US7389351B2
(en)
|
2001-03-15 |
2008-06-17 |
Microsoft Corporation |
System and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts
|
US7565692B1
(en)
|
2000-05-30 |
2009-07-21 |
At&T Wireless Services, Inc. |
Floating intrusion detection platforms
|
AU2002230541B2
(en)
|
2000-11-30 |
2007-08-23 |
Cisco Technology, Inc. |
Flow-based detection of network intrusions
|
US6928434B1
(en)
|
2001-01-31 |
2005-08-09 |
Rosetta Marketing Strategies Group |
Method and system for clustering optimization and applications
|
US7325252B2
(en)
|
2001-05-18 |
2008-01-29 |
Achilles Guard Inc. |
Network security testing
|
US20090138342A1
(en)
|
2001-11-14 |
2009-05-28 |
Retaildna, Llc |
Method and system for providing an employee award using artificial intelligence
|
US7114185B2
(en)
*
|
2001-12-26 |
2006-09-26 |
Mcafee, Inc. |
Identifying malware containing computer files using embedded text
|
US7225343B1
(en)
|
2002-01-25 |
2007-05-29 |
The Trustees Of Columbia University In The City Of New York |
System and methods for adaptive model generation for detecting intrusions in computer systems
|
US8132250B2
(en)
|
2002-03-08 |
2012-03-06 |
Mcafee, Inc. |
Message profiling systems and methods
|
EP1349081A1
(en)
|
2002-03-28 |
2003-10-01 |
LION Bioscience AG |
Method and apparatus for querying relational databases
|
US7496628B2
(en)
|
2003-02-25 |
2009-02-24 |
Susquehanna International Group, Llp |
Electronic message filter
|
US20040221171A1
(en)
|
2003-05-02 |
2004-11-04 |
Ahmed Ahmed Awad E. |
Intrusion detector based on mouse dynamics analysis
|
US8990928B1
(en)
|
2003-12-11 |
2015-03-24 |
Radix Holdings, Llc |
URL salience
|
US7392278B2
(en)
|
2004-01-23 |
2008-06-24 |
Microsoft Corporation |
Building and using subwebs for focused search
|
US8561177B1
(en)
|
2004-04-01 |
2013-10-15 |
Fireeye, Inc. |
Systems and methods for detecting communication channels of bots
|
US8881282B1
(en)
|
2004-04-01 |
2014-11-04 |
Fireeye, Inc. |
Systems and methods for malware attack detection and identification
|
US8539582B1
(en)
|
2004-04-01 |
2013-09-17 |
Fireeye, Inc. |
Malware containment and security analysis on connection
|
US8528086B1
(en)
|
2004-04-01 |
2013-09-03 |
Fireeye, Inc. |
System and method of detecting computer worms
|
US7953814B1
(en)
|
2005-02-28 |
2011-05-31 |
Mcafee, Inc. |
Stopping and remediating outbound messaging abuse
|
US7908653B2
(en)
|
2004-06-29 |
2011-03-15 |
Intel Corporation |
Method of improving computer security through sandboxing
|
US8037535B2
(en)
|
2004-08-13 |
2011-10-11 |
Georgetown University |
System and method for detecting malicious executable code
|
US8255532B2
(en)
|
2004-09-13 |
2012-08-28 |
Cisco Technology, Inc. |
Metric-based monitoring and control of a limited resource
|
US7540025B2
(en)
|
2004-11-18 |
2009-05-26 |
Cisco Technology, Inc. |
Mitigating network attacks using automatic signature generation
|
GB2425622A
(en)
*
|
2005-04-27 |
2006-11-01 |
Ncapsa Ltd |
Programming real-time systems using data flow diagrams
|
US20060253582A1
(en)
|
2005-05-03 |
2006-11-09 |
Dixon Christopher J |
Indicating website reputations within search results
|
JP5118020B2
(ja)
|
2005-05-05 |
2013-01-16 |
シスコ アイアンポート システムズ エルエルシー |
電子メッセージ中での脅威の識別
|
US7609625B2
(en)
|
2005-07-06 |
2009-10-27 |
Fortinet, Inc. |
Systems and methods for detecting and preventing flooding attacks in a network environment
|
US7730040B2
(en)
|
2005-07-27 |
2010-06-01 |
Microsoft Corporation |
Feedback-driven malware detector
|
US7707284B2
(en)
|
2005-08-03 |
2010-04-27 |
Novell, Inc. |
System and method of searching for classifying user activity performed on a computer system
|
KR20070049514A
(ko)
|
2005-11-08 |
2007-05-11 |
한국정보보호진흥원 |
악성 코드 감시 시스템 및 이를 이용한 감시 방법
|
US8650080B2
(en)
|
2006-04-10 |
2014-02-11 |
International Business Machines Corporation |
