US7403922B1
(en)
|
1997-07-28 |
2008-07-22 |
Cybersource Corporation |
Method and apparatus for evaluating fraud risk in an electronic commerce transaction
|
US7096192B1
(en)
|
1997-07-28 |
2006-08-22 |
Cybersource Corporation |
Method and system for detecting fraud in a credit card transaction over a computer network
|
IL143592A0
(en)
|
1998-12-07 |
2002-04-21 |
Network Ice Corp |
A method and apparatus for remote installation of network drivers and software
|
US6804232B1
(en)
*
|
2000-03-27 |
2004-10-12 |
Bbnt Solutions Llc |
Personal area network with automatic attachment and detachment
|
AU2001262958A1
(en)
|
2000-04-28 |
2001-11-12 |
Internet Security Systems, Inc. |
Method and system for managing computer security information
|
US20040073617A1
(en)
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
US6907531B1
(en)
|
2000-06-30 |
2005-06-14 |
Internet Security Systems, Inc. |
Method and system for identifying, fixing, and updating security vulnerabilities
|
US7093239B1
(en)
|
2000-07-14 |
2006-08-15 |
Internet Security Systems, Inc. |
Computer immune system and method for detecting unwanted code in a computer system
|
US6845416B1
(en)
*
|
2000-08-02 |
2005-01-18 |
National Instruments Corporation |
System and method for interfacing a CAN device and a peripheral device
|
US8037530B1
(en)
*
|
2000-08-28 |
2011-10-11 |
Verizon Corporate Services Group Inc. |
Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor
|
US6807569B1
(en)
*
|
2000-09-12 |
2004-10-19 |
Science Applications International Corporation |
Trusted and anonymous system and method for sharing threat data to industry assets
|
US9027121B2
(en)
|
2000-10-10 |
2015-05-05 |
International Business Machines Corporation |
Method and system for creating a record for one or more computer security incidents
|
US7669051B2
(en)
|
2000-11-13 |
2010-02-23 |
DigitalDoors, Inc. |
Data security system and method with multiple independent levels of security
|
US7546334B2
(en)
*
|
2000-11-13 |
2009-06-09 |
Digital Doors, Inc. |
Data security system and method with adaptive filter
|
US7191252B2
(en)
*
|
2000-11-13 |
2007-03-13 |
Digital Doors, Inc. |
Data security system and method adjunct to e-mail, browser or telecom program
|
US8176563B2
(en)
*
|
2000-11-13 |
2012-05-08 |
DigitalDoors, Inc. |
Data security system and method with editor
|
US7103915B2
(en)
*
|
2000-11-13 |
2006-09-05 |
Digital Doors, Inc. |
Data security system and method
|
US8677505B2
(en)
*
|
2000-11-13 |
2014-03-18 |
Digital Doors, Inc. |
Security system with extraction, reconstruction and secure recovery and storage of data
|
US7130466B2
(en)
|
2000-12-21 |
2006-10-31 |
Cobion Ag |
System and method for compiling images from a database and comparing the compiled images with known images
|
US20060265746A1
(en)
*
|
2001-04-27 |
2006-11-23 |
Internet Security Systems, Inc. |
Method and system for managing computer security information
|
US7865427B2
(en)
*
|
2001-05-30 |
2011-01-04 |
Cybersource Corporation |
Method and apparatus for evaluating fraud risk in an electronic commerce transaction
|
WO2002097587A2
(en)
|
2001-05-31 |
2002-12-05 |
Internet Security Systems, Inc. |
Method and system for implementing security devices in a network
|
AU2002322109A1
(en)
*
|
2001-06-13 |
2002-12-23 |
Intruvert Networks, Inc. |
Method and apparatus for distributed network security
|
US6944775B2
(en)
*
|
2001-07-26 |
2005-09-13 |
Networks Associates Technology, Inc. |
Scanner API for executing multiple scanning engines
|
US7571480B2
(en)
*
|
2001-08-16 |
2009-08-04 |
International Business Machines Corporation |
Presentation of correlated events as situation classes
|
US7278160B2
(en)
*
|
2001-08-16 |
2007-10-02 |
International Business Machines Corporation |
Presentation of correlated events as situation classes
|
US7359966B2
(en)
*
|
2001-10-16 |
2008-04-15 |
Bbn Technologies Corp. |
Methods and systems for passive information discovery using Lomb periodogram processing
|
US7263479B2
(en)
*
|
2001-10-19 |
2007-08-28 |
Bbn Technologies Corp. |
Determining characteristics of received voice data packets to assist prosody analysis
|
US7574597B1
(en)
|
2001-10-19 |
2009-08-11 |
Bbn Technologies Corp. |
Encoding of signals to facilitate traffic analysis
|
US20030159060A1
(en)
*
|
2001-10-31 |
2003-08-21 |
Gales George S. |
System and method of defining the security condition of a computer system
|
US7836503B2
(en)
*
|
2001-10-31 |
2010-11-16 |
Hewlett-Packard Development Company, L.P. |
Node, method and computer readable medium for optimizing performance of signature rule matching in a network
|
US20030135749A1
(en)
*
|
2001-10-31 |
2003-07-17 |
Gales George S. |
System and method of defining the security vulnerabilities of a computer system
|
US20030093692A1
(en)
*
|
2001-11-13 |
2003-05-15 |
Porras Phillip A. |
Global deployment of host-based intrusion sensors
|
WO2003044635A1
(en)
*
|
2001-11-16 |
2003-05-30 |
Cetacea Networks Corporation |
Method and system for detecting and disabling sources of network packet flooding
|
US7840663B1
(en)
*
|
2001-12-21 |
2010-11-23 |
Mcafee, Inc. |
Desktop security in peer-to-peer networks
|
US7225343B1
(en)
*
|
2002-01-25 |
2007-05-29 |
The Trustees Of Columbia University In The City Of New York |
System and methods for adaptive model generation for detecting intrusions in computer systems
|
US7222366B2
(en)
*
|
2002-01-28 |
2007-05-22 |
International Business Machines Corporation |
Intrusion event filtering
|
US6915110B2
(en)
*
|
2002-02-05 |
2005-07-05 |
Tektronix International Sales Gmbh |
Multi-protocol call trace on GPRS Gb-Gr
|
US8209756B1
(en)
|
2002-02-08 |
2012-06-26 |
Juniper Networks, Inc. |
Compound attack detection in a computer network
|
US20060015942A1
(en)
|
2002-03-08 |
2006-01-19 |
Ciphertrust, Inc. |
Systems and methods for classification of messaging entities
|
US8561167B2
(en)
|
2002-03-08 |
2013-10-15 |
Mcafee, Inc. |
Web reputation scoring
|
US7096498B2
(en)
|
2002-03-08 |
2006-08-22 |
Cipher Trust, Inc. |
Systems and methods for message threat management
|
US7694128B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for secure communication delivery
