| 11816161 |
Asset search and discovery system using graph data structures |
Robert S. Hansen |
2023-11-14 |
| 11743194 |
Asset ranking and classification systems and methods |
Robert S. Hansen |
2023-08-29 |
| 11347797 |
Asset search and discovery system using graph data structures |
Robert S. Hansen |
2022-05-31 |
| 9239745 |
Method and apparatus for managing security vulnerability lifecycles |
William Pennington, Robert T. Stone, Siamak Pazirandeh |
2016-01-19 |
| 8925051 |
Automated login session extender for use in security analysis systems |
William Pennington, Robert T. Stone, Siamak Pazirandeh |
2014-12-30 |
| 8893282 |
System for detecting vulnerabilities in applications using client-side application interfaces |
Bill Pennington, Robert T. Stone, Siamak Pazirandeh |
2014-11-18 |
| 8863280 |
Automatic response culling for web application security scan spidering process |
William Pennington, Robert T. Stone, Siamak Pazirandeh |
2014-10-14 |
| 8789187 |
Pattern tracking and capturing human insight in a web application security scanner |
William Pennington, Robert T. Stone, Siamak Pazirandeh |
2014-07-22 |
| 8621639 |
Using fuzzy classification models to perform matching operations in a web application security scanner |
William Pennington, Robert T. Stone, Siamak Pazirandeh |
2013-12-31 |
| 8370929 |
Automatic response culling for web application security scan spidering process |
William Pennington, Robert T. Stone, Siamak Pazirandeh |
2013-02-05 |
| 8341711 |
Automated login session extender for use in security analysis systems |
William Pennington, Robert T. Stone, Siamak Pazirandeh |
2012-12-25 |
| 8281401 |
System for detecting vulnerabilities in web applications using client-side application interfaces |
Bill Pennington, Robert T. Stone, Siamak Pazirandeh |
2012-10-02 |
| 8087088 |
Using fuzzy classification models to perform matching operations in a web application security scanner |
William Pennington, Robert T. Stone, Siamak Pazirandeh |
2011-12-27 |
| 7467402 |
Automated login session extender for use in security analysis systems |
Bill Pennington, Robert T. Stone, Siamak Pazirandeh |
2008-12-16 |