User-browser interaction-based fraud detection system
|
EP2005698B1
(en)
|
2006-04-13 |
2012-01-04 |
Art of Defence GmbH |
Method for providing web application security
|
US7984500B1
(en)
|
2006-10-05 |
2011-07-19 |
Amazon Technologies, Inc. |
Detecting fraudulent activity by analysis of information requests
|
US20080172651A1
(en)
*
|
2007-01-15 |
2008-07-17 |
Microsoft Corporation |
Applying Function Level Ownership to Test Metrics
|
US7865953B1
(en)
|
2007-05-31 |
2011-01-04 |
Trend Micro Inc. |
Methods and arrangement for active malicious web pages discovery
|
US8238669B2
(en)
|
2007-08-22 |
2012-08-07 |
Google Inc. |
Detection and classification of matches between time-based media
|
US7958555B1
(en)
|
2007-09-28 |
2011-06-07 |
Trend Micro Incorporated |
Protecting computer users from online frauds
|
US9779403B2
(en)
|
2007-12-07 |
2017-10-03 |
Jpmorgan Chase Bank, N.A. |
Mobile fraud prevention system and method
|
WO2009106998A1
(en)
|
2008-02-28 |
2009-09-03 |
Ipharro Media Gmbh |
Frame sequence comparison in multimedia streams
|
US8082187B2
(en)
|
2008-05-07 |
2011-12-20 |
AcademixDirect, Inc. |
Method of generating a referral website URL using website listings in a cookie
|
US8856937B1
(en)
|
2008-06-27 |
2014-10-07 |
Symantec Corporation |
Methods and systems for identifying fraudulent websites
|
US10027688B2
(en)
|
2008-08-11 |
2018-07-17 |
Damballa, Inc. |
Method and system for detecting malicious and/or botnet-related domain names
|
US8086480B2
(en)
|
2008-09-25 |
2011-12-27 |
Ebay Inc. |
Methods and systems for activity-based recommendations
|
US9177144B2
(en)
|
2008-10-30 |
2015-11-03 |
Mcafee, Inc. |
Structural recognition of malicious code patterns
|
US8850571B2
(en)
|
2008-11-03 |
2014-09-30 |
Fireeye, Inc. |
Systems and methods for detecting malicious network content
|
US8285830B1
(en)
|
2009-01-06 |
2012-10-09 |
Citizenhawk, Inc. |
System and method for combating cybersquatting
|
US8448245B2
(en)
|
2009-01-17 |
2013-05-21 |
Stopthehacker.com, Jaal LLC |
Automated identification of phishing, phony and malicious web sites
|
US8695091B2
(en)
|
2009-02-11 |
2014-04-08 |
Sophos Limited |
Systems and methods for enforcing policies for proxy website detection using advertising account ID
|
WO2010105184A2
(en)
|
2009-03-13 |
2010-09-16 |
Breach Security , Inc. |
A method and apparatus for phishing and leeching vulnerability detection
|
US8229219B1
(en)
|
2009-08-06 |
2012-07-24 |
Google Inc. |
Full-length video fingerprinting
|
US8600993B1
(en)
|
2009-08-26 |
2013-12-03 |
Google Inc. |
Determining resource attributes from site address attributes
|
US8396857B2
(en)
|
2009-08-31 |
2013-03-12 |
Accenture Global Services Limited |
System to modify websites for organic search optimization
|
RU91213U1
(ru)
|
2009-10-01 |
2010-01-27 |
ЗАО "Лаборатория Касперского" |
Система автоматического составления описания и кластеризации различных, в том числе и вредоносных, объектов
|
EP2323046A1
(en)
|
2009-10-16 |
2011-05-18 |
Telefónica, S.A. |
Method for detecting audio and video copy in multimedia streams
|
US8625033B1
(en)
|
2010-02-01 |
2014-01-07 |
Google Inc. |
Large-scale matching of audio and video
|
US9501644B2
(en)
|
2010-03-15 |
2016-11-22 |
F-Secure Oyj |
Malware protection
|
US8612463B2
(en)
|
2010-06-03 |
2013-12-17 |
Palo Alto Research Center Incorporated |
Identifying activities using a hybrid user-activity model
|
US8260914B1
(en)
|
2010-06-22 |
2012-09-04 |
Narus, Inc. |
Detecting DNS fast-flux anomalies
|
RU2446459C1
(ru)
|
2010-07-23 |
2012-03-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ проверки веб-ресурсов на наличие вредоносных компонент
|
US20130074187A1
(en)
|
2010-07-26 |
2013-03-21 |
Ki Yong Kim |
Hacker virus security-integrated control device
|
US8924488B2
(en)
|
2010-07-27 |
2014-12-30 |