|
US8578480B2
(en)
|
2002-03-08 |
2013-11-05 |
Mcafee, Inc. |
Systems and methods for identifying potentially malicious messages
|
US20030188189A1
(en)
*
|
2002-03-27 |
2003-10-02 |
Desai Anish P. |
Multi-level and multi-platform intrusion detection and response system
|
WO2003088532A1
(en)
*
|
2002-04-11 |
2003-10-23 |
The Johns Hopkins University |
Intrusion detection system for wireless networks
|
US20030200488A1
(en)
*
|
2002-04-17 |
2003-10-23 |
Lloyd Paul C. |
Method and network for containing the spread of damage from a network element subject to compromise
|
US7421491B2
(en)
*
|
2002-04-23 |
2008-09-02 |
Seer Insight Security K.K. |
Method and system for monitoring individual devices in networked environments
|
US7051102B2
(en)
*
|
2002-04-29 |
2006-05-23 |
Microsoft Corporation |
Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
|
JP4020912B2
(ja)
*
|
2002-05-28 |
2007-12-12 |
富士通株式会社 |
不正アクセス検知装置、不正アクセス検知プログラムおよび不正アクセス検知方法
|
JP3794491B2
(ja)
|
2002-08-20 |
2006-07-05 |
日本電気株式会社 |
攻撃防御システムおよび攻撃防御方法
|
ATE540505T1
(de)
*
|
2002-08-26 |
2012-01-15 |
Ibm |
Bestimmung des mit einer netzwerkaktivität assoziierten bedrohungsgrades
|
US20040049698A1
(en)
*
|
2002-09-06 |
2004-03-11 |
Ott Allen Eugene |
Computer network security system utilizing dynamic mobile sensor agents
|
US20040064725A1
(en)
*
|
2002-09-18 |
2004-04-01 |
Microsoft Corporation |
Method and system for detecting a communication problem in a computer network
|
US20040059920A1
(en)
*
|
2002-09-19 |
2004-03-25 |
International Business Machines Corporation |
Security health checking tool
|
US20040064731A1
(en)
*
|
2002-09-26 |
2004-04-01 |
Nguyen Timothy Thien-Kiem |
Integrated security administrator
|
US8819285B1
(en)
|
2002-10-01 |
2014-08-26 |
Trustwave Holdings, Inc. |
System and method for managing network communications
|
US7506360B1
(en)
|
2002-10-01 |
2009-03-17 |
Mirage Networks, Inc. |
Tracking communication for determining device states
|
US7469418B1
(en)
|
2002-10-01 |
2008-12-23 |
Mirage Networks, Inc. |
Deterring network incursion
|
US20040260947A1
(en)
*
|
2002-10-21 |
2004-12-23 |
Brady Gerard Anthony |
Methods and systems for analyzing security events
|
US7234166B2
(en)
*
|
2002-11-07 |
2007-06-19 |
Stonesoft Corporation |
Event sequence detection
|
US7788722B1
(en)
|
2002-12-02 |
2010-08-31 |
Arcsight, Inc. |
Modular agent for network security intrusion detection system
|
US7899901B1
(en)
|
2002-12-02 |
2011-03-01 |
Arcsight, Inc. |
Method and apparatus for exercising and debugging correlations for network security system
|
US7650638B1
(en)
|
2002-12-02 |
2010-01-19 |
Arcsight, Inc. |
Network security monitoring system employing bi-directional communication
|
US7376969B1
(en)
|
2002-12-02 |
2008-05-20 |
Arcsight, Inc. |
Real time monitoring and analysis of events from multiple network security devices
|
US7607169B1
(en)
|
2002-12-02 |
2009-10-20 |
Arcsight, Inc. |
User interface for network security console
|
US7219239B1
(en)
|
2002-12-02 |
2007-05-15 |
Arcsight, Inc. |
Method for batching events for transmission by software agent
|
US8176527B1
(en)
|
2002-12-02 |
2012-05-08 |
Hewlett-Packard Development Company, L. P. |
Correlation engine with support for time-based rules
|
US20040111507A1
(en)
*
|
2002-12-05 |
2004-06-10 |
Michael Villado |
Method and system for monitoring network communications in real-time
|
US7941854B2
(en)
*
|
2002-12-05 |
2011-05-10 |
International Business Machines Corporation |
Method and system for responding to a computer intrusion
|
US20040111638A1
(en)
*
|
2002-12-09 |
2004-06-10 |
Satyendra Yadav |
Rule-based network survivability framework
|
US7624143B2
(en)
*
|
2002-12-12 |
2009-11-24 |
Xerox Corporation |
Methods, apparatus, and program products for utilizing contextual property metadata in networked computing environments
|
US7461172B2
(en)
*
|
2002-12-12 |
2008-12-02 |
Xerox Corporation |
Methods, apparatus, and program products for configuring components in networked computing environments
|
CA2499938C
(en)
*
|
2002-12-13 |
2007-07-24 |
Cetacea Networks Corporation |
Network bandwidth anomaly detector apparatus and method for detecting network attacks using correlation function
|
US7409721B2
(en)
*
|
2003-01-21 |
2008-08-05 |
Symantac Corporation |
Network risk analysis
|
US7814021B2
(en)
|
2003-01-23 |
2010-10-12 |
Verdasys, Inc. |
Managed distribution of digital assets
|
US7472272B2
(en)
*
|
2003-01-23 |
2008-12-30 |
Verdasys, Inc. |
Digital asset usage accountability via event journaling
|
US7100047B2
(en)
*
|
2003-01-23 |
2006-08-29 |
Verdasys, Inc. |
Adaptive transparent encryption
|
US20040153644A1
(en)
*
|
2003-02-05 |
2004-08-05 |
Mccorkendale Bruce |
Preventing execution of potentially malicious software
|
CA2419305C
(en)
*
|
2003-02-20 |
2006-03-21 |
Ibm Canada Limited - Ibm Canada Limitee |
Unified logging service for distributed applications
|
US7318105B1
(en)
|
2003-03-11 |
2008-01-08 |
Bbn Technologies Corp. |
Dynamically detecting topology and egress nodes in communication networks
|
US8533840B2
(en)
*
|
2003-03-25 |
2013-09-10 |
DigitalDoors, Inc. |
Method and system of quantifying risk
|
US7895649B1
(en)
|
2003-04-04 |
2011-02-22 |
Raytheon Company |
Dynamic rule generation for an enterprise intrusion detection system
|
US8127359B2
(en)
*
|
2003-04-11 |
2012-02-28 |
Samir Gurunath Kelekar |
Systems and methods for real-time network-based vulnerability assessment
|
US8024795B2
(en)
|
2003-05-09 |
2011-09-20 |
Q1 Labs, Inc. |
Network intelligence system
|
WO2004107647A1
(en)
*
|
2003-05-17 |
2004-12-09 |
Microsoft Corporation |
Mechanism for evaluating security risks
|
US9100431B2
(en)
|
2003-07-01 |
2015-08-04 |
Securityprofiling, Llc |
Computer program product and apparatus for multi-path remediation
|
US9350752B2
(en)
|
2003-07-01 |
2016-05-24 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118709B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US20070113272A2
(en)
|
2003-07-01 |
2007-05-17 |
Securityprofiling, Inc. |
Real-time vulnerability monitoring
|
US9118711B2
(en)
*
