| 11973788 |
Continuous scoring of security controls and dynamic tuning of security policies |
Lamine Aouad, Bryan Doyle |
2024-04-30 |
| 11729198 |
Mapping a vulnerability to a stage of an attack chain taxonomy |
Lamine Aouad, Thomas Parsons |
2023-08-15 |
| 11354412 |
Web shell classifier training |
Oliver Keyes, Joakim Kennedy, Ilya Biryukov |
2022-06-07 |
| 11347852 |
Identifying web shell applications through lexical analysis |
Oliver Keyes, Joakim Kennedy, Ilya Biryukov |
2022-05-31 |
| 11310200 |
Classifying locator generation kits |
Roy Hodgman, Suchin Gururangan, Andrew Reece |
2022-04-19 |
| 11297083 |
Identifying and protecting against an attack against an anomaly detector machine learning classifier |
Slawomir Grzonkowski |
2022-04-05 |
| 11288369 |
Systems and methods for detecting and protecting against malicious use of legitimate computing-system tools |
Slawomir Grzonkowski |
2022-03-29 |
| 11178170 |
Systems and methods for detecting anomalous behavior within computing sessions |
Slawomir Grzonkowski, Sidharth Pipriya |
2021-11-16 |
| 10977374 |
Method to assess internal security posture of a computing system using external variables |
Pierre-Antoine Vervier, Slawomir Grzonkowski, Yun Shen |
2021-04-13 |
| 10855704 |
Neutralizing malicious locators |
Roy Hodgman, Suchin Gururangan, Andrew Reece |
2020-12-01 |
| 10601846 |
Neutralizing malicious locators |
Roy Hodgman, Suchin Gururangan, Andrew Reece |
2020-03-24 |
| 10594655 |
Classifying locator generation kits |
Roy Hodgman, Suchin Gururangan, Andrew Reece |
2020-03-17 |
| 10366234 |
Identifying web shell applications through file analysis |
Oliver Keyes, Joakim Kennedy, Ilya Biryukov |
2019-07-30 |
| 10205704 |
Classifying locator generation kits |
Roy Hodgman, Suchin Gururangan, Andrew Reece |
2019-02-12 |
| 10200383 |
Neutralizing malicious locators |
Roy Hodgman, Suchin Gururangan, Andrew Reece |
2019-02-05 |
| 10033757 |
Identifying malicious identifiers |
Roy Hodgman, Suchin Gururangan, Andrew Reece |
2018-07-24 |
| 9378361 |
Anomaly sensor framework for detecting advanced persistent threat attacks |
Ting-Fang Yen, Ari Juels, Kaan Onarlioglu, Alina Oprea |
2016-06-28 |
| 8904531 |
Detecting advanced persistent threats |
Samir Dilipkumar Saklikar, Dennis Moreau, Riaz Zolfonoon |
2014-12-02 |