US7673335B1
(en)
|
2004-07-01 |
2010-03-02 |
Novell, Inc. |
Computer-implemented method and system for security event correlation
|
US8578480B2
(en)
*
|
2002-03-08 |
2013-11-05 |
Mcafee, Inc. |
Systems and methods for identifying potentially malicious messages
|
US20060015942A1
(en)
|
2002-03-08 |
2006-01-19 |
Ciphertrust, Inc. |
Systems and methods for classification of messaging entities
|
US8561167B2
(en)
*
|
2002-03-08 |
2013-10-15 |
Mcafee, Inc. |
Web reputation scoring
|
US7926113B1
(en)
|
2003-06-09 |
2011-04-12 |
Tenable Network Security, Inc. |
System and method for managing network vulnerability analysis systems
|
US7761918B2
(en)
*
|
2004-04-13 |
2010-07-20 |
Tenable Network Security, Inc. |
System and method for scanning a network
|
US8635690B2
(en)
|
2004-11-05 |
2014-01-21 |
Mcafee, Inc. |
Reputation based message processing
|
US7926099B1
(en)
*
|
2005-07-15 |
2011-04-12 |
Novell, Inc. |
Computer-implemented method and system for security event transport using a message bus
|
US8763113B2
(en)
|
2005-11-28 |
2014-06-24 |
Threatmetrix Pty Ltd |
Method and system for processing a stream of information from a computer network using node based reputation characteristics
|
US8141148B2
(en)
|
2005-11-28 |
2012-03-20 |
Threatmetrix Pty Ltd |
Method and system for tracking machines on a network using fuzzy GUID technology
|
JP2007183838A
(en)
*
|
2006-01-06 |
2007-07-19 |
Fujitsu Ltd |
Query parameter output page discovering program, query parameter output page discovering method, and query parameter output page discovering device
|
US8676961B2
(en)
*
|
2006-07-27 |
2014-03-18 |
Yahoo! Inc. |
System and method for web destination profiling
|
US9715675B2
(en)
*
|
2006-08-10 |
2017-07-25 |
Oracle International Corporation |
Event-driven customizable automated workflows for incident remediation
|
US7904472B1
(en)
*
|
2006-09-18 |
2011-03-08 |
Symantec Operating Corporation |
Scanning application binaries to identify database queries
|
JP4908131B2
(en)
*
|
2006-09-28 |
2012-04-04 |
富士通株式会社 |
Display processing program, apparatus, and method of non-immediate processing existence possibility
|
US8176178B2
(en)
*
|
2007-01-29 |
2012-05-08 |
Threatmetrix Pty Ltd |
Method for tracking machines on a network using multivariable fingerprinting of passively available information
|
US9444839B1
(en)
|
2006-10-17 |
2016-09-13 |
Threatmetrix Pty Ltd |
Method and system for uniquely identifying a user computer in real time for security violations using a plurality of processing parameters and servers
|
US7984452B2
(en)
|
2006-11-10 |
2011-07-19 |
Cptn Holdings Llc |
Event source management using a metadata-driven framework
|
US8214497B2
(en)
|
2007-01-24 |
2012-07-03 |
Mcafee, Inc. |
Multi-dimensional reputation scoring
|
US7779156B2
(en)
|
2007-01-24 |
2010-08-17 |
Mcafee, Inc. |
Reputation based load balancing
|
US8179798B2
(en)
*
|
2007-01-24 |
2012-05-15 |
Mcafee, Inc. |
Reputation based connection throttling
|
US8763114B2
(en)
|
2007-01-24 |
2014-06-24 |
Mcafee, Inc. |
Detecting image spam
|
US8255999B2
(en)
*
|
2007-05-24 |
2012-08-28 |
Microsoft Corporation |
Anti-virus scanning of partially available content
|
US20080301796A1
(en)
*
|
2007-05-31 |
2008-12-04 |
Microsoft Corporation |
Adjusting the Levels of Anti-Malware Protection
|
US8949827B2
(en)
*
|
2007-06-22 |
2015-02-03 |
Red Hat, Inc. |
Tracking a virtual machine
|
US8191141B2
(en)
|
2007-06-22 |
2012-05-29 |
Red Hat, Inc. |
Method and system for cloaked observation and remediation of software attacks
|
US9678803B2
(en)
|
2007-06-22 |
2017-06-13 |
