| 11487527 |
Cross feature toggles |
— |
2022-11-01 |
| 11093608 |
Anomaly detection in enterprise threat detection |
Jona Hassforther, Jens Baumgart, Thorsten Menke, Volker Guzman, Florian Kraemer +3 more |
2021-08-17 |
| 11042654 |
Using domains for flexible data access in heterogeneous system landscapes |
Michael Engler, Matthias Vogel |
2021-06-22 |
| 11012465 |
Realtime triggering framework |
Eugen Pritzkau, Marco Rodeck, Florian Chrosziel, Jona Hassforther, Rita Merkel +8 more |
2021-05-18 |
| 10986111 |
Displaying a series of events along a time axis in enterprise threat detection |
Wei-Guo Peng, Lin Luo, Hartwig Seifert, Nan Zhang, Harish Mehta +7 more |
2021-04-20 |
| 10764306 |
Distributing cloud-computing platform content to enterprise threat detection systems |
Thanh-Phong Lam, Jens Baumgart, Florian Kraemer, Volker Guzman, Anne Jacobi +4 more |
2020-09-01 |
| 10681064 |
Analysis of complex relationships among information technology security-relevant entities using a network graph |
Wei-Guo Peng, Lin Luo, Eugen Pritzkau, Hartwig Seifert, Harish Mehta +7 more |
2020-06-09 |
| 10673879 |
Snapshot of a forensic investigation for enterprise threat detection |
Florian Chrosziel, Jona Hassforther, Thomas Kunz, Harish Mehta, Rita Merkel +8 more |
2020-06-02 |
| 10630705 |
Real-time push API for log events in enterprise threat detection |
Florian Chrosziel, Thomas Kunz, Marco Rodeck |
2020-04-21 |
| 10552605 |
Anomaly detection in enterprise threat detection |
Jona Hassforther, Jens Baumgart, Thorsten Menke, Volker Guzman, Florian Kraemer +3 more |
2020-02-04 |
| 10536476 |
Realtime triggering framework |
Eugen Pritzkau, Marco Rodeck, Florian Chrosziel, Jona Hassforther, Rita Merkel +8 more |
2020-01-14 |
| 10534908 |
Alerts based on entities in security information and event management products |
— |
2020-01-14 |
| 10534907 |
Providing semantic connectivity between a java application server and enterprise threat detection system using a J2EE data |
Thanh-Phong Lam, Jens Baumgart, Florian Kraemer, Volker Guzman, Anne Jacobi +4 more |
2020-01-14 |
| 10530792 |
Using frequency analysis in enterprise threat detection to detect intrusions in a computer system |
Volker Guzman, Marvin Klose |
2020-01-07 |
| 10482241 |
Visualization of data distributed in multiple dimensions |
Wei-Guo Peng, Eugen Pritzkau, Lin Luo, Hartwig Seifert, Marco Rodeck +8 more |
2019-11-19 |
| 9876809 |
Standard metadata model for analyzing events with fraud, attack, or any other malicious background |
— |
2018-01-23 |
| 9817645 |
Reusable application configuration with dynamic resource determination |
Bjoern Friedmann, Klaus Kiefer, Michael Engler |
2017-11-14 |
| 9116906 |
Centralized read access logging |
Iouri Loukachev, Bjoern Christoph, Steve Trester, Joerg Heitmann, Robert Girts |
2015-08-25 |
| 9075633 |
Configuration of life cycle management for configuration files for an application |
— |
2015-07-07 |