation-based safe access user experience |
Ameya Bhatawdekar, Elliot J (Jeb) Haber |
2016-05-10 |
| 9235586 |
Reputation checking obtained files |
Ritika Virmani, Elliott Jeb Haber, Warren G. Stevens, Jane T. Kim, Jess S. Holbrook +3 more |
2016-01-12 |
| 9065826 |
Identifying application reputation based on resource accesses |
Elliott Jeb Haber, Ameya Bhatawdekar, Anthony Penta |
2015-06-23 |
| 8959157 |
Real-time spam look-up system |
Jason D. Walter, Eliot C. Gillum, Krishna Vitaldevara, Mehrdad Bidgoli, Chad Mills +5 more |
2015-02-17 |
| 8863291 |
Reputation checking of executable programs |
Daniel Oliver, Anshul Rawat, Xiang Zheng Tu, James H. Dooley, Elliott Jeb Haber +7 more |
2014-10-14 |
| 8627475 |
Early detection of potential malware |
Shawn D. Loveland, John J. Lambert, Darren Ernest Canavor |
2014-01-07 |
| 8370930 |
Detecting spam from metafeatures of an email message |
Chad Mills, Kevin Chan, Robert Lee McCann, Aleksander Kolcz |
2013-02-05 |
| 8065370 |
Proofs to filter spam |
Geoffrey J. Hulten, Gopalakrishnan Seshadrinathan, Joshua T. Goodman, Manav Mishra, Robert Pengelly +1 more |
2011-11-22 |
| 8028031 |
Determining email filtering type based on sender classification |
Chad Mills, Robert Lee McCann, Geoff Hulten, Harry S. Katz, Eriola Kruja +2 more |
2011-09-27 |
| 7908328 |
Identification of email forwarders |
Geoffrey J. Hulten, Anthony Penta, David M. Chickering, Eliot C. Gillum, Gopalakrishnan Seshadrinathan +4 more |
2011-03-15 |
| 7904517 |
Challenge response systems |
Nina Kang, Joshua T. Goodman, Robert L. Rounthwaite, Josh Benaloh, Elissa E. S. Murphy +3 more |
2011-03-08 |