Issued Patents All Time
Showing 51–75 of 109 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9311476 | Methods, systems, and media for masquerade attack detection by monitoring computer user behavior | Malek Ben Salem, Shlomo Hershkop | 2016-04-12 |
| 9306966 | Methods of unsupervised anomaly detection using a geometric framework | Eleazar Eskin, Andrew Oliver Arnold, Michael J. Prerau, Leonid Portnoy | 2016-04-05 |
| 9275345 | System level user behavior biometrics using feature extraction and modeling | Yingbo Song | 2016-03-01 |
| 9276950 | Apparatus method and medium for detecting payload anomaly using N-gram distribution of normal data | Ke Wang | 2016-03-01 |
| 9253201 | Detecting network anomalies by probabilistic modeling of argument strings with markov chains | Yingbo Song, Angelos D. Keromytis | 2016-02-02 |
| 9143518 | Systems, methods, and media protecting a digital data processing device from attack | Stylianos Sidiroglou, Angelos D. Keromytis | 2015-09-22 |
| 9135438 | Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems | Tal Malkin, Angelos D. Keromytis, Vishal Misra, Michael E. Locasto, Janak Parekh | 2015-09-15 |
| 9088596 | Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models | Gabriela F. Ciocarlie, Angelos Stavrou, Angelos D. Keromytis | 2015-07-21 |
| 9009829 | Methods, systems, and media for baiting inside attackers | Angelos D. Keromytis, Brian M. Bowen, Shlomo Hershkop, Vasileios P. Kemerlis, Pratap V. Prabhu +1 more | 2015-04-14 |
| 9003528 | Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data | — | 2015-04-07 |
| 9003523 | Systems, methods, and media for outputting data based upon anomaly detection | Ke Wang, Janak Parekh | 2015-04-07 |
| 8931094 | System and methods for detecting malicious email transmission | Eleazar Eskin, Shlomo Herskop, Manasi Bhattacharyya | 2015-01-06 |
| 8893273 | Systems and methods for adaptive model generation for detecting intrusions in computer systems | Andrew Honig, Andrew Gerald Howard, Eleazar Eskin | 2014-11-18 |
| 8887281 | System and methods for adaptive model generation for detecting intrusion in computer systems | Andrew Honig, Andrew Gerald Howard, Eleazar Eskin | 2014-11-11 |
| 8844033 | Systems, methods, and media for detecting network anomalies using a trained probabilistic model | Yingbo Song, Angelos D. Keromytis | 2014-09-23 |
| 8819825 | Systems, methods, and media for generating bait information for trap-based defenses | Angelos D. Keromytis | 2014-08-26 |
| 8789172 | Methods, media, and systems for detecting attack on a digital processing device | Wei Li, Angelos D. Keromylis, Elli Androulaki | 2014-07-22 |
| 8769684 | Methods, systems, and media for masquerade attack detection by monitoring computer user behavior | Malek Ben Salem, Shlomo Hershkop | 2014-07-01 |
| 8763103 | Systems and methods for inhibiting attacks on applications | Michael E. Locasto, Angelos D. Keromytis, Ke Wang | 2014-06-24 |
| 8694833 | Methods, media, and systems for detecting an anomalous sequence of function calls | Angelos D. Keromytis | 2014-04-08 |
| 8667588 | Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems | Angelos D. Keromytis, Vishal Misra, Michael E. Locasto, Janak Parekh | 2014-03-04 |
| 8644342 | Apparatus method and medium for detecting payload anomaly using N-gram distribution of normal data | Ke Wang | 2014-02-04 |
| 8601322 | Methods, media, and systems for detecting anomalous program executions | Angelos D. Keromytis, Stylianos Sidiroglou | 2013-12-03 |
| 8544087 | Methods of unsupervised anomaly detection using a geometric framework | Eleazar Eskin, Andrew Oliver Arnold, Michael J. Prerau, Leonid Portnoy | 2013-09-24 |
| 8528091 | Methods, systems, and media for detecting covert malware | Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stylianos Sidiroglou, Angelos D. Keromytis | 2013-09-03 |