Patent | Date |
---|
Method and system for rateless and pollution-attack-resilient network coding Grant 11,362,810 - Hu , et al. June 14, 2 | 2022-06-14 |
Constraining neural networks for robustness through alternative encoding App 20220180157 - Eykholt; Kevin ;   et al. | 2022-06-09 |
Adaptive robustness certification against adversarial examples App 20220180172 - Eykholt; Kevin ;   et al. | 2022-06-09 |
Detecting adversary attacks on a deep neural network (DNN) App 20220156563 - Zhang; Jialong ;   et al. | 2022-05-19 |
Detecting and mitigating malware by evaluating HTTP errors App 20220124102 - Zhang; Jialong ;   et al. | 2022-04-21 |
Intrusion Detection In Micro-services Through Container Telemetry And Behavior Modeling App 20220121741 - Araujo; Frederico ;   et al. | 2022-04-21 |
Methods and systems for improving beaconing detection algorithms Grant 11,153,337 - Hu , et al. October 19, 2 | 2021-10-19 |
Deactivating evasive malware Grant 11,144,642 - Gu , et al. October 12, 2 | 2021-10-12 |
Software Intelligence As-a-service App 20210279303 - JANG; Jiyong ;   et al. | 2021-09-09 |
Cognitive analysis of security data with signal flow-based graph exploration Grant 11,089,040 - Jang , et al. August 10, 2 | 2021-08-10 |
Inferring temporal relationships for cybersecurity events Grant 11,082,434 - Ravindra , et al. August 3, 2 | 2021-08-03 |
Automated semantic modeling of system events App 20210182387 - Zhu; Ziyun ;   et al. | 2021-06-17 |
Characterizing user behavior in a computer system by automated learning of intention embedded in a system-generated event graph App 20210176260 - Pan; Xiaorui ;   et al. | 2021-06-10 |
AI-powered cyber data concealment and targeted mission execution Grant 11,032,251 - Kirat , et al. June 8, 2 | 2021-06-08 |
Automatic categorization of IDPS signatures from multiple different IDPS systems Grant 11,025,656 - Hu , et al. June 1, 2 | 2021-06-01 |
Automatic Categorization Of IDPS Signatures From Multiple Different IDPS Systems App 20210160260 - HU; Xin ;   et al. | 2021-05-27 |
Detecting Malicious Beaconing Communities Using Lockstep Detection And Co-occurrence Graph App 20210120012 - JANG; Jiyong ;   et al. | 2021-04-22 |
Cognitive offense analysis using contextual data and knowledge graphs Grant 10,958,672 - Bird , et al. March 23, 2 | 2021-03-23 |
Detecting malicious beaconing communities using lockstep detection and co-occurrence graph Grant 10,887,323 - Jang , et al. January 5, 2 | 2021-01-05 |
Identifying command and control endpoint used by domain generation algorithm (DGA) malware Grant 10,841,320 - Hu , et al. November 17, 2 | 2020-11-17 |
Inferring temporal relationships for cybersecurity events App 20200322361 - Ravindra; Preeti ;   et al. | 2020-10-08 |
Corroborating threat assertions by consolidating security and threat intelligence with kinetics data Grant 10,686,830 - Jang , et al. | 2020-06-16 |
Feedback-based prioritized cognitive analysis Grant 10,681,061 - Jang , et al. | 2020-06-09 |
Method and system for rateless and pollution-attack-resilient network coding including decoder(s) Grant 10,652,217 - Hu , et al. | 2020-05-12 |
Cognitive analysis of security data with signal flow-based graph exploration App 20200145442 - Jang; Jiyong ;   et al. | 2020-05-07 |
Cognitive offense analysis using contextual data and knowledge graphs App 20200120115 - Bird; William Alexander ;   et al. | 2020-04-16 |
Deactivating Evasive Malware App 20200089879 - GU; ZHONGSHU ;   et al. | 2020-03-19 |
Automatic Categorization Of IDPS Signatures From Multiple Different IDPS Systems App 20200067950 - HU; Xin ;   et al. | 2020-02-27 |
Detecting web exploit kits by tree-based structural similarity search Grant 10,560,471 - Hu , et al. Feb | 2020-02-11 |
Deactivating evasive malware Grant 10,546,128 - Gu , et al. Ja | 2020-01-28 |
Method And System For Rateless And Pollution-attack-resilient Network Coding App 20200028669 - HU; Xin ;   et al. | 2020-01-23 |
Method For Efficient And Practical Key Distribution In Network Coding Systems App 20200028670 - HU; Xin ;   et al. | 2020-01-23 |
Cognitive offense analysis using contextual data and knowledge graphs Grant 10,542,015 - Bird , et al. Ja | 2020-01-21 |
Automatic categorization of IDPS signatures from multiple different IDPS systems Grant 10,542,014 - Hu , et al. Ja | 2020-01-21 |
Cognitive analysis of security data with signal flow-based graph exploration Grant 10,536,472 - Jang , et al. Ja | 2020-01-14 |
