US6088804A
(en)
|
1998-01-12 |
2000-07-11 |
Motorola, Inc. |
Adaptive system and method for responding to computer network security attacks
|
US7418504B2
(en)
|
1998-10-30 |
2008-08-26 |
Virnetx, Inc. |
Agile network protocol for secure communications using secure domain names
|
EP1085396A1
(en)
*
|
1999-09-17 |
2001-03-21 |
Hewlett-Packard Company |
Operation of trusted state in computing platform
|
US7203868B1
(en)
*
|
1999-11-24 |
2007-04-10 |
Unisys Corporation |
Dynamic monitoring of resources using snapshots of system states
|
US20020123966A1
(en)
|
2000-06-23 |
2002-09-05 |
Luke Chu |
System and method for administration of network financial transaction terminals
|
US7072876B1
(en)
|
2000-09-19 |
2006-07-04 |
Cigital |
System and method for mining execution traces with finite automata
|
US6985845B1
(en)
|
2000-09-26 |
2006-01-10 |
Koninklijke Philips Electronics N.V. |
Security monitor of system runs software simulator in parallel
|
US7669051B2
(en)
|
2000-11-13 |
2010-02-23 |
DigitalDoors, Inc. |
Data security system and method with multiple independent levels of security
|
US7290266B2
(en)
|
2001-06-14 |
2007-10-30 |
Cisco Technology, Inc. |
Access control by a real-time stateful reference monitor with a state collection training mode and a lockdown mode for detecting predetermined patterns of events indicative of requests for operating system resources resulting in a decision to allow or block activity identified in a sequence of events based on a rule set defining a processing policy
|
CA2464402C
(en)
|
2001-10-25 |
2010-04-06 |
General Dynamics Government Systems Corporation |
A method and system for modeling, analysis and display of network security events
|
US7275048B2
(en)
|
2001-10-30 |
2007-09-25 |
International Business Machines Corporation |
Product support of computer-related products using intelligent agents
|
US20040049698A1
(en)
|
2002-09-06 |
2004-03-11 |
Ott Allen Eugene |
Computer network security system utilizing dynamic mobile sensor agents
|
US9503470B2
(en)
|
2002-12-24 |
2016-11-22 |
Fred Herz Patents, LLC |
Distributed agent based model for security monitoring and response
|
US8201249B2
(en)
|
2003-05-14 |
2012-06-12 |
Northrop Grumman Systems Corporation |
Steady state computer intrusion and misuse detection
|
US7133977B2
(en)
|
2003-06-13 |
2006-11-07 |
Microsoft Corporation |
Scalable rundown protection for object lifetime management
|
WO2005058018A2
(en)
|
2003-12-16 |
2005-06-30 |
Aerulean Plant Identification Systems, Inc. |
System and method for plant identification
|
JP2006053788A
(ja)
|
2004-08-12 |
2006-02-23 |
Ntt Docomo Inc |
ソフトウェア動作監視装置及びソフトウェア動作監視方法
|
US7478237B2
(en)
|
2004-11-08 |
2009-01-13 |
Microsoft Corporation |
System and method of allowing user mode applications with access to file data
|
US7765400B2
(en)
|
2004-11-08 |
2010-07-27 |
Microsoft Corporation |
Aggregation of the knowledge base of antivirus software
|
US7765410B2
(en)
|
2004-11-08 |
2010-07-27 |
Microsoft Corporation |
System and method of aggregating the knowledge base of antivirus software applications
|
US9450966B2
(en)
*
|
2004-11-29 |
2016-09-20 |
Kip Sign P1 Lp |
Method and apparatus for lifecycle integrity verification of virtual machines
|
WO2006101549A2
(en)
*
|
2004-12-03 |
2006-09-28 |
Whitecell Software, Inc. |
Secure system for allowing the execution of authorized computer program code
|
US8365293B2
(en)
|
2005-01-25 |
2013-01-29 |
Redphone Security, Inc. |