Red Hat, Inc. |
Migration of network entities to a cloud infrastructure
|
US9354960B2
(en)
|
2010-12-27 |
2016-05-31 |
Red Hat, Inc. |
Assigning virtual machines to business application service groups based on ranking of the virtual machines
|
US8127290B2
(en)
*
|
2007-06-22 |
2012-02-28 |
Red Hat, Inc. |
Method and system for direct insertion of a virtual machine driver
|
US8336108B2
(en)
*
|
2007-06-22 |
2012-12-18 |
Red Hat, Inc. |
Method and system for collaboration involving enterprise nodes
|
US8539570B2
(en)
|
2007-06-22 |
2013-09-17 |
Red Hat, Inc. |
Method for managing a virtual machine
|
US9569330B2
(en)
|
2007-06-22 |
2017-02-14 |
Red Hat, Inc. |
Performing dependency analysis on nodes of a business application service group
|
US8984504B2
(en)
*
|
2007-06-22 |
2015-03-17 |
Red Hat, Inc. |
Method and system for determining a host machine by a virtual machine
|
US8429748B2
(en)
*
|
2007-06-22 |
2013-04-23 |
Red Hat, Inc. |
Network traffic analysis using a dynamically updating ontological network description
|
US9495152B2
(en)
|
2007-06-22 |
2016-11-15 |
Red Hat, Inc. |
Automatic baselining of business application service groups comprised of virtual machines
|
US9727440B2
(en)
|
2007-06-22 |
2017-08-08 |
Red Hat, Inc. |
Automatic simulation of virtual machine performance
|
EP2201457A2
(en)
*
|
2007-10-18 |
2010-06-30 |
Neustar, Inc. |
System and method for sharing web performance monitoring data
|
US9843596B1
(en)
*
|
2007-11-02 |
2017-12-12 |
ThetaRay Ltd. |
Anomaly detection in dynamically evolving data and systems
|
US8185930B2
(en)
|
2007-11-06 |
2012-05-22 |
Mcafee, Inc. |
Adjusting filter or classification control settings
|
US8331240B2
(en)
*
|
2007-11-08 |
2012-12-11 |
Harris Corporation |
Promiscuous monitoring using internet protocol enabled devices
|
US8589503B2
(en)
*
|
2008-04-04 |
2013-11-19 |
Mcafee, Inc. |
Prioritizing network traffic
|
US8185488B2
(en)
|
2008-04-17 |
2012-05-22 |
Emc Corporation |
System and method for correlating events in a pluggable correlation architecture
|
CN101674293B
(en)
*
|
2008-09-11 |
2013-04-03 |
阿里巴巴集团控股有限公司 |
Method and system for processing abnormal request in distributed application
|
US8769684B2
(en)
*
|
2008-12-02 |
2014-07-01 |
The Trustees Of Columbia University In The City Of New York |
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
|
WO2010088550A2
(en)
*
|
2009-01-29 |
2010-08-05 |
Breach Security, Inc. |
A method and apparatus for excessive access rate detection
|
US10057285B2
(en)
*
|
2009-01-30 |
2018-08-21 |
Oracle International Corporation |
System and method for auditing governance, risk, and compliance using a pluggable correlation architecture
|
US20100199345A1
(en)
*
|
2009-02-04 |
2010-08-05 |
Breach Security, Inc. |
Method and System for Providing Remote Protection of Web Servers
|
US8490187B2
(en)
|
2009-03-20 |
2013-07-16 |
Microsoft Corporation |
Controlling malicious activity detection using behavioral models
|
US9231964B2
(en)
*
|
2009-04-14 |
2016-01-05 |
Microsoft Corporation |
Vulnerability detection based on aggregated primitives
|
US8418227B2
(en)
*
|
2009-08-21 |
2013-04-09 |
Verizon Patent And Licensing, Inc. |
Keystroke logger for Unix-based systems
|
US8789204B2
(en)
*
|
2009-12-22 |
2014-07-22 |
Nokia Corporation |
Method and apparatus for secure cross-site scripting
|
US8528091B2
(en)
|
2009-12-31 |
2013-09-03 |
The Trustees Of Columbia University In The City Of New York |
Methods, systems, and media for detecting covert malware
|
US8438270B2
(en)
*
|
2010-01-26 |
2013-05-07 |