AI-powered Cyber Data Concealment and Targeted Mission Execution App 20200007512 - Kirat; Dhilung Hang ;   et al. | 2020-01-02 |
Method and system for rateless and pollution-attack-resilient network coding Grant 10,505,719 - Hu , et al. Dec | 2019-12-10 |
Identifying command and control endpoint used by domain generation algorithm (DGA) malware App 20190364059 - Hu; Xin ;   et al. | 2019-11-28 |
Method for efficient and practical key distribution in network coding systems Grant 10,484,171 - Hu , et al. Nov | 2019-11-19 |
Methods And Systems For Improving Beaconing Detection Algorithms App 20190230109 - Hu; Xin ;   et al. | 2019-07-25 |
Identifying command and control endpoint used by domain generation algorithm (DGA) malware Grant 10,362,044 - Hu , et al. | 2019-07-23 |
Corroborating threat assertions by consolidating security and threat intelligence with kinetics data App 20190190945 - Jang; Jiyong ;   et al. | 2019-06-20 |
Cognitive offense analysis using enriched graphs Grant 10,313,365 - Jang , et al. | 2019-06-04 |
Methods and systems for improving beaconing detection algorithms Grant 10,284,584 - Hu , et al. | 2019-05-07 |
Deactivating Evasive Malware App 20190108339 - GU; ZHONGSHU ;   et al. | 2019-04-11 |
USB device firmware sanitization Grant 10,216,673 - Beitler , et al. Feb | 2019-02-26 |
Identifying command and control endpoint used by domain generation algorithm (DGA) malware App 20190052650 - Hu; Xin ;   et al. | 2019-02-14 |
Detecting Malicious Beaconing Communities Using Lockstep Detection And Co-occurrence Graph App 20180367547 - JANG; Jiyong ;   et al. | 2018-12-20 |
Feedback-based prioritized cognitive analysis App 20180367549 - Jang; Jiyong ;   et al. | 2018-12-20 |
Protecting Computer Systems From Malicious Usb Devices Via A Usb Firewall App 20180270194 - BEITLER; Anton ;   et al. | 2018-09-20 |
Detection of beaconing behavior in network traffic Grant 10,044,737 - Hu , et al. August 7, 2 | 2018-08-07 |
USB Device Firmware Sanitization App 20180203819 - Beitler; Anton ;   et al. | 2018-07-19 |
Consolidating structured and unstructured security and threat intelligence with knowledge graphs App 20180159876 - Park; Youngja ;   et al. | 2018-06-07 |
Cognitive offense analysis using enriched graphs App 20180048662 - Jang; Jiyong ;   et al. | 2018-02-15 |
Cognitive offense analysis using contextual data and knowledge graphs App 20180048661 - Bird; William Alexander ;   et al. | 2018-02-15 |
Cognitive analysis of security data with signal flow-based graph exploration App 20180046928 - Jang; Jiyong ;   et al. | 2018-02-15 |
Method For Efficient And Practical Key Distribution In Network Coding Systems App 20170366341 - HU; Xin ;   et al. | 2017-12-21 |
Automatic Categorization of IDPS Signatures from multiple different idps systems App 20170331841 - HU; Xin ;   et al. | 2017-11-16 |
Method And System For Rateless And Pollution-attack-resilient Network Coding Including Decoder(s) App 20170317986 - HU; Xin ;   et al. | 2017-11-02 |
Method And System For Rateless And Pollution-attack-resilient Network Coding App 20170317819 - HU; Xin ;   et al. | 2017-11-02 |
Methods And Systems For Improving Beaconing Detection Algorithms App 20170244731 - HU; Xin ;   et al. | 2017-08-24 |
Detecting web exploit kits by tree-based structural similarity search Grant 9,723,016 - Hu , et al. August 1, 2 | 2017-08-01 |
Detection of beaconing behavior in network traffic Grant 9,591,007 - Hu , et al. March 7, 2 | 2017-03-07 |
Detecting Web Exploit Kits By Tree-based Structural Similarity Search App 20170054749 - Hu; Xin ;   et al. | 2017-02-23 |
Identifying malicious web infrastructures Grant 9,578,042 - Hu , et al. February 21, 2 | 2017-02-21 |
Identifying malicious web infrastructures Grant 9,571,518 - Hu , et al. February 14, 2 | 2017-02-14 |
Detecting web exploit kits by tree-based structural similarity search Grant 9,516,051 - Hu , et al. December 6, 2 | 2016-12-06 |
Detecting Web Exploit Kits By Tree-based Structural Similarity Search App 20160337388 - HU; Xin ;   et al. | 2016-11-17 |
Detecting Web Exploit Kits By Tree-based Structural Similarity Search App 20160337387 - Hu; Xin ;   et al. | 2016-11-17 |
Identifying Malicious Web Infrastructures App 20160261626 - Hu; Xin ;   et al. | 2016-09-08 |
Identifying Malicious Web Infrastructures App 20160261608 - Hu; Xin ;   et al. | 2016-09-08 |
Detection Of Beaconing Behavior In Network Traffic App 20160134641 - HU; Xin ;   et al. | 2016-05-12 |
Detection Of Beaconing Behavior In Network Traffic App 20160134651 - HU; Xin ;   et al. | 2016-05-12 |