Securing computer network interactions between entities with authorization assurances
|
US8140664B2
(en)
|
2005-05-09 |
2012-03-20 |
Trend Micro Incorporated |
Graphical user interface based sensitive information and internal information vulnerability management system
|
US7874001B2
(en)
|
2005-07-15 |
2011-01-18 |
Microsoft Corporation |
Detecting user-mode rootkits
|
US20070028291A1
(en)
|
2005-07-29 |
2007-02-01 |
Bit 9, Inc. |
Parametric content control in a network security system
|
US7832006B2
(en)
|
2005-08-09 |
2010-11-09 |
At&T Intellectual Property I, L.P. |
System and method for providing network security
|
US20070094496A1
(en)
|
2005-10-25 |
2007-04-26 |
Michael Burtscher |
System and method for kernel-level pestware management
|
US7882560B2
(en)
|
2005-12-16 |
2011-02-01 |
Cisco Technology, Inc. |
Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
|
US8732824B2
(en)
*
|
2006-01-23 |
2014-05-20 |
Microsoft Corporation |
Method and system for monitoring integrity of running computer system
|
TWI353536B
(en)
*
|
2006-01-26 |
2011-12-01 |
Infortrend Technology Inc |
Virtualized storage computer system and method of
|
US8201243B2
(en)
|
2006-04-20 |
2012-06-12 |
Webroot Inc. |
Backwards researching activity indicative of pestware
|
US8190868B2
(en)
|
2006-08-07 |
2012-05-29 |
Webroot Inc. |
Malware management through kernel detection
|
US9111088B2
(en)
|
2006-08-14 |
2015-08-18 |
Quantum Security, Inc. |
Policy-based physical security system for restricting access to computer resources and data flow through network equipment
|
US8321677B2
(en)
|
2006-09-21 |
2012-11-27 |
Google Inc. |
Pre-binding and tight binding of an on-line identity to a digital signature
|
US20080148398A1
(en)
|
2006-10-31 |
2008-06-19 |
Derek John Mezack |
System and Method for Definition and Automated Analysis of Computer Security Threat Models
|
KR100885293B1
(ko)
|
2006-12-04 |
2009-02-23 |
한국전자통신연구원 |
네트워크 보안 상황 표시 장치 및 그 방법
|
US8468244B2
(en)
|
2007-01-05 |
2013-06-18 |
Digital Doors, Inc. |
Digital information infrastructure and method for security designated data and with granular data stores
|
US8181264B2
(en)
|
2007-02-07 |
2012-05-15 |
Apple Inc. |
Method and apparatus for deferred security analysis
|
US8205244B2
(en)
|
2007-02-27 |
2012-06-19 |
Airdefense, Inc. |
Systems and methods for generating, managing, and displaying alarms for wireless network monitoring
|
US20090328193A1
(en)
|
2007-07-20 |
2009-12-31 |
Hezi Moore |
System and Method for Implementing a Virtualized Security Platform
|
US8565799B2
(en)
|
2007-04-04 |
2013-10-22 |
Qualcomm Incorporated |
Methods and apparatus for flow data acquisition in a multi-frequency network
|
US8918717B2
(en)
|
2007-05-07 |
2014-12-23 |
International Business Machines Corporation |
Method and sytem for providing collaborative tag sets to assist in the use and navigation of a folksonomy
|
ITMI20070916A1
(it)
*
|
2007-05-07 |
2008-11-08 |
Campagnolo Srl |
Cerchio e ruota di bicicletta con alette ad ondulazione localizzata compensata
|
US8336108B2
(en)
|
2007-06-22 |
2012-12-18 |
Red Hat, Inc. |
Method and system for collaboration involving enterprise nodes
|
US8065728B2
(en)
|
2007-09-10 |
2011-11-22 |
Wisconsin Alumni Research Foundation |
Malware prevention system monitoring kernel events
|
US8595834B2
(en)
*
|
2008-02-04 |
2013-11-26 |
Samsung Electronics Co., Ltd |
Detecting unauthorized use of computing devices based on behavioral patterns
|
JP5159899B2
(ja)
|
2008-02-11 |
