| 11727311 |
Classifying user behavior as anomalous |
Regunathan Radhakrishnan, Anirudh Kondaveeti |
2023-08-15 |
| 11720599 |
Clustering and visualizing alerts and incidents |
Derek Lin, Regunathan Radhakrishnan, Rashmi Raghu |
2023-08-08 |
| 11436530 |
Classifying user behavior as anomalous |
Regunathan Radhakrishnan, Anirudh Kondaveeti |
2022-09-06 |
| 10430721 |
Classifying user behavior as anomalous |
Regunathan Radhakrishnan, Anirudh Kondaveeti |
2019-10-01 |
| 10313390 |
Discovering domain associations for watering hole attack detection |
Anirudh Kondaveeti |
2019-06-04 |
| 9942252 |
Graph-based techniques for detecting coordinated network attacks |
Anirudh Kondaveeti |
2018-04-10 |
| 9853991 |
Finding command and control center computers by communication link tracking |
Derek Lin |
2017-12-26 |
| 9344442 |
Finding command and control center computers by communication link tracking |
Derek Lin |
2016-05-17 |
| 9344443 |
Finding command and control center computers by communication link tracking |
Derek Lin |
2016-05-17 |
| 9060018 |
Finding command and control center computers by communication link tracking |
Derek Lin |
2015-06-16 |
| 8656270 |
Change-oriented spreadsheet application |
SuYing Rui, Fengli Wang, Li-Wei Yu |
2014-02-18 |
| 7529977 |
Automated extensible user interface testing |
Ganesh Sankarakumar Parvathy, Dipti A. Patil |
2009-05-05 |