| 12198575 |
Prompting users to annotate simulated phishing emails in cybersecurity training |
Benjamin Blanchard |
2025-01-14 |
| 12069083 |
Assessing security risks of users in a computing network |
Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Andrew Miller, Jeff Losapio, Kurt Wescoe +1 more |
2024-08-20 |
| 11847935 |
Prompting users to annotate simulated phishing emails in cybersecurity training |
Benjamin Blanchard |
2023-12-19 |
| 11310261 |
Assessing security risks of users in a computing network |
Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Andrew Miller, Jeff Losapio, Kurt Wescoe +1 more |
2022-04-19 |
| 11158207 |
Context-aware cybersecurity training systems, apparatuses, and methods |
Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Hong |
2021-10-26 |
| 10749887 |
Assessing security risks of users in a computing network |
Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Andrew Miller, Jeff Losapio, Kurt Wescoe +1 more |
2020-08-18 |
| 9870715 |
Context-aware cybersecurity training systems, apparatuses, and methods |
Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Hong |
2018-01-16 |
| 9824609 |
Mock attack cybersecurity training system and methods |
Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Hong |
2017-11-21 |
| 9805616 |
Training device for gaining emergency access through a door |
Heath Flora |
2017-10-31 |
| 9558677 |
Mock attack cybersecurity training system and methods |
Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Hong |
2017-01-31 |
| 9547998 |
Context-aware training systems, apparatuses, and methods |
Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Hong |
2017-01-17 |
| 9373267 |
Method and system for controlling context-aware cybersecurity training |
Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Hong |
2016-06-21 |
| 9280911 |
Context-aware training systems, apparatuses, and methods |
Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Hong |
2016-03-08 |