| 11470094 |
Bi-directional content replication logic for enterprise threat detection |
Thomas Kunz, Omar-Alexander Al-Hujaj, Jens Baumgart, Florian Chrosziel, Marco Rodeck +1 more |
2022-10-11 |
| 11349713 |
Real-time configuration check framework |
Eugen Pritzkau, Hartwig Seifert, Kevin Schwab, Omar-Alexander Al-Hujaj, Volker Guzman +2 more |
2022-05-31 |
| 11252168 |
System and user context in enterprise threat detection |
Hartwig Seifert, Thomas Kunz, Anne Jacobi, Marco Rodeck, Florian Kraemer +2 more |
2022-02-15 |
| 11128651 |
Pattern creation in enterprise threat detection |
Eugen Pritzkau, Joscha Philipp Bohn, Daniel Kartmann, Wei-Guo Peng, Hristina Dinkova +7 more |
2021-09-21 |
| 11012465 |
Realtime triggering framework |
Eugen Pritzkau, Kathrin Nos, Marco Rodeck, Florian Chrosziel, Jona Hassforther +8 more |
2021-05-18 |
| 10986111 |
Displaying a series of events along a time axis in enterprise threat detection |
Wei-Guo Peng, Lin Luo, Hartwig Seifert, Nan Zhang, Florian Chrosziel +7 more |
2021-04-20 |
| 10841161 |
Real-time configuration check framework |
Eugen Pritzkau, Hartwig Seifert, Kevin Schwab, Omar-Alexander Al-Hujaj, Volker Guzman +2 more |
2020-11-17 |
| 10681064 |
Analysis of complex relationships among information technology security-relevant entities using a network graph |
Wei-Guo Peng, Lin Luo, Eugen Pritzkau, Hartwig Seifert, Nan Zhang +7 more |
2020-06-09 |
| 10673879 |
Snapshot of a forensic investigation for enterprise threat detection |
Florian Chrosziel, Jona Hassforther, Thomas Kunz, Rita Merkel, Kathrin Nos +8 more |
2020-06-02 |
| 10542016 |
Location enrichment in enterprise threat detection |
Marco Rodeck, Hartwig Seifert, Thomas Kunz, Eugen Pritzkau, Wei-Guo Peng +5 more |
2020-01-21 |
| 10536476 |
Realtime triggering framework |
Eugen Pritzkau, Kathrin Nos, Marco Rodeck, Florian Chrosziel, Jona Hassforther +8 more |
2020-01-14 |
| 10530794 |
Pattern creation in enterprise threat detection |
Eugen Pritzkau, Joscha Philipp Bohn, Daniel Kartmann, Wei-Guo Peng, Hristina Dinkova +7 more |
2020-01-07 |
| 10482241 |
Visualization of data distributed in multiple dimensions |
Wei-Guo Peng, Eugen Pritzkau, Lin Luo, Hartwig Seifert, Marco Rodeck +8 more |
2019-11-19 |
| 10436749 |
Automated smart water quality monitor and analyzer and associated methods |
Meena Sankaran, Mazhar N. Ali |
2019-10-08 |
| 10133826 |
UDDI based classification system |
Thierry Tung, Alexander Zubev, Timm Falter |
2018-11-20 |
| 10102379 |
Real-time evaluation of impact- and state-of-compromise due to vulnerabilities described in enterprise threat detection security notes |
Hartwig Seifert, Nan Zhang, Florian Chrosziel, Hristina Dinkova, Thomas Kunz +5 more |
2018-10-16 |
| 10075462 |
System and user context in enterprise threat detection |
Hartwig Seifert, Thomas Kunz, Anne Jacobi, Marco Rodeck, Florian Kraemer +2 more |
2018-09-11 |
| 9970899 |
Automated smart water quality monitor and analyzer and associated methods |
Meena Sankaran, Mazhar N. Ali |
2018-05-15 |
| 9037678 |
Distribution of messages in system landscapes |
Florian Chrosziel, Otto Boehrer, Marco Rodeck, Joerg Kraemer, Rita Merkel +1 more |
2015-05-19 |
| 8892454 |
Configuration of web services |
Christian Rabetge, Thomas Kunz, Alexander Zubev, Otto Boehrer, Volker Wiechers +2 more |
2014-11-18 |
| 8775671 |
Managing information exchange between business entities |
Marco Rodeck, Thomas Kunz, Florian Chrosziel, Otto Böhrer, Joerg Kraemer +1 more |
2014-07-08 |
| 8661103 |
Business application address determination |
Jako Blagoev, Otto Boehrer, Thomas Kunz, Alexander Zubev |
2014-02-25 |
| 8051034 |
Parallel processing of assigned table partitions |
Heiko Gerwens |
2011-11-01 |