At&T Intellectual Property I, L.P. |
Employing report ratios for intelligent mobile messaging classification and anti-spam defense
|
BR112013004345B1
(pt)
|
2010-08-25 |
2020-12-08 |
Lookout, Inc. |
sistema e método para evitar malware acoplado a um servidor
|
AU2011293160B2
(en)
|
2010-08-26 |
2015-04-09 |
Verisign, Inc. |
Method and system for automatic detection and analysis of malware
|
US8837769B2
(en)
|
2010-10-06 |
2014-09-16 |
Futurewei Technologies, Inc. |
Video signature based on image hashing and shot detection
|
US9626677B2
(en)
|
2010-11-29 |
2017-04-18 |
Biocatch Ltd. |
Identification of computerized bots, and identification of automated cyber-attack modules
|
US8521667B2
(en)
|
2010-12-15 |
2013-08-27 |
Microsoft Corporation |
Detection and categorization of malicious URLs
|
CN102082792A
(zh)
|
2010-12-31 |
2011-06-01 |
成都市华为赛门铁克科技有限公司 |
钓鱼网页检测方法及设备
|
US8972412B1
(en)
|
2011-01-31 |
2015-03-03 |
Go Daddy Operating Company, LLC |
Predicting improvement in website search engine rankings based upon website linking relationships
|
US8726376B2
(en)
|
2011-03-11 |
2014-05-13 |
Openet Telecom Ltd. |
Methods, systems and devices for the detection and prevention of malware within a network
|
US8402543B1
(en)
|
2011-03-25 |
2013-03-19 |
Narus, Inc. |
Machine learning based botnet detection with dynamic adaptation
|
RU107616U1
(ru)
|
2011-03-28 |
2011-08-20 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система быстрого анализа потока данных на наличие вредоносных объектов
|
US9363278B2
(en)
|
2011-05-11 |
2016-06-07 |
At&T Mobility Ii Llc |
Dynamic and selective response to cyber attack for telecommunications carrier networks
|
US8151341B1
(en)
|
2011-05-23 |
2012-04-03 |
Kaspersky Lab Zao |
System and method for reducing false positives during detection of network attacks
|
US8555388B1
(en)
|
2011-05-24 |
2013-10-08 |
Palo Alto Networks, Inc. |
Heuristic botnet detection
|
CA2840992C
(en)
|
2011-07-08 |
2017-03-14 |
Brad WARDMAN |
Syntactical fingerprinting
|
US20140173287A1
(en)
|
2011-07-11 |
2014-06-19 |
Takeshi Mizunuma |
Identifier management method and system
|
GB2493514B
(en)
|
2011-08-02 |
2015-04-08 |
Qatar Foundation |
Copy detection
|
CN102930206B
(zh)
|
2011-08-09 |
2015-02-25 |
腾讯科技(深圳)有限公司 |
病毒文件的聚类划分处理方法和装置
|
US8677472B1
(en)
|
2011-09-27 |
2014-03-18 |
Emc Corporation |
Multi-point collection of behavioral data relating to a virtualized browsing session with a secure server
|
US8645355B2
(en)
|
2011-10-21 |
2014-02-04 |
Google Inc. |
Mapping Uniform Resource Locators of different indexes
|
US8584235B2
(en)
|
2011-11-02 |
2013-11-12 |
Bitdefender IPR Management Ltd. |
Fuzzy whitelisting anti-malware systems and methods
|
US9519781B2
(en)
|
2011-11-03 |
2016-12-13 |
Cyphort Inc. |
Systems and methods for virtualization and emulation assisted malware detection
|
RU2487406C1
(ru)
|
2011-11-24 |
2013-07-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ обнаружения вредоносных объектов, распространяемых через пиринговые сети
|
US8660296B1
(en)
|
2012-01-10 |
2014-02-25 |
Google Inc. |
Systems and methods for facilitating video fingerprinting using local descriptors
|
US9519782B2
(en)
|
2012-02-24 |
2016-12-13 |
Fireeye, Inc. |
Detecting malicious network content
|
US9111090B2
(en)
|
2012-04-02 |
2015-08-18 |
Trusteer, Ltd. |
Detection of phishing attempts
|
RU2523114C2
(ru)
|
2012-04-06 |
2014-07-20 |
Закрытое акционерное общество "Лаборатория Касперского" |
Способ анализа вредоносной активности в сети интернет, выявления вредоносных узлов сети и ближайших узлов-посредников
|
US10304036B2
(en)
|
2012-05-07 |
2019-05-28 |
Nasdaq, Inc. |
Social media profiling for one or more authors using one or more social media platforms
|
RU2488880C1
(ru)
|
2012-05-11 |
