Issued Patents All Time
Showing 76–100 of 109 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8489931 | Methods, media, and systems for detecting an anomalous sequence of function calls | Angelos D. Keromytis | 2013-07-16 |
| 8468445 | Systems and methods for content extraction | Suhit Gupta, Gail Kaiser | 2013-06-18 |
| 8448242 | Systems, methods, and media for outputting data based upon anomaly detection | Ke Wang, Janak Parekh | 2013-05-21 |
| 8443441 | System and methods for detecting malicious email transmission | Eleazar Eskin, Shlomo Herskop, Manasi Bhattacharyya | 2013-05-14 |
| 8407160 | Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models | Gabriela Cretu, Angelos Stavrou, Angelos D. Keromytis, Michael E. Locasto | 2013-03-26 |
| 8407785 | Systems, methods, and media protecting a digital data processing device from attack | Stylianos Sidiroglou, Angelos D. Keromytis | 2013-03-26 |
| 8381299 | Systems, methods, and media for outputting a dataset based upon anomaly detection | Ke Wang, Janak Parekh | 2013-02-19 |
| 8381295 | Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems | Tal Malkin, Angelos D. Keromytis, Vishal Misra, Michael E. Locasto, Janak Parekh | 2013-02-19 |
| 8239687 | Apparatus method and medium for tracing the origin of network transmissions using n-gram distribution of data | — | 2012-08-07 |
| 8135994 | Methods, media, and systems for detecting an anomalous sequence of function calls | Angelos D. Keromytis | 2012-03-13 |
| 8074115 | Methods, media and systems for detecting anomalous program executions | Angelos D. Keromytis, Stelios Sidiroglou | 2011-12-06 |
| 7996288 | Method and system for processing recurrent consumer transactions | — | 2011-08-09 |
| 7962798 | Methods, systems and media for software self-healing | Michael E. Locasto, Angelos D. Keromytis, Angelos Stavrou, Gabriela Cretu, Stylianos Sidiroglou +2 more | 2011-06-14 |
| 7913306 | System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses | Frank Apap, Andrew Honig, Hershkop Shlomo, Eleazar Eskin | 2011-03-22 |
| 7818797 | Methods for cost-sensitive modeling for intrusion detection and response | Wei Fan, Wenke Lee, Matthew L. Miller | 2010-10-19 |
| 7784097 | Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems | Angelos D. Keromytis, Vishal Misra, Michael E. Locasto, Janak Parekh | 2010-08-24 |
| 7779463 | Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems | Tal Malkin, Angelos D. Keromytis, Vishal Misra, Michael E. Locasto, Janak Parekh | 2010-08-17 |
| 7752665 | Detecting probes and scans over high-bandwidth, long-term, incomplete network traffic information using limited memory | Seth Robertson | 2010-07-06 |
| 7657935 | System and methods for detecting malicious email transmission | Eleazar Eskin, Shlomo Herskop, Manasi Bhattacharyya | 2010-02-02 |
| 7639714 | Apparatus method and medium for detecting payload anomaly using n-gram distribution of normal data | Ke Wang | 2009-12-29 |
| 7448084 | System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses | Frank Apap, Andrew Honig, Hershkop Shlomo, Eleazar Eskin | 2008-11-04 |
| 7424619 | System and methods for anomaly detection and adaptive learning | Wei Fan | 2008-09-09 |
| 7277961 | Method and system for obscuring user access patterns using a buffer memory | Jonathan M. Smith, Jeffrey Sherwin, Jeffrey Chung, Andreas L. Prodromidis | 2007-10-02 |
| 7225343 | System and methods for adaptive model generation for detecting intrusions in computer systems | Andrew Honig, Andrew Gerald Howard, Eleazar Eskin | 2007-05-29 |
| 7162741 | System and methods for intrusion detection with dynamic window sizes | Eleazar Eskin | 2007-01-09 |