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118708B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Multi-path remediation
|
US9118710B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
System, method, and computer program product for reporting an occurrence in different manners
|
US8984644B2
(en)
|
2003-07-01 |
2015-03-17 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
JP4129207B2
(ja)
*
|
2003-07-18 |
2008-08-06 |
株式会社日立製作所 |
不正侵入分析装置
|
US20050038791A1
(en)
*
|
2003-08-13 |
2005-02-17 |
Hewlett-Packard Development Company, L.P. |
System and method for event notification
|
US8225407B1
(en)
*
|
2003-08-21 |
2012-07-17 |
Symantec Corporation |
Incident prioritization and adaptive response recommendations
|
US8539063B1
(en)
|
2003-08-29 |
2013-09-17 |
Mcafee, Inc. |
Method and system for containment of networked application client software by explicit human input
|
US7260844B1
(en)
|
2003-09-03 |
2007-08-21 |
Arcsight, Inc. |
Threat detection in a network security system
|
US7353536B1
(en)
*
|
2003-09-23 |
2008-04-01 |
At&T Delaware Intellectual Property, Inc |
Methods of resetting passwords in network service systems including user redirection and related systems and computer-program products
|
JP2005108099A
(ja)
*
|
2003-10-01 |
2005-04-21 |
Hitachi Ltd |
情報セキュリティポリシー評価システム及びその制御方法
|
WO2005036339A2
(en)
*
|
2003-10-03 |
2005-04-21 |
Enterasys Networks, Inc. |
System and method for dynamic distribution of intrusion signatures
|
US8015604B1
(en)
|
2003-10-10 |
2011-09-06 |
Arcsight Inc |
Hierarchical architecture in a network security system
|
US9027120B1
(en)
|
2003-10-10 |
2015-05-05 |
Hewlett-Packard Development Company, L.P. |
Hierarchical architecture in a network security system
|
JP4188203B2
(ja)
*
|
2003-10-27 |
2008-11-26 |
Kddi株式会社 |
ログ分析装置、ログ分析方法およびログ分析プログラム
|
JP4051020B2
(ja)
*
|
2003-10-28 |
2008-02-20 |
富士通株式会社 |
ワーム判定プログラム、ワーム判定プログラムを記憶したコンピュータ読み取り可能な記憶媒体、ワーム判定方法およびワーム判定装置
|
US7333999B1
(en)
|
2003-10-30 |
2008-02-19 |
Arcsight, Inc. |
Expression editor
|
US20050138426A1
(en)
*
|
2003-11-07 |
2005-06-23 |
Brian Styslinger |
Method, system, and apparatus for managing, monitoring, auditing, cataloging, scoring, and improving vulnerability assessment tests, as well as automating retesting efforts and elements of tests
|
US9401838B2
(en)
*
|
2003-12-03 |
2016-07-26 |
Emc Corporation |
Network event capture and retention system
|
US7565696B1
(en)
|
2003-12-10 |
2009-07-21 |
Arcsight, Inc. |
Synchronizing network security devices within a network security system
|
US20050198530A1
(en)
*
|
2003-12-12 |
2005-09-08 |
Chess David M. |
Methods and apparatus for adaptive server reprovisioning under security assault
|
FR2864392A1
(fr)
*
|
2003-12-17 |
2005-06-24 |
France Telecom |
Procede de classification automatique d'un ensemble d'alertes issues de sondes de detection d'intrusions d'un systeme de securite d'information
|
US7840968B1
(en)
|
2003-12-17 |
2010-11-23 |
Mcafee, Inc. |
Method and system for containment of usage of language interfaces
|
US8528077B1
(en)
|
2004-04-09 |
2013-09-03 |
Hewlett-Packard Development Company, L.P. |
Comparing events from multiple network security devices
|
US20050240781A1
(en)
*
|
2004-04-22 |
2005-10-27 |
Gassoway Paul A |
Prioritizing intrusion detection logs
|
US20050240780A1
(en)
*
|
2004-04-23 |
2005-10-27 |
Cetacea Networks Corporation |
Self-propagating program detector apparatus, method, signals and medium
|
US7509677B2
(en)
|
2004-05-04 |
2009-03-24 |
Arcsight, Inc. |
Pattern discovery in a network security system
|
US8074277B2
(en)
*
|
2004-06-07 |
2011-12-06 |
Check Point Software Technologies, Inc. |
System and methodology for intrusion detection and prevention
|
US7620986B1
(en)
*
|
2004-06-14 |
2009-11-17 |
Xangati, Inc. |
Defenses against software attacks in distributed computing environments
|
US7873955B1
(en)
|
2004-09-07 |
2011-01-18 |
Mcafee, Inc. |
Solidifying the executable software set of a computer
|
US7836506B2
(en)
*
|
2004-09-22 |
2010-11-16 |
Cyberdefender Corporation |
Threat protection network
|
US8108929B2
(en)
*
|
2004-10-19 |
2012-01-31 |
Reflex Systems, LLC |
Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms
|
US20060085852A1
(en)
*
|
2004-10-20 |
2006-04-20 |
Caleb Sima |
Enterprise assessment management
|
US7424742B1
(en)
|
2004-10-27 |
2008-09-09 |
Arcsight, Inc. |
Dynamic security events and event channels in a network security system
|
US7644438B1
(en)
|
2004-10-27 |
2010-01-05 |
Arcsight, Inc. |
Security event aggregation at software agent
|
US9100422B1
(en)
*
|
2004-10-27 |
2015-08-04 |
Hewlett-Packard Development Company, L.P. |
Network zone identification in a network security system
|
US8635690B2
(en)
|
2004-11-05 |
2014-01-21 |
Mcafee, Inc. |
Reputation based message processing
|
US20060117387A1
(en)
*
|
2004-11-30 |
2006-06-01 |
Gunsalus Bradley W |
Propagation protection of email within a network
|
US20060117385A1
(en)
*
|
2004-11-30 |
2006-06-01 |
Mester Michael L |
Monitoring propagation protection within a network
|
US7478424B2
(en)
*
|
2004-11-30 |
2009-01-13 |
Cymtec Systems, Inc. |
Propagation protection within a network
|
US20080222532A1
(en)
*
|
2004-11-30 |
2008-09-11 |
Mester Michael L |
Controlling and Monitoring Propagation Within a Network
|
US7809131B1
(en)
|
2004-12-23 |
2010-10-05 |
Arcsight, Inc. |
Adjusting sensor time in a network security system
|
US7647632B1
(en)
|
2005-01-04 |
2010-01-12 |
Arcsight, Inc. |
Object reference in a system
|
US7979889B2
(en)
*
|
2005-01-07 |
2011-07-12 |
Cisco Technology, Inc. |
Methods and apparatus providing security to computer systems and networks
|
US20080276317A1
(en)
*
|
2005-01-10 |
2008-11-06 |
Varun Chandola |
Detection of Multi-Step Computer Processes Such as Network Intrusions
|
US8850565B2
(en)
*
|
2005-01-10 |
2014-09-30 |
Hewlett-Packard Development Company, L.P. |
System and method for coordinating network incident response activities
|
US7610610B2
(en)
|
2005-01-10 |
2009-10-27 |
Mcafee, Inc. |
Integrated firewall, IPS, and virus scanner system and method
|
US7809826B1
(en)
|
2005-01-27 |
2010-10-05 |