2013-07-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ адаптивной оптимизации проверки потока данных, передающихся по сети, на наличие угроз
|
US8683595B1
(en)
|
2012-06-13 |
2014-03-25 |
Symantec Corporation |
Systems and methods for detecting potentially malicious content within near field communication messages
|
US9154517B2
(en)
|
2012-06-19 |
2015-10-06 |
AO Kaspersky Lab |
System and method for preventing spread of malware in peer-to-peer network
|
US9323923B2
(en)
*
|
2012-06-19 |
2016-04-26 |
Deja Vu Security, Llc |
Code repository intrusion detection
|
EP2877956B1
(en)
|
2012-07-24 |
2019-07-17 |
Webroot Inc. |
System and method to provide automatic classification of phishing sites
|
RU2495486C1
(ru)
|
2012-08-10 |
2013-10-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
Способ анализа и выявления вредоносных промежуточных узлов в сети
|
CN103679012A
(zh)
|
2012-09-03 |
2014-03-26 |
腾讯科技(深圳)有限公司 |
一种可移植可执行文件的聚类方法和装置
|
CN103685174B
(zh)
|
2012-09-07 |
2016-12-21 |
中国科学院计算机网络信息中心 |
一种不依赖样本的钓鱼网站检测方法
|
US9386030B2
(en)
|
2012-09-18 |
2016-07-05 |
Vencore Labs, Inc. |
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
|
US11126720B2
(en)
|
2012-09-26 |
2021-09-21 |
Bluvector, Inc. |
System and method for automated machine-learning, zero-day malware detection
|
US9215239B1
(en)
|
2012-09-28 |
2015-12-15 |
Palo Alto Networks, Inc. |
Malware detection based on traffic analysis
|
US10965775B2
(en)
|
2012-11-20 |
2021-03-30 |
Airbnb, Inc. |
Discovering signature of electronic social networks
|
CN103020494B
(zh)
*
|
2012-12-03 |
2015-06-24 |
哈尔滨工业大学 |
一种利用程序代码编程模式著作权归属检测模型检测著作权归属的方法
|
RU2536664C2
(ru)
|
2012-12-25 |
2014-12-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ автоматической модификации антивирусной базы данных
|
RU2522019C1
(ru)
|
2012-12-25 |
2014-07-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ обнаружения угроз в коде, исполняемом виртуальной машиной
|
RU2530210C2
(ru)
|
2012-12-25 |
2014-10-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ выявления вредоносных программ, препятствующих штатному взаимодействию пользователя с интерфейсом операционной системы
|
RU129279U1
(ru)
|
2013-01-09 |
2013-06-20 |
ОБЩЕСТВО С ОГРАНИЧЕННОЙ ОТВЕТСТВЕННОСТЬЮ "МФИ Софт" |
Устройство обнаружения и защиты от аномальной активности на сети передачи данных
|
US20140201208A1
(en)
|
2013-01-15 |
2014-07-17 |
Corporation Symantec |
Classifying Samples Using Clustering
|
US9165142B1
(en)
|
2013-01-30 |
2015-10-20 |
Palo Alto Networks, Inc. |
Malware family identification using profile signatures
|
US20160127402A1
(en)
|
2014-11-04 |
2016-05-05 |
Patternex, Inc. |
Method and apparatus for identifying and detecting threats to an enterprise or e-commerce system
|
US10425429B2
(en)
|
2013-04-10 |
2019-09-24 |
Gabriel Bassett |
System and method for cyber security analysis and human behavior prediction
|
GB201306628D0
(en)
|
2013-04-11 |
2013-05-29 |
F Secure Oyj |
Detecting and marking client devices
|
EP2984577A4
(en)
|
2013-04-11 |
2016-08-24 |
Brandshield Ltd |
DEVICE, SYSTEM AND METHOD FOR THE PROTECTION OF BRAND NAMES AND DOMAIN NAMES
|
EP2901665A4
(en)
|
2013-05-13 |
2015-10-21 |
Yandex Europe Ag |
METHOD AND SYSTEM FOR PROVIDING A CLIENT DEVICE WITH AUTOMATICALLY UPDATING AN IP ADDRESS RELATED TO A DOMAIN NAME
|
US9357469B2
(en)
|
2013-05-29 |
2016-05-31 |
Rivada Networks, Llc |
Methods and system for dynamic spectrum arbitrage with mobility management
|
US9443075B2
(en)
|
2013-06-27 |
2016-09-13 |
The Mitre Corporation |
Interception and policy application for malicious communications
|
RU2580036C2
(ru)
|
2013-06-28 |
2016-04-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ создания гибкой свертки для обнаружения вредоносных программ
|
CN103368958A
(zh)
|
2013-07-05 |
2013-10-23 |
腾讯科技(深圳)有限公司 |
一种网页检测方法、装置和系统
|
RU2538292C1
(ru)
|
2013-07-24 |
2015-01-10 |
Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" |
Способ обнаружения компьютерных атак на сетевую компьютерную систему
|
KR102120823B1
(ko)
|
2013-08-14 |
2020-06-09 |
삼성전자주식회사 |
비휘발성 메모리 장치의 독출 시퀀스 제어 방법 및 이를 수행하는 메모리 시스템
|
US9330258B1
(en)
|
2013-09-30 |
2016-05-03 |
Symantec Corporation |
Systems and methods for identifying uniform resource locators that link to potentially malicious resources
|
CN103491205B
(zh)
|
2013-09-30 |
2016-08-17 |
北京奇虎科技有限公司 |
一种基于视频搜索的关联资源地址的推送方法和装置
|
CA2924764C
(en)
|
2013-10-21 |
2020-03-10 |
Microsoft Technology Licensing, Llc |
Mobile video search
|
GB2520987B
(en)
|
2013-12-06 |
2016-06-01 |
Cyberlytic Ltd |
Using fuzzy logic to assign a risk level profile to a potential cyber threat
|
IN2013CH05744A
(nl)
|
2013-12-12 |
2015-06-19 |
Infosys Ltd |
|
US9747446B1
(en)
|
2013-12-26 |
2017-08-29 |
Fireeye, Inc. |
System and method for run-time object classification
|
CN105874463A
(zh)
*
|
2013-12-30 |
2016-08-17 |
诺基亚技术有限公司 |
用于恶意软件检测的方法和装置
|
US20150363791A1
(en)
|
2014-01-10 |
2015-12-17 |
Hybrid Application Security Ltd. |
Business action based fraud detection system and method
|
US9060018B1
(en)
|
2014-02-05 |
2015-06-16 |
Pivotal Software, Inc. |
Finding command and control center computers by communication link tracking
|
US9262635B2
(en)
|
2014-02-05 |
2016-02-16 |
Fireeye, Inc. |
Detection efficacy of virtual machine-based analysis with application specific events
|
US9389852B2
(en)
*
|
2014-02-13 |
2016-07-12 |
Infosys Limited |
Technique for plagiarism detection in program source code files based on design pattern
|
US9769189B2
(en)
|
2014-02-21 |
2017-09-19 |
Verisign, Inc. |
Systems and methods for behavior-based automated malware analysis and classification
|
KR101514984B1
(ko)
|
2014-03-03 |
2015-04-24 |
(주)엠씨알시스템 |
홈페이지 악성코드 유포 탐지 시스템 및 방법
|
US9338181B1
(en)
|
2014-03-05 |
2016-05-10 |
Netflix, Inc. |
Network security system with remediation based on value of attacked assets
|
RU2543564C1
(ru)
|
2014-03-20 |
2015-03-10 |
Закрытое акционерное общество "Научно-производственное предприятие "Информационные технологии в бизнесе" |
Система обнаружения и предотвращения вторжений на основе контроля доступа к ресурсам
|
US9223972B1
(en)
|
2014-03-31 |
2015-12-29 |
Fireeye, Inc. |
Dynamically remote tuning of a malware content detection system
|
US9853997B2
(en)
|
2014-04-14 |
2017-12-26 |
Drexel University |
Multi-channel change-point malware detection
|
US9015814B1
(en)
|
2014-06-10 |
2015-04-21 |
Kaspersky Lab Zao |
System and methods for detecting harmful files of different formats
|
US9332022B1
(en)
|
2014-07-07 |
2016-05-03 |
Symantec Corporation |
Systems and methods for detecting suspicious internet addresses
|
US9800592B2
(en)
|
2014-08-04 |
2017-10-24 |
Microsoft Technology Licensing, Llc |
Data center architecture that supports attack detection and mitigation
|
US20160036837A1
(en)
|
2014-08-04 |
2016-02-04 |
Microsoft Corporation |
Detecting attacks on data centers
|
US9942250B2
(en)
|
2014-08-06 |
2018-04-10 |
Norse Networks, Inc. |
Network appliance for dynamic protection from risky network activities
|
US9716721B2
(en)
|
2014-08-29 |
2017-07-25 |
Accenture Global Services Limited |
Unstructured security threat information analysis
|
KR101587161B1
(ko)
|
2014-09-03 |
2016-01-20 |
한국전자통신연구원 |
실시간 네트워크 안티바이러스 수행 장치 및 방법
|
US9026841B1
(en)
|
2014-09-09 |
2015-05-05 |
Belkin International, Inc. |
Coordinated and device-distributed detection of abnormal network device operation
|
RU2589310C2
(ru)
|
2014-09-30 |
2016-07-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ расчета интервала повторного определения категорий сетевого ресурса
|
US20160110819A1
(en)
|
2014-10-21 |
2016-04-21 |
Marc Lauren Abramowitz |
Dynamic security rating for cyber insurance products
|
US10338191B2
(en)
