| 12425445 |
Early malware detection |
Dmitri Samosseiko, Fraser Howard, Peter Adam Mackenzie, Guy Roberts, Gabor Szappanos |
2025-09-23 |
| 12354043 |
Computer augmented threat evaluation |
Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Kenneth D. Ray, Joseph H. Levy |
2025-07-08 |
| 11853425 |
Dynamic sandbox scarecrow for malware management |
Ross McKerchar, Erik Jan Loman, Kenneth D. Ray, Andrew J. Thomas, Karl Ackerman |
2023-12-26 |
| 11843631 |
Detecting triggering events for distributed denial of service attacks |
Karl Ackerman, Mark David Harris, Andrew J. Thomas, Kenneth D. Ray |
2023-12-12 |
| 11755974 |
Computer augmented threat evaluation |
Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Kenneth D. Ray, Joseph H. Levy |
2023-09-12 |
| 11552962 |
Computer assisted identification of intermediate level threats |
Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Kenneth D. Ray, Joseph H. Levy |
2023-01-10 |
| 11102238 |
Detecting triggering events for distributed denial of service attacks |
Karl Ackerman, Mark David Harris, Andrew J. Thomas, Kenneth D. Ray |
2021-08-24 |
| 10938838 |
Computer augmented threat evaluation |
Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Kenneth D. Ray, Joseph H. Levy |
2021-03-02 |
| 10778725 |
Using indications of compromise for reputation based network security |
Kenneth D. Ray, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook +1 more |
2020-09-15 |
| 10762209 |
Boot security |
Kenneth D. Ray, Daniel Salvatore Schiappa |
2020-09-01 |
| 10673902 |
Labeling computing objects for improved threat detection |
Andrew J. Thomas, Mark David Harris, Neil Robert Tyndale Watkiss, Kenneth D. Ray |
2020-06-02 |
| 10558800 |
Labeling objects on an endpoint for encryption management |
Kenneth D. Ray, Daniel Salvatore Schiappa, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas +4 more |
2020-02-11 |
| 10528739 |
Boot security |
Kenneth D. Ray, Daniel Salvatore Schiappa |
2020-01-07 |
| 10382459 |
Threat detection using a time-based cache of reputation information on an enterprise endpoint |
Mark David Harris, Kenneth D. Ray, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook |
2019-08-13 |
| 10325167 |
Apparatuses, systems and methods for generating data representative of vehicle driver ratings |
Aaron Scott Chan, Kenneth Jason Sanchez, Ashley Anne Pettit, Mary Kay Gonet Quist |
2019-06-18 |
| 10225286 |
Using indications of compromise for reputation based network security |
Kenneth D. Ray, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook +1 more |
2019-03-05 |
| 9992228 |
Using indications of compromise for reputation based network security |
Kenneth D. Ray, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook +1 more |
2018-06-05 |
| 9967264 |
Threat detection using a time-based cache of reputation information on an enterprise endpoint |
Mark David Harris, Kenneth D. Ray, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook |
2018-05-08 |
| 9967282 |
Labeling computing objects for improved threat detection |
Andrew J. Thomas, Mark David Harris, Neil Robert Tyndale Watkiss, Kenneth D. Ray |
2018-05-08 |
| 9965627 |
Labeling objects on an endpoint for encryption management |
Kenneth D. Ray, Daniel Salvatore Schiappa, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas +4 more |
2018-05-08 |
| 9571512 |
Threat detection using endpoint variance |
Kenneth D. Ray, Mark David Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas |
2017-02-14 |
| 7257842 |
Pre-approval of computer files during a malware detection |
Christopher Barton, Martin Brown |
2007-08-14 |