Juniper Networks, Inc. |
Remote aggregation of network traffic profiling data
|
US7769851B1
(en)
*
|
2005-01-27 |
2010-08-03 |
Juniper Networks, Inc. |
Application-layer monitoring and profiling network traffic
|
US7937755B1
(en)
|
2005-01-27 |
2011-05-03 |
Juniper Networks, Inc. |
Identification of network policy violations
|
US7810151B1
(en)
|
2005-01-27 |
2010-10-05 |
Juniper Networks, Inc. |
Automated change detection within a network environment
|
US7797411B1
(en)
|
2005-02-02 |
2010-09-14 |
Juniper Networks, Inc. |
Detection and prevention of encapsulated network attacks using an intermediate device
|
US9256740B2
(en)
|
2005-02-22 |
2016-02-09 |
International Business Machines Corporation |
Method and system for analysis of security events in a managed computer network
|
US7844999B1
(en)
|
2005-03-01 |
2010-11-30 |
Arcsight, Inc. |
Message parsing in a network security system
|
US8359645B2
(en)
*
|
2005-03-25 |
2013-01-22 |
Microsoft Corporation |
Dynamic protection of unpatched machines
|
US8589530B2
(en)
*
|
2005-03-28 |
2013-11-19 |
Riverbed Technology, Inc. |
Method and system for managing a distributed network of network monitoring devices
|
US8516583B2
(en)
|
2005-03-31 |
2013-08-20 |
Microsoft Corporation |
Aggregating the knowledge base of computer systems to proactively protect a computer from malware
|
US7603552B1
(en)
|
2005-05-04 |
2009-10-13 |
Mcafee, Inc. |
Piracy prevention using unique module translation
|
US20060259967A1
(en)
*
|
2005-05-13 |
2006-11-16 |
Microsoft Corporation |
Proactively protecting computers in a networking environment from malware
|
US7743421B2
(en)
|
2005-05-18 |
2010-06-22 |
Alcatel Lucent |
Communication network security risk exposure management systems and methods
|
US8572733B1
(en)
|
2005-07-06 |
2013-10-29 |
Raytheon Company |
System and method for active data collection in a network security system
|
US7856661B1
(en)
|
2005-07-14 |
2010-12-21 |
Mcafee, Inc. |
Classification of software on networked systems
|
US8209759B2
(en)
*
|
2005-07-18 |
2012-06-26 |
Q1 Labs, Inc. |
Security incident manager
|
US7873998B1
(en)
*
|
2005-07-19 |
2011-01-18 |
Trustwave Holdings, Inc. |
Rapidly propagating threat detection
|
US7716739B1
(en)
*
|
2005-07-20 |
2010-05-11 |
Symantec Corporation |
Subjective and statistical event tracking incident management system
|
US7937344B2
(en)
|
2005-07-25 |
2011-05-03 |
Splunk Inc. |
Machine data web
|
EP1917778A2
(en)
*
|
2005-08-03 |
2008-05-07 |
Calyptix Security |
Systems and methods for dynamically learning network environments to achieve adaptive security
|
US8224761B1
(en)
|
2005-09-01 |
2012-07-17 |
Raytheon Company |
System and method for interactive correlation rule design in a network security system
|
US7950058B1
(en)
*
|
2005-09-01 |
2011-05-24 |
Raytheon Company |
System and method for collaborative information security correlation in low bandwidth environments
|
US7814548B2
(en)
|
2005-09-13 |
2010-10-12 |
Honeywell International Inc. |
Instance based learning framework for effective behavior profiling and anomaly intrusion detection
|
US8544098B2
(en)
*
|
2005-09-22 |
2013-09-24 |
Alcatel Lucent |
Security vulnerability information aggregation
|
US8095984B2
(en)
|
2005-09-22 |
2012-01-10 |
Alcatel Lucent |
Systems and methods of associating security vulnerabilities and assets
|
US8438643B2
(en)
*
|
2005-09-22 |
2013-05-07 |
Alcatel Lucent |
Information system service-level security risk analysis
|
US20070074289A1
(en)
*
|
2005-09-28 |
2007-03-29 |
Phil Maddaloni |
Client side exploit tracking
|
DE102005055148B4
(de)
*
|
2005-11-18 |
2008-04-10 |
Siemens Ag |
Verfahren, Detektionseinrichtung und Servereinrichtung zur Auswertung einer eingehenden Kommunikation an einer Kommunikationseinrichtung
|
US8069452B2
(en)
|
2005-12-01 |
2011-11-29 |
Telefonaktiebolaget L M Ericsson (Publ) |
Method and management agent for event notifications correlation
|
US7961633B2
(en)
*
|
2005-12-08 |
2011-06-14 |
Sanjeev Shankar |
Method and system for real time detection of threats in high volume data streams
|
US8413245B2
(en)
*
|
2005-12-16 |
2013-04-02 |
Cisco Technology, Inc. |
Methods and apparatus providing computer and network security for polymorphic attacks
|
US8495743B2
(en)
|
2005-12-16 |
2013-07-23 |
Cisco Technology, Inc. |
Methods and apparatus providing automatic signature generation and enforcement
|
US7882560B2
(en)
*
|
2005-12-16 |
2011-02-01 |
Cisco Technology, Inc. |
Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
|
US9286469B2
(en)
*
|
2005-12-16 |
2016-03-15 |
Cisco Technology, Inc. |
Methods and apparatus providing computer and network security utilizing probabilistic signature generation
|
US7793138B2
(en)
*
|
2005-12-21 |
2010-09-07 |
Cisco Technology, Inc. |
Anomaly detection for storage traffic in a data center
|
US7590113B1
(en)
*
|
2005-12-29 |
2009-09-15 |
At&T Corp. |
Method and apparatus for generating a reconnaissance index
|
US7849185B1
(en)
|
2006-01-10 |
2010-12-07 |
Raytheon Company |
System and method for attacker attribution in a network security system
|
US7757269B1
(en)
|
2006-02-02 |
2010-07-13 |
Mcafee, Inc. |
Enforcing alignment of approved changes and deployed changes in the software change life-cycle
|
US9167000B2
(en)
*
|
2006-02-14 |
2015-10-20 |
Ca, Inc. |
Dynamic threat event management system and method
|
US8640231B2
(en)
*
|
2006-02-23 |
2014-01-28 |
Microsoft Corporation |
Client side attack resistant phishing detection
|
US7895573B1
(en)
|
2006-03-27 |
2011-02-22 |
Mcafee, Inc. |
Execution environment file inventory
|
JP4786392B2
(ja)
*
|
2006-03-31 |
2011-10-05 |
セコム株式会社 |
事象情報管理システム
|
US7437359B2
(en)
*
|
2006-04-05 |
2008-10-14 |
Arcsight, Inc. |
Merging multiple log entries in accordance with merge properties and mapping properties
|
US7870387B1
(en)
|
2006-04-07 |
2011-01-11 |
Mcafee, Inc. |
Program-based authorization
|
US8181244B2
(en)
*
|
2006-04-20 |
2012-05-15 |
Webroot Inc. |
Backward researching time stamped events to find an origin of pestware
|
US8201243B2
(en)
*
|
2006-04-20 |
2012-06-12 |
Webroot Inc. |
Backwards researching activity indicative of pestware