|
2014-10-30 |
2019-07-02 |
Bastille Networks, Inc. |
Sensor mesh and signal transmission architectures for electromagnetic signature analysis
|
US9197665B1
(en)
|
2014-10-31 |
2015-11-24 |
Cyberpoint International Llc |
Similarity search and malware prioritization
|
US9792289B2
(en)
|
2014-11-07 |
2017-10-17 |
Semandex Networks Inc. |
Systems and methods for file clustering, multi-drive forensic analysis and data protection
|
JP6916112B2
(ja)
|
2014-11-21 |
2021-08-11 |
ブルヴェクター, インコーポレーテッドBluvector, Inc. |
ネットワークデータ特性評価のシステムと方法
|
US10574675B2
(en)
|
2014-12-05 |
2020-02-25 |
T-Mobile Usa, Inc. |
Similarity search for discovering multiple vector attacks
|
US9367872B1
(en)
|
2014-12-22 |
2016-06-14 |
Palantir Technologies Inc. |
Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
|
US9934376B1
(en)
|
2014-12-29 |
2018-04-03 |
Fireeye, Inc. |
Malware detection appliance architecture
|
US10230526B2
(en)
|
2014-12-31 |
2019-03-12 |
William Manning |
Out-of-band validation of domain name system records
|
US9712549B2
(en)
|
2015-01-08 |
2017-07-18 |
Imam Abdulrahman Bin Faisal University |
System, apparatus, and method for detecting home anomalies
|
CN104504307B
(zh)
|
2015-01-08 |
2017-09-29 |
北京大学 |
基于拷贝单元的音视频拷贝检测方法和装置
|
KR20160095856A
(ko)
|
2015-02-04 |
2016-08-12 |
한국전자통신연구원 |
새로운 공격 유형의 자동 탐지 및 공격 유형 모델 갱신을 통한 지능형 침입 탐지 시스템 및 방법
|
US11328307B2
(en)
|
2015-02-24 |
2022-05-10 |
OpSec Online, Ltd. |
Brand abuse monitoring system with infringement detection engine and graphical user interface
|
EP3065076A1
(en)
|
2015-03-04 |
2016-09-07 |
Secure-Nok AS |
System and method for responding to a cyber-attack-related incident against an industrial control system
|
US9253208B1
(en)
|
2015-03-05 |
2016-02-02 |
AO Kaspersky Lab |
System and method for automated phishing detection rule evolution
|
US9769201B2
(en)
|
2015-03-06 |
2017-09-19 |
Radware, Ltd. |
System and method thereof for multi-tiered mitigation of cyber-attacks
|
US9712553B2
(en)
|
2015-03-27 |
2017-07-18 |
The Boeing Company |
System and method for developing a cyber-attack scenario
|
US9712554B2
(en)
|
2015-04-09 |
2017-07-18 |
Accenture Global Services Limited |
Event correlation across heterogeneous operations
|
US10536357B2
(en)
|
2015-06-05 |
2020-01-14 |
Cisco Technology, Inc. |
Late data detection in data center
|
US10382484B2
(en)
|
2015-06-08 |
2019-08-13 |
Illusive Networks Ltd. |
Detecting attackers who target containerized clusters
|
US9917852B1
(en)
|
2015-06-29 |
2018-03-13 |
Palo Alto Networks, Inc. |
DGA behavior detection
|
RU164629U1
(ru)
|
2015-06-30 |
2016-09-10 |
Акционерное общество "Институт точной механики и вычислительной техники имени С.А. Лебедева Российской академии наук" |
Электронный модуль защиты от сетевых атак на базе сетевого процессора np-5
|
RU2614557C2
(ru)
|
2015-06-30 |
2017-03-28 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ обнаружения вредоносных файлов на мобильных устройствах
|
EP3125147B1
(en)
|
2015-07-27 |
2020-06-03 |
Swisscom AG |
System and method for identifying a phishing website
|
US9456000B1
(en)
|
2015-08-06 |
2016-09-27 |
Palantir Technologies Inc. |
Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
|
CN106506435B
(zh)
|
2015-09-08 |
2019-08-06 |
中国电信股份有限公司 |
用于检测网络攻击的方法和防火墙系统
|
WO2017049045A1
(en)
|
2015-09-16 |
2017-03-23 |
RiskIQ, Inc. |
Using hash signatures of dom objects to identify website similarity
|
KR101703446B1
(ko)
|
2015-10-15 |
2017-02-06 |
숭실대학교산학협력단 |
DoS 공격의 탐지가 가능한 네트워크 및 이의 제어 방법과, 상기 네트워크에 포함되는 게이트웨이 및 관리 서버
|
CN105429956B
(zh)
|
2015-11-02 |
2018-09-25 |
重庆大学 |
基于p2p动态云的恶意软件检测系统及方法
|
US10200382B2
(en)
|
2015-11-05 |
2019-02-05 |
Radware, Ltd. |
System and method for detecting abnormal traffic behavior using infinite decaying clusters
|
US9894036B2
(en)
|
2015-11-17 |
2018-02-13 |
