VS

Vasudha Shivamoggi

RA Rapid7: 28 patents #2 of 193Top 2%
Nike: 4 patents #1,137 of 2,652Top 45%
📍 Arlington, MA: #86 of 2,056 inventorsTop 5%
🗺 Massachusetts: #2,781 of 88,656 inventorsTop 4%
Overall (All Time): #109,521 of 4,157,543Top 3%
32
Patents All Time

Issued Patents All Time

Showing 1–25 of 32 patents

Patent #TitleCo-InventorsDate
12413606 Techniques for detecting cyberattacks on an authentication system Roy Hodgman, Katherine Wilbur 2025-09-09
12367204 Event prediction Ying-zong Huang, Vishal Doshi, Balaji Rengarajan, Devavrat Shah, Ritesh K. Madan 2025-07-22
12321454 Command line parsing for classification of process start alerts Matthew Berninger, Roy Hodgman, Katherine Wilbur, Lauren L. Johnson, Jacqueline Daniel +1 more 2025-06-03
12314385 Automated generation of anomaly scenarios for testing machine learned anomaly detection models Jocelyn Beauchesne, John Lim Oh, Roy Hodgman 2025-05-27
12289404 Password similarity checking using homomorphic encryption operations Roy Hodgman 2025-04-29
12238127 Anomalous data transfer detection Roy Hodgman 2025-02-25
12206699 Identifying high-influence features for model-detected anomalies Jocelyn Beauchesne, John Lim Oh, Roy Hodgman 2025-01-21
12182670 Automated dimensionality reduction for machine learning anomaly detection pipeline Jocelyn Beauchesne, John Lim Oh, Roy Hodgman 2024-12-31
12120136 Anomalous data transfer detection Roy Hodgman 2024-10-15
12101342 System and method for monitoring network activity for detecting data exfiltration events Dustin Myers, Roy Hodgman 2024-09-24
12088600 Machine learning system for detecting anomalies in hunt data Jocelyn Beauchesne, John Lim Oh, Roy Hodgman 2024-09-10
12069079 Generating synthetic datapoints from observed datapoints for training machine learning models Jocelyn Beauchesne, John Lim Oh, Roy Hodgman 2024-08-20
11995092 Event prediction Ying-zong Huang, Vishal Doshi, Balaji Rengarajan, Devavrat Shah, Ritesh K. Madan 2024-05-28
11956260 Attack monitoring service that selectively analyzes connection graphs for suspected attack paths Roy Hodgman, Katherine Wilbur 2024-04-09
11930108 Password requirement conformity check Roy Hodgman 2024-03-12
11853853 Providing human-interpretable explanation for model-detected anomalies Jocelyn Beauchesne, John Lim Oh, Roy Hodgman 2023-12-26
11856017 Machine learning correlator to infer network properties Roy Hodgman, Kwan Lin 2023-12-26
11770387 Graph-based detection of lateral movement in computer networks Roy Hodgman, Katherine Wilbur 2023-09-26
11741132 Cluster-based scheduling of security operations Roy Hodgman, Wah-Kwan Lin 2023-08-29
11687569 Optimizing role level identification for resource allocation Wah-Kwan Lin, Roy Hodgman 2023-06-27
11595423 Honeypot network with dynamically updated alert modules for detecting anomalous connections Roy Hodgman, Wah-Kwan Lin 2023-02-28
11574236 Automating cluster interpretation in security environments Roy Hodgman, Wah-Kwan Lin 2023-02-07
11509674 Generating machine learning data in salient regions of a feature space Jocelyn Beauchesne, John Lim Oh, Roy Hodgman 2022-11-22
11481644 Event prediction Ying-zong Huang, Vishal Doshi, Balaji Rengarajan, Devavrat Shah, Ritesh K. Madan 2022-10-25
11368474 Detecting anomalous internet behavior Roy Hodgman, Wah-Kwan Lin 2022-06-21