|
US8352930B1
(en)
|
2006-04-24 |
2013-01-08 |
Mcafee, Inc. |
Software modification by group to minimize breakage
|
US8555404B1
(en)
|
2006-05-18 |
2013-10-08 |
Mcafee, Inc. |
Connectivity-based authorization
|
US7805675B2
(en)
*
|
2006-05-19 |
2010-09-28 |
International Business Machines Corporation |
Methods, systems, and computer program products for recreating events occurring within a web application
|
EP1870829B1
(en)
*
|
2006-06-23 |
2014-12-03 |
Microsoft Corporation |
Securing software by enforcing data flow integrity
|
US8190868B2
(en)
|
2006-08-07 |
2012-05-29 |
Webroot Inc. |
Malware management through kernel detection
|
US8230505B1
(en)
|
2006-08-11 |
2012-07-24 |
Avaya Inc. |
Method for cooperative intrusion prevention through collaborative inference
|
US9147271B2
(en)
|
2006-09-08 |
2015-09-29 |
Microsoft Technology Licensing, Llc |
Graphical representation of aggregated data
|
US8234706B2
(en)
*
|
2006-09-08 |
2012-07-31 |
Microsoft Corporation |
Enabling access to aggregated software security information
|
CN101641674B
(zh)
|
2006-10-05 |
2012-10-10 |
斯普兰克公司 |
时间序列搜索引擎
|
US7832008B1
(en)
*
|
2006-10-11 |
2010-11-09 |
Cisco Technology, Inc. |
Protection of computer resources
|
US8108550B2
(en)
*
|
2006-10-25 |
2012-01-31 |
Hewlett-Packard Development Company, L.P. |
Real-time identification of an asset model and categorization of an asset to assist in computer network security
|
US20080148398A1
(en)
*
|
2006-10-31 |
2008-06-19 |
Derek John Mezack |
System and Method for Definition and Automated Analysis of Computer Security Threat Models
|
US8811156B1
(en)
|
2006-11-14 |
2014-08-19 |
Raytheon Company |
Compressing n-dimensional data
|
US7698305B2
(en)
|
2006-12-01 |
2010-04-13 |
Microsoft Corporation |
Program modification and loading times in computing devices
|
US8082342B1
(en)
*
|
2006-12-27 |
2011-12-20 |
Google Inc. |
Discovery of short-term and emerging trends in computer network traffic
|
US8332929B1
(en)
|
2007-01-10 |
2012-12-11 |
Mcafee, Inc. |
Method and apparatus for process enforced configuration management
|
US9424154B2
(en)
|
2007-01-10 |
2016-08-23 |
Mcafee, Inc. |
Method of and system for computer system state checks
|
US8214497B2
(en)
|
2007-01-24 |
2012-07-03 |
Mcafee, Inc. |
Multi-dimensional reputation scoring
|
US8179798B2
(en)
|
2007-01-24 |
2012-05-15 |
Mcafee, Inc. |
Reputation based connection throttling
|
US8763114B2
(en)
|
2007-01-24 |
2014-06-24 |
Mcafee, Inc. |
Detecting image spam
|
US7779156B2
(en)
|
2007-01-24 |
2010-08-17 |
Mcafee, Inc. |
Reputation based load balancing
|
WO2008098260A1
(en)
*
|
2007-02-09 |
2008-08-14 |
Smobile Systems, Inc. |
Off-line mms malware scanning system and method
|
US20080208958A1
(en)
*
|
2007-02-28 |
2008-08-28 |
Microsoft Corporation |
Risk assessment program for a directory service
|
US10395309B2
(en)
*
|
2007-03-30 |
2019-08-27 |
Detica Patent Limited |
Detection of activity patterns
|
US8955122B2
(en)
|
2007-04-04 |
2015-02-10 |
Sri International |
Method and apparatus for detecting malware infection
|
US9813431B2
(en)
*
|
2007-05-31 |
2017-11-07 |
Red Hat, Inc. |
Browser initiated reporting of fraud
|
US8006303B1
(en)
*
|
2007-06-07 |
2011-08-23 |
International Business Machines Corporation |
System, method and program product for intrusion protection of a network
|
US8250651B2
(en)
*
|
2007-06-28 |
2012-08-21 |
Microsoft Corporation |
Identifying attributes of aggregated data
|
US8302197B2
(en)
*
|
2007-06-28 |
2012-10-30 |
Microsoft Corporation |
Identifying data associated with security issue attributes
|
US8166138B2
(en)
*
|
2007-06-29 |
2012-04-24 |
Apple Inc. |
Network evaluation grid techniques
|
US8645527B1
(en)
|
2007-07-25 |
2014-02-04 |
Xangati, Inc. |
Network monitoring using bounded memory data structures
|
US9961094B1
(en)
|
2007-07-25 |
2018-05-01 |
Xangati, Inc |
Symptom detection using behavior probability density, network monitoring of multiple observation value types, and network monitoring using orthogonal profiling dimensions
|
US8639797B1
(en)
|
2007-08-03 |
2014-01-28 |
Xangati, Inc. |
Network monitoring of behavior probability density
|
US7620992B2
(en)
*
|
2007-10-02 |
2009-11-17 |
Kaspersky Lab Zao |
System and method for detecting multi-component malware
|
US8195931B1
(en)
|
2007-10-31 |
2012-06-05 |
Mcafee, Inc. |
Application change control
|
US8185930B2
(en)
|
2007-11-06 |
2012-05-22 |
Mcafee, Inc. |
Adjusting filter or classification control settings
|
US20090172674A1
(en)
*
|
2007-12-28 |
2009-07-02 |
International Business Machines Corporation |
Managing the computer collection of information in an information technology environment
|
US20090171708A1
(en)
*
|
2007-12-28 |
2009-07-02 |
International Business Machines Corporation |
Using templates in a computing environment
|
US8826077B2
(en)
*
|
2007-12-28 |
2014-09-02 |
International Business Machines Corporation |
Defining a computer recovery process that matches the scope of outage including determining a root cause and performing escalated recovery operations
|
US8447859B2
(en)
*
|
2007-12-28 |
2013-05-21 |
International Business Machines Corporation |
Adaptive business resiliency computer system for information technology environments
|
US8375244B2
(en)
*
|
2007-12-28 |
2013-02-12 |
International Business Machines Corporation |
Managing processing of a computing environment during failures of the environment
|
US8682705B2
(en)
*
|
2007-12-28 |
2014-03-25 |
International Business Machines Corporation |
Information technology management based on computer dynamically adjusted discrete phases of event correlation
|
US8341014B2
(en)
*
|
2007-12-28 |
2012-12-25 |
International Business Machines Corporation |
Recovery segments for computer business applications
|
US8763006B2
(en)
*
|
2007-12-28 |
2014-06-24 |
International Business Machines Corporation |
Dynamic generation of processes in computing environments
|
US8751283B2
(en)
*
|
2007-12-28 |
2014-06-10 |
International Business Machines Corporation |
Defining and using templates in configuring information technology environments
|
US8365185B2
(en)