Cyber Adapt, Inc. |
Cyber threat attenuation using multi-source threat data analysis
|
RU2622870C2
(ru)
|
2015-11-17 |
2017-06-20 |
Общество с ограниченной ответственностью "САЙТСЕКЬЮР" |
Система и способ оценки опасности веб-сайтов
|
CN106709777A
(zh)
|
2015-11-18 |
2017-05-24 |
阿里巴巴集团控股有限公司 |
一种订单聚类方法及装置,以及反恶意信息的方法及装置
|
US10594710B2
(en)
|
2015-11-20 |
2020-03-17 |
Webroot Inc. |
Statistical analysis of network behavior using event vectors to identify behavioral anomalies using a composite score
|
RU2613535C1
(ru)
|
2015-11-20 |
2017-03-16 |
Илья Самуилович Рабинович |
Способ обнаружения вредоносных программ и элементов
|
EP3373179B1
(en)
|
2015-12-14 |
2019-08-07 |
Mitsubishi Electric Corporation |
Information processing device, information processing method, and information processing program
|
WO2017111835A1
(en)
|
2015-12-26 |
2017-06-29 |
Intel Corporation |
Binary linear classification
|
US9723344B1
(en)
|
2015-12-29 |
2017-08-01 |
Google Inc. |
Early detection of policy violating media
|
US11069370B2
(en)
|
2016-01-11 |
2021-07-20 |
University Of Tennessee Research Foundation |
Tampering detection and location identification of digital audio recordings
|
KR102582580B1
(ko)
|
2016-01-19 |
2023-09-26 |
삼성전자주식회사 |
악성 코드 분석을 위한 전자 장치 및 이의 방법
|
RU2628192C2
(ru)
|
2016-01-27 |
2017-08-15 |
Акционерное общество "Творческо-производственное объединение "Центральная киностудия детских и юношеских фильмов им. М. Горького" |
Устройство для семантической классификации и поиска в архивах оцифрованных киноматериалов
|
US9900338B2
(en)
|
2016-02-09 |
2018-02-20 |
International Business Machines Corporation |
Forecasting and classifying cyber-attacks using neural embeddings based on pattern of life data
|
US10200390B2
(en)
|
2016-02-29 |
2019-02-05 |
Palo Alto Networks, Inc. |
Automatically determining whether malware samples are similar
|
AU2017225932C1
(en)
|
2016-02-29 |
2021-06-24 |
Securekey Technologies Inc. |
Systems and methods for distributed identity verification
|
US10230749B1
(en)
|
2016-02-29 |
2019-03-12 |
Palo Alto Networks, Inc. |
Automatically grouping malware based on artifacts
|
US10063572B2
(en)
|
2016-03-28 |
2018-08-28 |
Accenture Global Solutions Limited |
Antivirus signature distribution with distributed ledger
|
US10313382B2
(en)
|
2016-03-29 |
2019-06-04 |
The Mitre Corporation |
System and method for visualizing and analyzing cyber-attacks using a graph model
|
US10178107B2
(en)
|
2016-04-06 |
2019-01-08 |
Cisco Technology, Inc. |
Detection of malicious domains using recurring patterns in domain names
|
US10212145B2
(en)
|
2016-04-06 |
2019-02-19 |
Avaya Inc. |
Methods and systems for creating and exchanging a device specific blockchain for device authentication
|
CN105897714B
(zh)
|
2016-04-11 |
2018-11-09 |
天津大学 |
基于dns流量特征的僵尸网络检测方法
|
RU2625050C1
(ru)
|
2016-04-25 |
2017-07-11 |
Акционерное общество "Лаборатория Касперского" |
Система и способ признания транзакций доверенными
|
US11223598B2
(en)
|
2016-05-03 |
2022-01-11 |
Nokia Of America Corporation |
Internet security
|
RU2634211C1
(ru)
|
2016-07-06 |
2017-10-24 |
Общество с ограниченной ответственностью "Траст" |
Способ и система анализа протоколов взаимодействия вредоносных программ с центрами управления и выявления компьютерных атак
|
RU2636702C1
(ru)
|
2016-07-07 |
2017-11-27 |
Общество С Ограниченной Ответственностью "Яндекс" |
Способ и устройство для выбора сетевого ресурса в качестве источника содержимого для системы рекомендаций
|
US20180012144A1
(en)
|
2016-07-11 |
2018-01-11 |
Qualcomm Innovation Center, Inc. |
Incremental and speculative analysis of javascripts based on a multi-instance model for web security
|
CN106131016B
(zh)
|
2016-07-13 |
2019-05-03 |
北京知道创宇信息技术有限公司 |
恶意url检测干预方法、系统及装置
|
US10212133B2
(en)
|
2016-07-29 |
2019-02-19 |
ShieldX Networks, Inc. |