2013-03-13 |
ドルビー ラボラトリーズ ライセンシング コーポレイション |
プライベートネットワークのダイナミックdnsシステム
|
US20090216806A1
(en)
|
2008-02-24 |
2009-08-27 |
Allofme Ltd. |
Digital assets internet timeline aggregation and sharing platform
|
US8839419B2
(en)
|
2008-04-05 |
2014-09-16 |
Microsoft Corporation |
Distributive security investigation
|
WO2009128905A1
(en)
|
2008-04-17 |
2009-10-22 |
Siemens Energy, Inc. |
Method and system for cyber security management of industrial control systems
|
US8296850B2
(en)
|
2008-05-28 |
2012-10-23 |
Empire Technology Development Llc |
Detecting global anomalies
|
GB0815587D0
(en)
|
2008-08-27 |
2008-10-01 |
Applied Neural Technologies Ltd |
Computer/network security application
|
US8401195B2
(en)
|
2008-09-22 |
2013-03-19 |
Motorola Solutions, Inc. |
Method of automatically populating a list of managed secure communications group members
|
JP2010108469A
(ja)
|
2008-10-01 |
2010-05-13 |
Sky Co Ltd |
操作監視システム及び操作監視プログラム
|
US8069210B2
(en)
|
2008-10-10 |
2011-11-29 |
Microsoft Corporation |
Graph based bot-user detection
|
US8881288B1
(en)
|
2008-10-28 |
2014-11-04 |
Intelligent Automation, Inc. |
Graphical models for cyber security analysis in enterprise networks
|
US8234693B2
(en)
|
2008-12-05 |
2012-07-31 |
Raytheon Company |
Secure document management
|
KR20100078081A
(ko)
|
2008-12-30 |
2010-07-08 |
(주) 세인트 시큐리티 |
커널 기반 시스템 행위 분석을 통한 알려지지 않은 악성코드 탐지 시스템 및 방법
|
KR101021708B1
(ko)
|
2009-01-20 |
2011-03-15 |
성균관대학교산학협력단 |
그룹키 분배 방법 및 이를 위한 서버 및 클라이언트
|
EP2406749B1
(en)
|
2009-03-13 |
2018-06-13 |
Assa Abloy Ab |
Transfer device for sensitive material such as a cryptographic key
|
US8667121B2
(en)
|
2009-03-25 |
2014-03-04 |
Mcafee, Inc. |
System and method for managing data and policies
|
US8171049B2
(en)
|
2009-09-18 |
2012-05-01 |
Xerox Corporation |
System and method for information seeking in a multimedia collection
|
US20120137367A1
(en)
|
2009-11-06 |
2012-05-31 |
Cataphora, Inc. |
Continuous anomaly detection based on behavior modeling and heterogeneous information analysis
|
US20110138469A1
(en)
|
2009-12-03 |
2011-06-09 |
Recursion Software, Inc. |
System and method for resolving vulnerabilities in a computer network
|
KR101038048B1
(ko)
|
2009-12-21 |
2011-06-01 |
한국인터넷진흥원 |
봇넷 악성행위 실시간 분석 시스템
|
US8621628B2
(en)
|
2010-02-25 |
2013-12-31 |
Microsoft Corporation |
Protecting user mode processes from improper tampering or termination
|
US8549650B2
(en)
|
2010-05-06 |
2013-10-01 |
Tenable Network Security, Inc. |
System and method for three-dimensional visualization of vulnerability and asset data
|
US9384112B2
(en)
*
|
2010-07-01 |
2016-07-05 |
Logrhythm, Inc. |
Log collection, structuring and processing
|
KR101329847B1
(ko)
|
2010-07-26 |
2013-11-14 |
주식회사 팬택 |
인체통신을 이용한 소셜 네트워크 서비스를 제공하는 휴대용 단말기 및 그 방법
|
GB201012753D0
(en)
*
|
2010-07-29 |
2010-09-15 |
Ford Global Tech Llc |
A curtain airbag for a motor vehicle
|
US8689336B2
(en)
|
2010-09-27 |
2014-04-01 |
Bank Of America Corporation |
Tiered exposure model for event correlation
|
KR20120072266A
(ko)
|
2010-12-23 |
2012-07-03 |
한국전자통신연구원 |
전역 네트워크 보안상황 제어 장치 및 방법
|
US8762298B1
(en)
*
|
2011-01-05 |
2014-06-24 |
Narus, Inc. |
Machine learning based botnet detection using real-time connectivity graph based traffic features
|
ES2442747T3
(es)
|
2011-02-10 |
2014-02-13 |
Telefónica, S.A. |
Procedimiento y sistema para mejorar la detección de amenazas de seguridad en redes de comunicación
|
JP5731223B2
(ja)
|
2011-02-14 |
2015-06-10 |
インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation |
異常検知装置、監視制御システム、異常検知方法、プログラムおよび記録媒体
|
US9119017B2
(en)
|
2011-03-18 |
2015-08-25 |
Zscaler, Inc. |
Cloud based mobile device security and policy enforcement
|
US20120246297A1
(en)
*
|
2011-03-25 |
2012-09-27 |
Vijaya Shanker |
Agent based monitoring for saas it service management
|
EP2691908B1
(en)
|
2011-03-28 |
2018-12-05 |
McAfee, LLC |
System and method for virtual machine monitor based anti-malware security
|
US8813227B2
(en)
*
|
2011-03-29 |
2014-08-19 |
Mcafee, Inc. |
System and method for below-operating system regulation and control of self-modifying code
|
US20120255003A1
(en)
*
|
2011-03-31 |
2012-10-04 |
Mcafee, Inc. |
System and method for securing access to the objects of an operating system
|
US20120324236A1
(en)
*
|
2011-06-16 |
2012-12-20 |
Microsoft Corporation |
Trusted Snapshot Generation
|
US9286182B2
(en)
*
|
2011-06-17 |
2016-03-15 |
Microsoft Technology Licensing, Llc |
Virtual machine snapshotting and analysis
|
US8955111B2
(en)
|
2011-09-24 |
2015-02-10 |
Elwha Llc |
Instruction set adapted for security risk monitoring
|
US8856936B2
(en)
|
2011-10-14 |
2014-10-07 |
Albeado Inc. |
Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security
|
US9203859B2
(en)
|
2012-02-01 |
2015-12-01 |
The Boeing Company |
Methods and systems for cyber-physical security modeling, simulation and architecture for the smart grid
|
US9081960B2
(en)
|
2012-04-27 |
2015-07-14 |
Ut-Battelle, Llc |
Architecture for removable media USB-ARM
|
IL219597A0
(en)
|
2012-05-03 |
2012-10-31 |
Syndrome X Ltd |
Malicious threat detection, malicious threat prevention, and a learning systems and methods for malicious threat detection and prevention
|
US8661538B2
(en)
|
2012-05-09 |
2014-02-25 |
Nice-Systems Ltd. |
System and method for determining a risk root cause
|
WO2013177311A1
(en)
|
2012-05-23 |
2013-11-28 |
Observable Networks, Llc |
System and method for continuous device profiling (cdp)
|
US9043903B2
(en)
|
2012-06-08 |
2015-05-26 |
Crowdstrike, Inc. |
Kernel-level security agent
|
US9292881B2
(en)
|
2012-06-29 |
2016-03-22 |
Crowdstrike, Inc. |
Social sharing of security information in a group
|
KR101868893B1
(ko)
|
2012-07-09 |
2018-06-19 |
한국전자통신연구원 |
네트워크 보안 상황 시각화 방법 및 그 장치
|
JPWO2014020908A1
(ja)
|
2012-08-03 |
2016-07-21 |
日本電気株式会社 |
システム状態判別支援装置、及び、システム状態判別支援方法
|
US9392003B2
(en)
|
2012-08-23 |
2016-07-12 |
Raytheon Foreground Security, Inc. |
Internet security cyber threat reporting system and method
|
US9954884B2
(en)
|
2012-10-23 |
2018-04-24 |
Raytheon Company |
Method and device for simulating network resiliance against attacks
|
US8984633B2
(en)
|
2012-11-14 |
2015-03-17 |
Click Security, Inc. |
Automated security analytics platform with visualization agnostic selection linked portlets
|
US10409980B2
(en)
|
2012-12-27 |
2019-09-10 |
Crowdstrike, Inc. |
Real-time representation of security-relevant system state
|
US9712543B2
(en)
|
2013-01-23 |
2017-07-18 |
Owl Cyber Defense Solutions, LLP |
System for remotely monitoring status information of devices connected to a network
|
US9477835B2
(en)
|
2013-10-08 |
2016-10-25 |
Crowdstrike, Inc. |
Event model for correlating system component states
|
US9753796B2
(en)
|
2013-12-06 |
2017-09-05 |
Lookout, Inc. |
Distributed monitoring, evaluation, and response for multiple devices
|
US9798882B2
(en)
|
2014-06-06 |
2017-10-24 |
Crowdstrike, Inc. |
Real-time model of states of monitored devices
|