| 11532002 |
Systems and methods for a non-fungible token having on chain content generation |
Kishore Badari Atreya, Connor Keenan, Ricardo Stuven, Samir B. Mehta |
2022-12-20 |
| 11057289 |
Mobile application identification in network traffic via a search engine approach |
Gyan Ranjan, Alok Tongaonkar |
2021-07-06 |
| 9912680 |
Detecting malicious HTTP redirections using user browsing activity trees |
Hesham Mekky, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci |
2018-03-06 |
| 9853876 |
Mobile application identification in network traffic via a search engine approach |
Gyan Ranjan, Alok Tongaonkar |
2017-12-26 |
| 9531736 |
Detecting malicious HTTP redirections using user browsing activity trees |
Hesham Mekky, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci |
2016-12-27 |
| 9245121 |
Detecting suspicious network behaviors based on domain name service failures |
Pengkui Luo, Zhi-Li Zhang, Sabyasachi Saha, Sung-Ju Lee, Antonio Nucci |
2016-01-26 |
| 8959643 |
Detecting malware infestations in large-scale networks |
Luca Invernizzi, Stanislav Miskovic, Sabyasachi Saha, Christopher Kruegel, Antonio Nucci +2 more |
2015-02-17 |
| 8813236 |
Detecting malicious endpoints using network connectivity and flow information |
Sabyasachi Saha, Lei Liu, Jianpeng Xu, Antonio Nucci |
2014-08-19 |
| 8578024 |
Network application signatures for binary protocols |
Ram Keralapura, Marios Iliofotou, Alok Tongaonkar, Antonio Nucci |
2013-11-05 |