*
|
2007-12-28 |
2013-01-29 |
International Business Machines Corporation |
Preventing execution of processes responsive to changes in the environment
|
US8782662B2
(en)
*
|
2007-12-28 |
2014-07-15 |
International Business Machines Corporation |
Adaptive computer sequencing of actions
|
US8326910B2
(en)
*
|
2007-12-28 |
2012-12-04 |
International Business Machines Corporation |
Programmatic validation in an information technology environment
|
US20090171731A1
(en)
*
|
2007-12-28 |
2009-07-02 |
International Business Machines Corporation |
Use of graphs in managing computing environments
|
US8346931B2
(en)
*
|
2007-12-28 |
2013-01-01 |
International Business Machines Corporation |
Conditional computer runtime control of an information technology environment based on pairing constructs
|
US8990810B2
(en)
|
2007-12-28 |
2015-03-24 |
International Business Machines Corporation |
Projecting an effect, using a pairing construct, of execution of a proposed action on a computing environment
|
US20090172669A1
(en)
*
|
2007-12-28 |
2009-07-02 |
International Business Machines Corporation |
Use of redundancy groups in runtime computer management of business applications
|
US8677174B2
(en)
*
|
2007-12-28 |
2014-03-18 |
International Business Machines Corporation |
Management of runtime events in a computer environment using a containment region
|
US8428983B2
(en)
*
|
2007-12-28 |
2013-04-23 |
International Business Machines Corporation |
Facilitating availability of information technology resources based on pattern system environments
|
US20090171703A1
(en)
*
|
2007-12-28 |
2009-07-02 |
International Business Machines Corporation |
Use of multi-level state assessment in computer business environments
|
US20090172149A1
(en)
*
|
2007-12-28 |
2009-07-02 |
International Business Machines Corporation |
Real-time information technology environments
|
US9558459B2
(en)
*
|
2007-12-28 |
2017-01-31 |
International Business Machines Corporation |
Dynamic selection of actions in an information technology environment
|
US8868441B2
(en)
*
|
2007-12-28 |
2014-10-21 |
International Business Machines Corporation |
Non-disruptively changing a computing environment
|
US8701189B2
(en)
|
2008-01-31 |
2014-04-15 |
Mcafee, Inc. |
Method of and system for computer system denial-of-service protection
|
US8589503B2
(en)
|
2008-04-04 |
2013-11-19 |
Mcafee, Inc. |
Prioritizing network traffic
|
US8615502B2
(en)
|
2008-04-18 |
2013-12-24 |
Mcafee, Inc. |
Method of and system for reverse mapping vnode pointers
|
US8365259B2
(en)
*
|
2008-05-28 |
2013-01-29 |
Zscaler, Inc. |
Security message processing
|
US8452891B2
(en)
|
2008-06-19 |
2013-05-28 |
4Dk Technologies, Inc. |
Routing in a communications network using contextual information
|
US8689335B2
(en)
*
|
2008-06-25 |
2014-04-01 |
Microsoft Corporation |
Mapping between users and machines in an enterprise security assessment sharing system
|
US8358783B2
(en)
|
2008-08-11 |
2013-01-22 |
Assa Abloy Ab |
Secure wiegand communications
|
ES2485501T3
(es)
*
|
2008-08-14 |
2014-08-13 |
Assa Abloy Ab |
Lector de RFID con heurísticas de detección de ataques incorporadas
|
US20100070776A1
(en)
*
|
2008-09-17 |
2010-03-18 |
Shankar Raman |
Logging system events
|
US7987255B2
(en)
*
|
2008-11-07 |
2011-07-26 |
Oracle America, Inc. |
Distributed denial of service congestion recovery using split horizon DNS
|
US8806632B2
(en)
*
|
2008-11-17 |
2014-08-12 |
Solarwinds Worldwide, Llc |
Systems, methods, and devices for detecting security vulnerabilities in IP networks
|
US20100125663A1
(en)
*
|
2008-11-17 |
2010-05-20 |
Donovan John J |
Systems, methods, and devices for detecting security vulnerabilities in ip networks
|
US8544003B1
(en)
|
2008-12-11 |
2013-09-24 |
Mcafee, Inc. |
System and method for managing virtual machine configurations
|
US11489857B2
(en)
|
2009-04-21 |
2022-11-01 |
Webroot Inc. |
System and method for developing a risk profile for an internet resource
|
US10992555B2
(en)
|
2009-05-29 |
2021-04-27 |
Virtual Instruments Worldwide, Inc. |
Recording, replay, and sharing of live network monitoring views
|
WO2011002818A1
(en)
*
|
2009-06-29 |
2011-01-06 |
Cyberdefender Corporation |
Systems and methods for operating an anti-malware network on a cloud computing platform
|
US8381284B2
(en)
|
2009-08-21 |
2013-02-19 |
Mcafee, Inc. |
System and method for enforcing security policies in a virtual environment
|
US8341627B2
(en)
|
2009-08-21 |
2012-12-25 |
Mcafee, Inc. |
Method and system for providing user space address protection from writable memory area in a virtual environment
|
US9477947B2
(en)
*
|
2009-08-24 |
2016-10-25 |
International Business Machines Corporation |
Retrospective changing of previously sent messages
|
US9552497B2
(en)
|
2009-11-10 |
2017-01-24 |
Mcafee, Inc. |
System and method for preventing data loss using virtual machine wrapped applications
|
US8949987B2
(en)
*
|
2010-01-06 |
2015-02-03 |
Alcatel Lucent |
Computer security process monitor
|
US8621638B2
(en)
|
2010-05-14 |
2013-12-31 |
Mcafee, Inc. |
Systems and methods for classification of messaging entities
|
US8938800B2
(en)
|
2010-07-28 |
2015-01-20 |
Mcafee, Inc. |
System and method for network level protection against malicious software
|
US8925101B2
(en)
|
2010-07-28 |
2014-12-30 |
Mcafee, Inc. |
System and method for local protection against malicious software
|
US8549003B1
(en)
|
2010-09-12 |
2013-10-01 |
Mcafee, Inc. |
System and method for clustering host inventories
|
US9075993B2
(en)
|
2011-01-24 |
2015-07-07 |
Mcafee, Inc. |
System and method for selectively grouping and managing program files
|
US9112830B2
(en)
|
2011-02-23 |
2015-08-18 |
Mcafee, Inc. |
System and method for interlocking a host and a gateway
|
US9118702B2
(en)
*
|
2011-05-31 |
2015-08-25 |
Bce Inc. |
System and method for generating and refining cyber threat intelligence data
|
US9646155B2
(en)
*
|
2011-09-09 |
2017-05-09 |
Hewlett Packard Enterprise Development Lp |
Systems and methods for evaluation of events based on a reference baseline according to temporal position in a sequence of events
|
US9594881B2
