| 11831657 |
Trust policies for a data provisioning layer |
Brandon Doherty Kalashian, Michael Hassan Atighetchi, Stéphane Blais, Samuel Cunningham Nelson |
2023-11-28 |
| 11804949 |
Subscriber revocation in a publish-subscribe network using attribute-based encryption |
Joud Khoury, Samuel Cunningham Nelson |
2023-10-31 |
| 11558185 |
Stream-based key management |
Joud Khoury, Samuel Cunningham Nelson |
2023-01-17 |
| 9894043 |
Cryptographically secure cross-domain information sharing |
Joud Khoury |
2018-02-13 |
| 9723023 |
Destination address rewriting to block peer-to-peer communications |
Daniel J. Ellard, Alden Warren Jackson, Christine Elaine Jones, Josh Karlin, Victoria Ursula Manfredi +1 more |
2017-08-01 |
| 9571463 |
Policy-based access control in content networks |
Joud Khoury, Armando L. Caro, Jr., Vikas Kawadia, Samuel Cunningham Nelson |
2017-02-14 |
| 9237027 |
Destination address control to limit unauthorized communications |
Daniel J. Ellard, Alden Warren Jackson, Christine Elaine Jones, Josh Karlin, Victoria Ursula Manfredi +1 more |
2016-01-12 |
| 8595818 |
Systems and methods for decoy routing and covert channel bonding |
Josh Karlin, Gregory S. Lauer, Craig Partridge, David Patrick Mankins |
2013-11-26 |
| 8321938 |
Multi-tiered scalable network monitoring |
Walter Clark Milliken, Ronald Joseph Watro |
2012-11-27 |
| 8272060 |
Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses |
Walter Clark Milliken, Stephen D. Milligan, Luis A. Sanchez, Craig Partridge |
2012-09-18 |
| 8204945 |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
Walter Clark Milliken, Stephen D. Milligan |
2012-06-19 |
| 8125898 |
Method and system for detecting attack path connections in a computer network using state-space correlation |
Christine Elaine Jones, Rajesh Krishnan, Isidro Marcos Castineyra, Regina Rosales Hain |
2012-02-28 |
| 7854003 |
Method and system for aggregating algorithms for detecting linked interactive network connections |
Christine Elaine Jones, Isidro Marcos Castineyra, Regina Rosales Hain |
2010-12-14 |
| 7814546 |
Method and system for integrated computer networking attack attribution |
Christine Elaine Jones, Isidro Marcos Castineyra, Regina Rosales Hain |
2010-10-12 |
| 7170860 |
Method and system for passively analyzing communication data based on frequency analysis of encrypted data traffic, and method and system for deterring passive analysis of communication data |
Craig Partridge, David Bruce Cousins |
2007-01-30 |
| 6981158 |
Method and apparatus for tracing packets |
Luis A. Sanchez, Craig Partridge |
2005-12-27 |
| 6567378 |
Cell discard scheme for IP traffic over a cell relay infrastructure |
Ruixi Yuan, Bora Akyol |
2003-05-20 |
| 6310893 |
Method and system for connectionless communication in a cell relay satellite network |
Ruixi Yuan, Bora Akyol |
2001-10-30 |