Tenable Network Security, Inc. |
System and method for correlating network identities and addresses
|
US8302198B2
(en)
|
2010-01-28 |
2012-10-30 |
Tenable Network Security, Inc. |
System and method for enabling remote registry service security audits
|
US8707440B2
(en)
*
|
2010-03-22 |
2014-04-22 |
Tenable Network Security, Inc. |
System and method for passively identifying encrypted and interactive network sessions
|
US8549650B2
(en)
|
2010-05-06 |
2013-10-01 |
Tenable Network Security, Inc. |
System and method for three-dimensional visualization of vulnerability and asset data
|
US8621638B2
(en)
|
2010-05-14 |
2013-12-31 |
Mcafee, Inc. |
Systems and methods for classification of messaging entities
|
WO2012041385A1
(en)
*
|
2010-09-30 |
2012-04-05 |
Hewlett-Packard Development Company, L P |
Virtual machines for virus scanning
|
RU2449348C1
(en)
|
2010-11-01 |
2012-04-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method for virus-checking data downloaded from network at server side
|
US8578487B2
(en)
|
2010-11-04 |
2013-11-05 |
Cylance Inc. |
System and method for internet security
|
RU2454714C1
(en)
*
|
2010-12-30 |
2012-06-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of increasing efficiency of detecting unknown harmful objects
|
US8800033B2
(en)
*
|
2011-05-26 |
2014-08-05 |
International Business Machines Corporation |
Rotation of web site content to prevent E-mail spam/phishing attacks
|
US9116717B2
(en)
|
2011-05-27 |
2015-08-25 |
Cylance Inc. |
Run-time interception of software methods
|
US9032529B2
(en)
*
|
2011-11-30 |
2015-05-12 |
International Business Machines Corporation |
Detecting vulnerabilities in web applications
|
US9030562B2
(en)
|
2011-12-02 |
2015-05-12 |
Robert Bosch Gmbh |
Use of a two- or three-dimensional barcode as a diagnostic device and a security device
|
US9367707B2
(en)
|
2012-02-23 |
2016-06-14 |
Tenable Network Security, Inc. |
System and method for using file hashes to track data leakage and document propagation in a network
|
US9298494B2
(en)
|
2012-05-14 |
2016-03-29 |
Qualcomm Incorporated |
Collaborative learning for efficient behavioral analysis in networked mobile device
|
US9324034B2
(en)
|
2012-05-14 |
2016-04-26 |
Qualcomm Incorporated |
On-device real-time behavior analyzer
|
US9609456B2
(en)
|
2012-05-14 |
2017-03-28 |
Qualcomm Incorporated |
Methods, devices, and systems for communicating behavioral analysis information
|
US9690635B2
(en)
|
2012-05-14 |
2017-06-27 |
Qualcomm Incorporated |
Communicating behavior information in a mobile computing device
|
US9202047B2
(en)
|
2012-05-14 |
2015-12-01 |
Qualcomm Incorporated |
System, apparatus, and method for adaptive observation of mobile device behavior
|
US20150205463A1
(en)
*
|
2012-06-26 |
2015-07-23 |
Google Inc. |
Method for storing form data
|
US9043920B2
(en)
|
2012-06-27 |
2015-05-26 |
Tenable Network Security, Inc. |
System and method for identifying exploitable weak points in a network
|
US9088606B2
(en)
|
2012-07-05 |
2015-07-21 |
Tenable Network Security, Inc. |
System and method for strategic anti-malware monitoring
|
US9747440B2
(en)
|
2012-08-15 |
2017-08-29 |
Qualcomm Incorporated |
On-line behavioral analysis engine in mobile device with multiple analyzer model providers
|
US9495537B2
(en)
|
2012-08-15 |
2016-11-15 |
Qualcomm Incorporated |
Adaptive observation of behavioral features on a mobile device
|
US9330257B2
(en)
|
2012-08-15 |
2016-05-03 |
Qualcomm Incorporated |
Adaptive observation of behavioral features on a mobile device
|
US9319897B2
(en)
|
2012-08-15 |
2016-04-19 |