(en)
|
2011-09-09 |
2017-03-14 |
Mcafee, Inc. |
System and method for passive threat detection using virtual memory inspection
|
US8726385B2
(en)
*
|
2011-10-05 |
2014-05-13 |
Mcafee, Inc. |
Distributed system and method for tracking and blocking malicious internet hosts
|
US8694738B2
(en)
|
2011-10-11 |
2014-04-08 |
Mcafee, Inc. |
System and method for critical address space protection in a hypervisor environment
|
US9069586B2
(en)
|
2011-10-13 |
2015-06-30 |
Mcafee, Inc. |
System and method for kernel rootkit protection in a hypervisor environment
|
US8973144B2
(en)
|
2011-10-13 |
2015-03-03 |
Mcafee, Inc. |
System and method for kernel rootkit protection in a hypervisor environment
|
US8800024B2
(en)
|
2011-10-17 |
2014-08-05 |
Mcafee, Inc. |
System and method for host-initiated firewall discovery in a network environment
|
US8713668B2
(en)
|
2011-10-17 |
2014-04-29 |
Mcafee, Inc. |
System and method for redirected firewall discovery in a network environment
|
US8739272B1
(en)
|
2012-04-02 |
2014-05-27 |
Mcafee, Inc. |
System and method for interlocking a host and a gateway
|
US20130333041A1
(en)
*
|
2012-06-12 |
2013-12-12 |
International Business Machines Corporation |
Method and Apparatus for Automatic Identification of Affected Network Resources After a Computer Intrusion
|
US8613089B1
(en)
|
2012-08-07 |
2013-12-17 |
Cloudflare, Inc. |
Identifying a denial-of-service attack in a cloud-based proxy service
|
US9258321B2
(en)
|
2012-08-23 |
2016-02-09 |
Raytheon Foreground Security, Inc. |
Automated internet threat detection and mitigation system and associated methods
|
US9392003B2
(en)
|
2012-08-23 |
2016-07-12 |
Raytheon Foreground Security, Inc. |
Internet security cyber threat reporting system and method
|
CN104620252B
(zh)
|
2012-09-19 |
2017-06-23 |
三菱电机株式会社 |
信息处理装置及信息处理方法
|
US8973146B2
(en)
|
2012-12-27 |
2015-03-03 |
Mcafee, Inc. |
Herd based scan avoidance system in a network environment
|
WO2014112185A1
(ja)
|
2013-01-21 |
2014-07-24 |
三菱電機株式会社 |
攻撃分析システム及び連携装置及び攻撃分析連携方法及びプログラム
|
CN103970261B
(zh)
*
|
2013-02-05 |
2017-09-22 |
宝德科技股份有限公司 |
输入装置及其反应操作状态的方法
|
US9990499B2
(en)
*
|
2013-08-05 |
2018-06-05 |
Netflix, Inc. |
Dynamic security testing
|
WO2015031866A1
(en)
*
|
2013-08-30 |
2015-03-05 |
Clearpath Networks, Inc. |
System and method of network functions virtualization of network services within and across clouds
|
US9213807B2
(en)
*
|
2013-09-04 |
2015-12-15 |
Raytheon Cyber Products, Llc |
Detection of code injection attacks
|
CN105580023B
(zh)
|
2013-10-24 |
2019-08-16 |
迈克菲股份有限公司 |
网络环境中的代理辅助的恶意应用阻止
|
JP6053948B2
(ja)
*
|
2013-10-24 |
2016-12-27 |
三菱電機株式会社 |
情報処理装置及び情報処理方法及びプログラム
|
JP6229504B2
(ja)
|
2014-01-09 |
2017-11-15 |
富士通株式会社 |
ネットワーク監視装置、監視方法及びプログラム
|
US10419454B2
(en)
|
2014-02-28 |
2019-09-17 |
British Telecommunications Public Limited Company |
Malicious encrypted traffic inhibitor
|
WO2015134572A1
(en)
*
|
2014-03-06 |
2015-09-11 |
Foreground Security |
Internet security cyber threat reporting
|
US9660930B2
(en)
|
2014-03-17 |
2017-05-23 |
Splunk Inc. |
Dynamic data server nodes
|
US9753818B2
(en)
|
2014-09-19 |
2017-09-05 |
Splunk Inc. |
Data forwarding using multiple data pipelines
|
US9838346B2
(en)
|
2014-03-17 |
2017-12-05 |
Splunk Inc. |
Alerting on dual-queue systems
|
US9503467B2
(en)
|
2014-05-22 |
2016-11-22 |
Accenture Global Services Limited |
Network anomaly detection
|
DE102014213752A1
(de)
*
|
2014-07-15 |
2016-01-21 |
Siemens Aktiengesellschaft |
Rechenvorrichtung und Verfahren zum Erkennen von Angriffen auf ein technisches System anhand von Ereignissen einer Ereignisfolge
|
US9407645B2
(en)
*
|
2014-08-29 |
2016-08-02 |
Accenture Global Services Limited |
Security threat information analysis
|
US9716721B2
(en)
|
2014-08-29 |
2017-07-25 |
Accenture Global Services Limited |
Unstructured security threat information analysis
|
US9922037B2
(en)
|
2015-01-30 |
2018-03-20 |
Splunk Inc. |
Index time, delimiter based extractions and previewing for use in indexing
|
US10891383B2
(en)
|
2015-02-11 |
2021-01-12 |
British Telecommunications Public Limited Company |
Validating computer resource usage
|
WO2017021153A1
(en)
|
2015-07-31 |
2017-02-09 |
British Telecommunications Public Limited Company |
Expendable access control
|
US11347876B2
(en)
|
2015-07-31 |
2022-05-31 |
British Telecommunications Public Limited Company |
Access control
|
EP3329440A1
(en)
|
2015-07-31 |
2018-06-06 |
British Telecommunications public limited company |
Controlled resource provisioning in distributed computing environments
|
US9979743B2
(en)
|
2015-08-13 |
2018-05-22 |
Accenture Global Services Limited |
Computer asset vulnerabilities
|
US9699205B2
(en)
|
2015-08-31 |
2017-07-04 |
Splunk Inc. |
Network security system
|
US9886582B2
(en)
|
2015-08-31 |
2018-02-06 |
Accenture Global Sevices Limited |
Contextualization of threat data
|
US10839077B2
(en)
|
2015-12-24 |
2020-11-17 |
British Telecommunications Public Limited Company |
Detecting malicious software
|
US10733296B2
(en)
|
2015-12-24 |
2020-08-04 |
British Telecommunications Public Limited Company |
Software security
|
WO2017109135A1
(en)
|
2015-12-24 |
2017-06-29 |
British Telecommunications Public Limited Company |
Malicious network traffic identification
|
WO2017108575A1
(en)
|
2015-12-24 |
2017-06-29 |
British Telecommunications Public Limited Company |
Malicious software identification
|
WO2017108576A1
(en)
|
2015-12-24 |
2017-06-29 |
British Telecommunications Public Limited Company |
Malicious software identification
|
EP3437290B1
(en)
*
|
2016-03-30 |
2020-08-26 |
British Telecommunications public limited company |
Detecting computer security threats
|
US11023248B2
(en)
|
2016-03-30 |
2021-06-01 |
British Telecommunications Public Limited Company |
Assured application services
|
US11128647B2
(en)
|
2016-03-30 |
2021-09-21 |
British Telecommunications Public Limited Company |
Cryptocurrencies malware based detection
|
WO2017167549A1
(en)
|
2016-03-30 |
2017-10-05 |
British Telecommunications Public Limited Company |
Untrusted code distribution
|
WO2017167545A1
(en)
|
2016-03-30 |
2017-10-05 |
