| 12160441 |
Modeling simulated cybersecurity attack difficulty |
— |
2024-12-03 |
| 12081503 |
Determining authenticity of reported user action in cybersecurity risk assessment |
Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart +1 more |
2024-09-03 |
| 12069083 |
Assessing security risks of users in a computing network |
Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Andrew Miller, Jeff Losapio, Jason Brubaker +1 more |
2024-08-20 |
| 11310261 |
Assessing security risks of users in a computing network |
Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Andrew Miller, Jeff Losapio, Jason Brubaker +1 more |
2022-04-19 |
| 11158207 |
Context-aware cybersecurity training systems, apparatuses, and methods |
Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong |
2021-10-26 |
| 10778626 |
Determining authenticity of reported user action in cybersecurity risk assessment |
Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart +1 more |
2020-09-15 |
| 10749887 |
Assessing security risks of users in a computing network |
Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Nathan Andrew Miller, Jeff Losapio, Jason Brubaker +1 more |
2020-08-18 |
| 10366080 |
Methods and systems for using community defined facets or facet values in computer networks |
John L. Mihalik, Thomas A. Gerace, Russell G. Barbour, Richard A. Meyer, David A. Sandborg +15 more |
2019-07-30 |
| 10243904 |
Determining authenticity of reported user action in cybersecurity risk assessment |
Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart +1 more |
2019-03-26 |
| 10063584 |
Advanced processing of electronic messages with attachments in a cybersecurity system |
John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Alan Himler, Norman Sadeh-Koniecpol |
2018-08-28 |
| 10027701 |
Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system |
Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Norman Sadeh-Koniecpol |
2018-07-17 |
| 9912687 |
Advanced processing of electronic messages with attachments in a cybersecurity system |
John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Alan Himler, Norman Sadeh-Koniecpol |
2018-03-06 |
| 9870715 |
Context-aware cybersecurity training systems, apparatuses, and methods |
Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong |
2018-01-16 |
| 9824609 |
Mock attack cybersecurity training system and methods |
Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong |
2017-11-21 |
| 9813454 |
Cybersecurity training system with automated application of branded content |
Norman Sadeh-Koniecpol, Joseph A. Ferrara |
2017-11-07 |
| 9781149 |
Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system |
Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Norman Sadeh-Koniecpol |
2017-10-03 |
| 9774626 |
Method and system for assessing and classifying reported potentially malicious messages in a cybersecurity system |
Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Norman Sadeh-Koniecpol |
2017-09-26 |
| 9558677 |
Mock attack cybersecurity training system and methods |
Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong |
2017-01-31 |
| 9547998 |
Context-aware training systems, apparatuses, and methods |
Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong |
2017-01-17 |
| 9398029 |
Cybersecurity training system with automated application of branded content |
Norman Sadeh-Koniecpol, Joseph A. Ferrara |
2016-07-19 |
| 9373267 |
Method and system for controlling context-aware cybersecurity training |
Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong |
2016-06-21 |
| 9280911 |
Context-aware training systems, apparatuses, and methods |
Norman Sadeh-Koniecpol, Jason Brubaker, Jason Hong |
2016-03-08 |
| 9251279 |
Methods and systems for using community defined facets or facet values in computer networks |
John L. Mihalik, Thomas A. Gerace, Russell G. Barbour, Richard A. Meyer, David A. Sandborg +4 more |
2016-02-02 |