Qualcomm Incorporated |
Secure behavior analysis over trusted execution environment
|
US10089582B2
(en)
|
2013-01-02 |
2018-10-02 |
Qualcomm Incorporated |
Using normalized confidence values for classifying mobile device behaviors
|
US9686023B2
(en)
|
2013-01-02 |
2017-06-20 |
Qualcomm Incorporated |
Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors
|
US9684870B2
(en)
|
2013-01-02 |
2017-06-20 |
Qualcomm Incorporated |
Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors
|
US9742559B2
(en)
|
2013-01-22 |
2017-08-22 |
Qualcomm Incorporated |
Inter-module authentication for securing application execution integrity within a computing device
|
US9491187B2
(en)
|
2013-02-15 |
2016-11-08 |
Qualcomm Incorporated |
APIs for obtaining device-specific behavior classifier models from the cloud
|
US20140259169A1
(en)
*
|
2013-03-11 |
2014-09-11 |
Hewlett-Packard Development Company, L.P. |
Virtual machines
|
US9467464B2
(en)
|
2013-03-15 |
2016-10-11 |
Tenable Network Security, Inc. |
System and method for correlating log data to discover network vulnerabilities and assets
|
US9852290B1
(en)
|
2013-07-12 |
2017-12-26 |
The Boeing Company |
Systems and methods of analyzing a software component
|
US9280369B1
(en)
|
2013-07-12 |
2016-03-08 |
The Boeing Company |
Systems and methods of analyzing a software component
|
US9336025B2
(en)
|
2013-07-12 |
2016-05-10 |
The Boeing Company |
Systems and methods of analyzing a software component
|
US9396082B2
(en)
|
2013-07-12 |
2016-07-19 |
The Boeing Company |
Systems and methods of analyzing a software component
|
US9479521B2
(en)
|
2013-09-30 |
2016-10-25 |
The Boeing Company |
Software network behavior analysis and identification system
|
US9298597B2
(en)
|
2014-06-17 |
2016-03-29 |
International Business Machines Corporation |
Automated testing of websites based on mode
|
US9301126B2
(en)
|
2014-06-20 |
2016-03-29 |
Vodafone Ip Licensing Limited |
Determining multiple users of a network enabled device
|
US10230742B2
(en)
|
2015-01-30 |
2019-03-12 |
Anomali Incorporated |
Space and time efficient threat detection
|
EP3251047B1
(en)
*
|
2015-01-30 |
2021-06-02 |
Micro Focus LLC |
Protection against database injection attacks
|
US9680646B2
(en)
*
|
2015-02-05 |
2017-06-13 |
Apple Inc. |
Relay service for communication between controllers and accessories
|
US10021123B2
(en)
*
|
2015-06-29 |
2018-07-10 |
Qualcomm Incorporated |
Customized network traffic models to detect application anomalies
|
US9641544B1
(en)
*
|
2015-09-18 |
2017-05-02 |
Palo Alto Networks, Inc. |
Automated insider threat prevention
|
US10462173B1
(en)
*
|
2016-06-30 |
2019-10-29 |
Fireeye, Inc. |
Malware detection verification and enhancement by coordinating endpoint and malware detection systems
|
US10298605B2
(en)
|
2016-11-16 |
2019-05-21 |
Red Hat, Inc. |
Multi-tenant cloud security threat detection
|
US11194915B2
(en)
|
2017-04-14 |
2021-12-07 |
The Trustees Of Columbia University In The City Of New York |
Methods, systems, and media for testing insider threat detection systems
|
US10855656B2
(en)
|
2017-09-15 |
2020-12-01 |
Palo Alto Networks, Inc. |
Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation
|
US10931637B2
(en)
|
2017-09-15 |
2021-02-23 |
Palo Alto Networks, Inc. |
Outbound/inbound lateral traffic punting based on process risk
|
WO2021149119A1
(en)
*
|
2020-01-20 |
2021-07-29 |
日本電信電話株式会社 |
Estimation system and estimation program
|
US20230224275A1
(en)
*
|
2022-01-12 |
2023-07-13 |
Bank Of America Corporation |
Preemptive threat detection for an information system
|