Patent | Date |
---|
Detecting unmanaged and unauthorized assets in an information technology network with a recurrent neural network that identifies anomalously-named assets Grant 11,431,741 - Lin , et al. August 30, 2 | 2022-08-30 |
Anomaly detection based on processes executed within a network Grant 11,423,143 - Lin , et al. August 23, 2 | 2022-08-23 |
System, Method, And Computer Program For Automatically Classifying User Accounts In A Computer Network Using Keys From An Identity Management System App 20220006814 - Lin; Derek ;   et al. | 2022-01-06 |
Self-learning cybersecurity threat detection system, method, and computer program for multi-domain data Grant 11,178,168 - Lin , et al. November 16, 2 | 2021-11-16 |
System, method, and computer program for automatically classifying user accounts in a computer network using keys from an identity management system Grant 11,140,167 - Lin , et al. October 5, 2 | 2021-10-05 |
System, method, and computer program for detection of anomalous user network activity based on multiple data sources Grant 10,944,777 - Lin , et al. March 9, 2 | 2021-03-09 |
Behavior analytics system for determining the cybersecurity risk associated with first-time, user-to-entity access alerts Grant 10,887,325 - Lin , et al. January 5, 2 | 2021-01-05 |
Dynamic rule risk score determination in a cybersecurity monitoring system Grant 10,841,338 - Lin , et al. November 17, 2 | 2020-11-17 |
System, Method, And Computer Program For Detection Of Anomalous User Network Activity Based On Multiple Data Sources App 20200228557 - Lin; Derek ;   et al. | 2020-07-16 |
System, method, and computer program for detection of anomalous user network activity based on multiple data sources Grant 10,645,109 - Lin , et al. | 2020-05-05 |
System, method, and computer program for classifying monitored assets based on user labels and for detecting potential misuse of monitored assets based on the classifications Grant 10,496,815 - Steiman , et al. De | 2019-12-03 |
Scalable predictive early warning system for data backup event log Grant 10,417,072 - Fang , et al. Sept | 2019-09-17 |
System, method, and computer program for automatically classifying user accounts in a computer network based on account behavior Grant 10,178,108 - Lin , et al. J | 2019-01-08 |
Scalable Predictive Early Warning System For Data Backup Event Log App 20180095816 - Fang; Chunsheng ;   et al. | 2018-04-05 |
Dynamic graph anomaly detection framework and scalable system architecture Grant 9,898,604 - Fang , et al. February 20, 2 | 2018-02-20 |
Virtual machine capacity planning Grant 9,858,106 - Kondaveeti , et al. January 2, 2 | 2018-01-02 |
Finding command and control center computers by communication link tracking Grant 9,853,991 - Yu , et al. December 26, 2 | 2017-12-26 |
Scalable predictive early warning system for data backup event log Grant 9,804,909 - Fang , et al. October 31, 2 | 2017-10-31 |
Recommendation system based approach in reducing false positives in anomaly detection Grant 9,727,723 - Kondaveeti , et al. August 8, 2 | 2017-08-08 |
Detection of anomalous utility usage Grant 9,535,917 - Lin January 3, 2 | 2017-01-03 |
Anomaly detection system for enterprise network security Grant 9,503,469 - Lin November 22, 2 | 2016-11-22 |
Predicting data unavailability and data loss events in large database systems Grant 9,489,379 - Wu , et al. November 8, 2 | 2016-11-08 |
Low false positive behavioral fraud detection Grant 9,479,518 - Fang , et al. October 25, 2 | 2016-10-25 |
Analyzing device similarity Grant 9,460,390 - Lin , et al. October 4, 2 | 2016-10-04 |
Detection of malware beaconing activities Grant 9,369,479 - Lin June 14, 2 | 2016-06-14 |
Finding command and control center computers by communication link tracking Grant 9,344,443 - Yu , et al. May 17, 2 | 2016-05-17 |
Finding command and control center computers by communication link tracking Grant 9,344,442 - Yu , et al. May 17, 2 | 2016-05-17 |
Virtual Machine Capacity Planning App 20160098291 - Kondaveeti; Anirudh ;   et al. | 2016-04-07 |
Analyzing device similarity Grant 9,292,793 - Lin , et al. March 22, 2 | 2016-03-22 |
Dynamic Graph Anomaly Detection Framework And Scalable System Architecture App 20160048681 - Fang; Chunsheng ;   et al. | 2016-02-18 |
Virtual machine capacity planning Grant 9,244,711 - Kondaveeti , et al. January 26, 2 | 2016-01-26 |
Anomaly Detection System For Enterprise Network Security App 20150381646 - Lin; Derek | 2015-12-31 |
Dynamic graph anomaly detection framework and scalable system architecture Grant 9,202,052 - Fang , et al. December 1, 2 | 2015-12-01 |
Graph-based method to detect malware command-and-control infrastructure Grant 9,195,826 - Fang , et al. November 24, 2 | 2015-11-24 |
Historical behavior baseline modeling and anomaly detection in machine generated end to end event log Grant 9,189,623 - Lin , et al. November 17, 2 | 2015-11-17 |
Detection Of Malware Beaconing Activities App 20150304350 - Lin; Derek | 2015-10-22 |
Anomaly detection system for enterprise network security Grant 9,112,895 - Lin August 18, 2 | 2015-08-18 |
Finding command and control center computers by communication link tracking Grant 9,060,018 - Yu , et al. June 16, 2 | 2015-06-16 |
Detection of malware beaconing activities Grant 9,038,178 - Lin May 19, 2 | 2015-05-19 |
Authentication involving authentication operations which cross reference authentication factors Grant 8,925,058 - Dotan , et al. December 30, 2 | 2014-12-30 |
Click stream analysis for fraud detection Grant 8,880,441 - Chen , et al. November 4, 2 | 2014-11-04 |
Method for reducing topography of non-volatile memory and resulting memory cells Grant 8,809,179 - Wang , et al. August 19, 2 | 2014-08-19 |
Access control via organization charts Grant 8,479,302 - Lin July 2, 2 | 2013-07-02 |
Logic compatible storage device Grant 7,514,740 - Hsu , et al. April 7, 2 | 2009-04-07 |
Program methods for split-gate memory Grant 7,495,960 - Chih , et al. February 24, 2 | 2009-02-24 |
Program methods for split-gate memory App 20080068887 - Chih; Yue-Der ;   et al. | 2008-03-20 |
Logic compatible storage device App 20080006868 - Hsu; Te-Hsun ;   et al. | 2008-01-10 |
Method for reducing topography of non-volatile memory and resulting memory cells App 20070241386 - Wang; Shih Wei ;   et al. | 2007-10-18 |