Issued Patents All Time
Showing 26–50 of 87 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9531736 | Detecting malicious HTTP redirections using user browsing activity trees | Ruben Torres, Hesham Mekky, Zhi-Li Zhang, Sabyasachi Saha | 2016-12-27 |
| 9479405 | Transaction based network application signatures for text based protocols | Alok Tongaonkar, Ram Keralapura | 2016-10-25 |
| 9311386 | Categorizing network resources and extracting user interests from network activity | Han See Song, Mario Baldi, Qiang Ma | 2016-04-12 |
| 9245121 | Detecting suspicious network behaviors based on domain name service failures | Pengkui Luo, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Sung-Ju Lee | 2016-01-26 |
| 9213855 | Trusted user circles | Ignacio Bermudez Corrales | 2015-12-15 |
| 9208179 | Comparing semi-structured data records | Han See Song, Qiang Ma | 2015-12-08 |
| 9210090 | Efficient storage and flexible retrieval of full packets captured from network traffic | Mario Baldi, Syed Hussain, Yong Liao, Alok Tongaonkar | 2015-12-08 |
| 9094288 | Automated discovery, attribution, analysis, and risk assessment of security threats | Sabyasachi Saha | 2015-07-28 |
| 9049117 | System and method for collecting and processing information of an internet user via IP-web correlation | Ramakrishna Keralapura, Joshua Robinson, Supranamaya Ranjan, Smriti Bhagat | 2015-06-02 |
| 8964548 | System and method for determining network application signatures using flow payloads | Ram Keralapura | 2015-02-24 |
| 8959643 | Detecting malware infestations in large-scale networks | Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Sabyasachi Saha, Christopher Kruegel +2 more | 2015-02-17 |
| 8862726 | Quantifying privacy leakage in mobile networks | Han See Song, Yong Liao, Marios Iliofotou, Ning Xia, Zhi-Li Zhang +1 more | 2014-10-14 |
| 8843493 | Document fingerprint | Yong Liao | 2014-09-23 |
| 8831942 | System and method for pitch based gender identification with suspicious speaker detection | — | 2014-09-09 |
| 8819227 | Discerning web content and services based on real-time DNS tagging | Ram Keralapura, Marco Mellia, Ignacio Bermudez | 2014-08-26 |
| 8813236 | Detecting malicious endpoints using network connectivity and flow information | Sabyasachi Saha, Lei Liu, Ruben Torres, Jianpeng Xu | 2014-08-19 |
| 8706739 | Joining user profiles across online social networks | Han See Song, Qiang Ma | 2014-04-22 |
| 8677132 | Document security | Yong Liao | 2014-03-18 |
| 8578024 | Network application signatures for binary protocols | Ram Keralapura, Ruben Torres, Marios Iliofotou, Alok Tongaonkar | 2013-11-05 |
| 8577817 | System and method for using network application signatures based on term transition state machine | Ram Keralapura, Alok Tongaonkar | 2013-11-05 |
| 8516157 | System and method for network data compression | Ranjan Supranamaya, Su Chen | 2013-08-20 |
| 8494985 | System and method for using network application signatures based on modified term transition state machine | Ram Keralapura, Alok Tongaonkar | 2013-07-23 |
| 8437259 | Method for estimating telecommunication network traffic using link weight changes | Nina Taft | 2013-05-07 |
| 8418249 | Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats | Prakash Mandayam Comar, Sabyasachi Saha, Lei Liu | 2013-04-09 |
| 8392421 | System and method for internet endpoint profiling | Supranamaya Ranjan, Aleksandar Kuzmanovic | 2013-03-05 |