| 11729189 |
Virtual security appliances for eliciting attacks |
Paul Deardorff, Andreas Galauner, Mark Momburg |
2023-08-15 |
| 11700276 |
Controlled deployment of blended honeypot services |
Roy Hodgman |
2023-07-11 |
| 11681936 |
Scanning server ports to infer service protocols |
Roy Hodgman, Thomas Eugene Sellers, Prashant Subbarao |
2023-06-20 |
| 11522912 |
Honeypot opaque credential recovery |
Thomas Eugene Sellers |
2022-12-06 |
| 11507860 |
Machine learned inference of protocols from banner data |
Roy Hodgman, Thomas Eugene Sellers, Prashant Subbarao |
2022-11-22 |
| 10986130 |
Honeypot opaque credential recovery |
Thomas Eugene Sellers |
2021-04-20 |
| 10986128 |
Honeypot opaque credential recovery |
Thomas Eugene Sellers |
2021-04-20 |
| 10848507 |
Reactive virtual security appliances |
Paul Deardorff, Andreas Galauner, Mark Momburg |
2020-11-24 |
| 10826939 |
Blended honeypot |
Roy Hodgman |
2020-11-03 |
| 10546134 |
Methods and systems for providing recommendations to address security vulnerabilities in a network of computing systems |
Anastasios Giakouminakis, Chad Loder, Richard Ding Li |
2020-01-28 |
| 10367832 |
Reactive virtual security appliances |
Paul Deardorff, Andreas Galauner, Mark Momburg |
2019-07-30 |
| 10043011 |
Methods and systems for providing recommendations to address security vulnerabilities in a network of computing systems |
Anastasios Giakouminakis, Chad Loder, Richard Ding Li |
2018-08-07 |