Accelerated pattern matching using pattern functions
|
US11120106B2
(en)
*
|
2016-07-30 |
2021-09-14 |
Endgame, Inc. |
Hardware—assisted system and method for detecting and analyzing system calls made to an operating system kernel
|
WO2018025157A1
(en)
|
2016-07-31 |
2018-02-08 |
Cymmetria, Inc. |
Deploying deception campaigns using communication breadcrumbs
|
US10498761B2
(en)
|
2016-08-23 |
2019-12-03 |
Duo Security, Inc. |
Method for identifying phishing websites and hindering associated activity
|
US10313352B2
(en)
|
2016-10-26 |
2019-06-04 |
International Business Machines Corporation |
Phishing detection with machine learning
|
WO2018095192A1
(zh)
|
2016-11-23 |
2018-05-31 |
腾讯科技(深圳)有限公司 |
网站攻击的检测和防护方法及系统
|
TWI622894B
(zh)
|
2016-12-13 |
2018-05-01 |
宏碁股份有限公司 |
電子裝置及偵測惡意檔案的方法
|
CN106713312A
(zh)
|
2016-12-21 |
2017-05-24 |
深圳市深信服电子科技有限公司 |
检测非法域名的方法及装置
|
RU2654146C1
(ru)
|
2017-06-16 |
2018-05-16 |
Акционерное общество "Лаборатория Касперского" |
Система и способ обнаружения вредоносных файлов с использованием элементов статического анализа
|
CN107392019A
(zh)
|
2017-07-05 |
2017-11-24 |
北京金睛云华科技有限公司 |
一种恶意代码家族的训练和检测方法及装置
|
EP3649767A1
(en)
|
2017-07-06 |
2020-05-13 |
Pixm |
Phishing detection method and system
|
CN107392456A
(zh)
|
2017-07-14 |
2017-11-24 |
武汉理工大学 |
一种融合互联网信息的多角度企业信用评估建模方法
|
US10546143B1
(en)
|
2017-08-10 |
2020-01-28 |
Support Intelligence, Inc. |
System and method for clustering files and assigning a maliciousness property based on clustering
|
RU2679785C1
(ru)
|
2017-10-18 |
2019-02-12 |
Акционерное общество "Лаборатория Касперского" |
Система и способ классификации объектов
|
RU2670906C9
(ru)
|
2017-12-28 |
2018-12-12 |
Общество С Ограниченной Ответственностью "Центр Разработки И Внедрения Инновационных Технологий" |
Самонастраивающаяся интерактивная система, способ обмена сообщениями и/или звонками между пользователями различных веб-сайтов с использованием технологии клиент-сервер и считываемый компьютером носитель
|
US11310245B2
(en)
|
2018-01-22 |
2022-04-19 |
T-Mobile Usa, Inc. |
Indicator of compromise calculation system
|
RU2681699C1
(ru)
|
2018-02-13 |
2019-03-12 |
Общество с ограниченной ответственностью "Траст" |
Способ и сервер для поиска связанных сетевых ресурсов
|
RU2706896C1
(ru)
*
|
2018-06-29 |
2019-11-21 |
Акционерное общество "Лаборатория Касперского" |
Система и способ выявления вредоносных файлов с использованием модели обучения, обученной на одном вредоносном файле
|
RU2708356C1
(ru)
|
2018-06-29 |
2019-12-05 |
Акционерное общество "Лаборатория Касперского" |
Система и способ двухэтапной классификации файлов
|
RU2706883C1
(ru)
|
2018-06-29 |
2019-11-21 |
Акционерное общество "Лаборатория Касперского" |
Система и способ снижения количества ложных срабатываний классифицирующих алгоритмов
|
US11451561B2
(en)
|
2018-09-14 |
2022-09-20 |
Cisco Technology, Inc. |
Automated creation of lightweight behavioral indicators of compromise (IOCS)
|
GB2588745B
(en)
|
2018-11-19 |
2021-11-03 |
Sophos Ltd |
Deferred malware scanning
|
RU2702269C1
(ru)
|
2019-06-04 |
2019-10-07 |
Публичное Акционерное Общество "Сбербанк России" (Пао Сбербанк) |
Система интеллектуального управления киберугрозами
|
RU2728498C1
(ru)
*
|
2019-12-05 |
2020-07-29 |
Общество с ограниченной ответственностью "Группа АйБи ТДС" |
Способ и система определения принадлежности программного обеспечения по его исходному коду
|
RU2728497C1
(ru)
*
|
2019-12-05 |
2020-07-29 |
Общество с ограниченной ответственностью "Группа АйБи ТДС" |
Способ и система определения принадлежности программного обеспечения по его машинному коду
|
RU2738344C1
(ru)
*
|
2020-03-10 |
2020-12-11 |
Общество с ограниченной ответственностью «Группа АйБи ТДС» |
Способ и система поиска схожих вредоносных программ по результатам их динамического анализа
|