British Telecommunications Public Limited Company |
Network traffic threat identification
|
WO2018033375A2
(en)
|
2016-08-16 |
2018-02-22 |
British Telecommunications Public Limited Company |
Mitigating security attacks in virtualised computing environments
|
EP3500969A1
(en)
|
2016-08-16 |
2019-06-26 |
British Telecommunications Public Limited Company |
Reconfigured virtual machine to mitigate attack
|
US9578066B1
(en)
*
|
2016-09-14 |
2017-02-21 |
Hytrust, Inc. |
Systems and method for assuring security governance in managed computer systems
|
US10313396B2
(en)
*
|
2016-11-15 |
2019-06-04 |
Cisco Technology, Inc. |
Routing and/or forwarding information driven subscription against global security policy data
|
US10452877B2
(en)
|
2016-12-16 |
2019-10-22 |
Assa Abloy Ab |
Methods to combine and auto-configure wiegand and RS485
|
US10791134B2
(en)
*
|
2016-12-21 |
2020-09-29 |
Threat Stack, Inc. |
System and method for cloud-based operating system event and data access monitoring
|
US10771483B2
(en)
|
2016-12-30 |
2020-09-08 |
British Telecommunications Public Limited Company |
Identifying an attacked computing device
|
US11605093B1
(en)
*
|
2017-02-22 |
2023-03-14 |
Amazon Technologies, Inc. |
Security policy enforcement
|
US10931694B2
(en)
*
|
2017-02-24 |
2021-02-23 |
LogRhythm Inc. |
Processing pipeline for monitoring information systems
|
US11677757B2
(en)
|
2017-03-28 |
2023-06-13 |
British Telecommunications Public Limited Company |
Initialization vector identification for encrypted malware traffic detection
|
EP3602369B1
(en)
|
2017-03-30 |
2022-03-30 |
British Telecommunications public limited company |
Anomaly detection for computer systems
|
EP3382591B1
(en)
|
2017-03-30 |
2020-03-25 |
British Telecommunications public limited company |
Hierarchical temporal memory for expendable access control
|
US11586751B2
(en)
|
2017-03-30 |
2023-02-21 |
British Telecommunications Public Limited Company |
Hierarchical temporal memory for access control
|
EP3622450A1
(en)
|
2017-05-08 |
2020-03-18 |
British Telecommunications Public Limited Company |
Management of interoperating machine leaning algorithms
|
EP3622447A1
(en)
|
2017-05-08 |
2020-03-18 |
British Telecommunications Public Limited Company |
Interoperation of machine learning algorithms
|
EP3622448A1
(en)
|
2017-05-08 |
2020-03-18 |
British Telecommunications Public Limited Company |
Adaptation of machine learning algorithms
|
US11934937B2
(en)
|
2017-07-10 |
2024-03-19 |
Accenture Global Solutions Limited |
System and method for detecting the occurrence of an event and determining a response to the event
|
US10547629B2
(en)
*
|
2017-11-05 |
2020-01-28 |
Rapid7, Inc. |
Detecting malicious network activity using time series payload data
|
US10616261B2
(en)
|
2017-11-30 |
2020-04-07 |
Bank Of America Corporation |
System for information security threat assessment based on data history
|
US10824734B2
(en)
|
2017-11-30 |
2020-11-03 |
Bank Of America Corporation |
System for recurring information security threat assessment
|
US10607013B2
(en)
|
2017-11-30 |
2020-03-31 |
Bank Of America Corporation |
System for information security threat assessment and event triggering
|
US10963328B2
(en)
*
|
2018-09-05 |
2021-03-30 |
Mikroelektronika D.O.O. |
WiFi programmer and debugger for microcontroller and method thereof
|
EP3623982B1
(en)
|
2018-09-12 |
2021-05-19 |
British Telecommunications public limited company |
Ransomware remediation
|
EP3623980B1
(en)
|
2018-09-12 |
2021-04-28 |
British Telecommunications public limited company |
Ransomware encryption algorithm determination
|
WO2020053292A1
(en)
|
2018-09-12 |
2020-03-19 |
British Telecommunications Public Limited Company |
Encryption key seed determination
|
US11258827B2
(en)
|
2018-10-19 |
2022-02-22 |
Oracle International Corporation |
Autonomous monitoring of applications in a cloud environment
|
KR102175950B1
(ko)
*
|
2018-12-10 |
2020-11-09 |
한국전자통신연구원 |
이기종 시스템의 보안정보 정규화 장치 및 방법
|
US11323459B2
(en)
*
|
2018-12-10 |
2022-05-03 |
Bitdefender IPR Management Ltd. |
Systems and methods for behavioral threat detection
|
US11153332B2
(en)
|
2018-12-10 |
2021-10-19 |
Bitdefender IPR Management Ltd. |
Systems and methods for behavioral threat detection
|
US11089034B2
(en)
*
|
2018-12-10 |
2021-08-10 |
Bitdefender IPR Management Ltd. |
Systems and methods for behavioral threat detection
|
EP3767913B1
(en)
*
|
2019-07-17 |
2023-08-02 |
AO Kaspersky Lab |
Systems and methods for correlating events to detect an information security incident
|
RU2739864C1
(ru)
|
2019-07-17 |
2020-12-29 |
Акционерное общество "Лаборатория Касперского" |
Система и способ корреляции событий для выявления инцидента информационной безопасности
|
RU2739206C1
(ru)
*
|
2019-12-26 |
2020-12-21 |
Федеральное государственное казенное военное образовательное учреждение высшего образования Академия Федеральной службы охраны Российской Федерации |
Способ защиты вычислительных сетей с идентификацией нескольких одновременных атак
|
US11818146B2
(en)
*
|
2019-12-27 |
2023-11-14 |
Forescout Technologies, Inc. |
Framework for investigating events
|
US11563756B2
(en)
*
|
2020-04-15 |
2023-01-24 |
Crowdstrike, Inc. |
Distributed digital security system
|
US11616790B2
(en)
|
2020-04-15 |
2023-03-28 |
Crowdstrike, Inc. |
Distributed digital security system
|
CN111639317B
(zh)
*
|
2020-05-24 |
2023-05-09 |
中信银行股份有限公司 |
自动识别高危授权用户方法、装置、电子设备及存储介质
|
CN112181781B
(zh)
*
|
2020-10-15 |
2022-09-20 |
新华三信息安全技术有限公司 |
主机安全威胁程度的告警方法、装置、设备及存储介质
|
AT523933B1
(de)
*
|
2020-11-18 |
2022-01-15 |
Ait Austrian Inst Tech Gmbh |
Verfahren zur Klassifizierung von anomalen Betriebszuständen eines Computernetzwerks
|
US11847111B2
(en)
|
2021-04-09 |
2023-12-19 |
Bitdefender IPR Management Ltd. |
Anomaly detection systems and methods
|
US11888870B2
(en)
*
|
2021-10-04 |
2024-01-30 |
Microsoft Technology Licensing, Llc |
Multitenant sharing anomaly cyberattack campaign detection
|
US12067125B1
(en)
*
|
2022-04-11 |
2024-08-20 |
United Services Automobile Association (Usaa) |
Cybersecurity vulnerability management program evaluation system
|