loadpatents
Patent applications and USPTO patent grants for Pevny; Tomas.The latest application filed is for "automated malware classification with human-readable explanations".
Patent | Date |
---|---|
Analyzing encrypted traffic behavior using contextual traffic data Grant 11,451,578 - Kohout , et al. September 20, 2 | 2022-09-20 |
Automated Malware Classification With Human-readable Explanations App 20220237289 - Pevny; Tomas ;   et al. | 2022-07-28 |
Detection Of Malware And Malicious Applications App 20210360004 - McGrew; David ;   et al. | 2021-11-18 |
Detection of malicious executable files using hierarchical models Grant 11,113,397 - Pevny , et al. September 7, 2 | 2021-09-07 |
Detection of malware and malicious applications Grant 11,057,420 - McGrew , et al. July 6, 2 | 2021-07-06 |
Active prioritization of investigation targets in network security Grant 10,904,271 - Jusko , et al. January 26, 2 | 2021-01-26 |
Analyzing Encrypted Traffic Behavior Using Contextual Traffic Data App 20210006589 - Kohout; Jan ;   et al. | 2021-01-07 |
Leveraging endpoint and network environment inferences for malware traffic classification Grant 10,855,698 - Anderson , et al. December 1, 2 | 2020-12-01 |
Detection Of Malicious Executable Files Using Hierarchical Models App 20200364334 - Pevny; Tomas ;   et al. | 2020-11-19 |
Analyzing encrypted traffic behavior using contextual traffic data Grant 10,805,338 - Kohout , et al. October 13, 2 | 2020-10-13 |
Service usage model for traffic analysis Grant 10,785,247 - Nikolaev , et al. Sept | 2020-09-22 |
Private-learned IDS Grant 10,708,284 - Kopp , et al. | 2020-07-07 |
Illegitimate typosquatting detection with internet protocol information Grant 10,491,614 - Grill , et al. Nov | 2019-11-26 |
Learning indicators of compromise with hierarchical models Grant 10,375,143 - Pevny , et al. | 2019-08-06 |
Detection Of Malware And Malicious Applications App 20190230095 - MCGREW; DAVID ;   et al. | 2019-07-25 |
Leveraging Endpoint And Network Environment Inferences For Malware Traffic Classification App 20190199739 - Anderson; Blake Harrell ;   et al. | 2019-06-27 |
Detection of malware and malicious applications Grant 10,305,928 - McGrew , et al. | 2019-05-28 |
Active Prioritization Of Investigation Targets In Network Security App 20190124094 - Jusko; Jan ;   et al. | 2019-04-25 |
Explaining network anomalies using decision trees Grant 10,230,747 - Kopp , et al. | 2019-03-12 |
Rapid, targeted network threat detection Grant 10,218,718 - Kopp , et al. Feb | 2019-02-26 |
Private-learned Ids App 20190014134 - Kopp; Martin ;   et al. | 2019-01-10 |
Framework for joint learning of network traffic representations and traffic classifiers Grant 10,079,768 - Kohout , et al. September 18, 2 | 2018-09-18 |
Service Usage Model For Traffic Analysis App 20180212992 - Nikolaev; Ivan ;   et al. | 2018-07-26 |
Identifying malicious executables by analyzing proxy logs Grant 9,992,216 - Pevny , et al. June 5, 2 | 2018-06-05 |
Explaining causes of network anomalies Grant 9,973,520 - Pevny May 15, 2 | 2018-05-15 |
Analyzing Encrypted Traffic Behavior Using Contextual Traffic Data App 20180103056 - Kohout; Jan ;   et al. | 2018-04-12 |
Learning Indicators Of Compromise With Hierarchical Models App 20180063163 - Pevny; Tomas ;   et al. | 2018-03-01 |
Rapid, Targeted Network Threat Detection App 20180063161 - Kopp; Martin ;   et al. | 2018-03-01 |
Framework For Joint Learning Of Network Traffic Representations And Traffic Classifiers App 20180013681 - Kohout; Jan ;   et al. | 2018-01-11 |
Server grouping system Grant 9,813,442 - Jusko , et al. November 7, 2 | 2017-11-07 |
Identifying Malicious Executables By Analyzing Proxy Logs App 20170230388 - Pevny; Tomas ;   et al. | 2017-08-10 |
Detecting Network Address Translation Devices In A Network Based On Network Traffic Logs App 20170230395 - Komarek; Tomas ;   et al. | 2017-08-10 |
Server Grouping System App 20170142151 - JUSKO; Jan ;   et al. | 2017-05-18 |
Server grouping system Grant 9,596,321 - Jusko , et al. March 14, 2 | 2017-03-14 |
Server Grouping System App 20160381183 - JUSKO; Jan ;   et al. | 2016-12-29 |
Detection of malicious network connections Grant 9,531,742 - Kohout , et al. December 27, 2 | 2016-12-27 |
Detection Of Malware And Malicious Applications App 20160352761 - MCGREW; DAVID ;   et al. | 2016-12-01 |
Detection Of Malicious Network Connections App 20160226902 - KOHOUT; Jan ;   et al. | 2016-08-04 |
Events from network flows Grant 9,374,383 - Sourek , et al. June 21, 2 | 2016-06-21 |
Detection of malicious network connections Grant 9,344,441 - Kohout , et al. May 17, 2 | 2016-05-17 |
Events From Network Flows App 20160112442 - SOUREK; Gustav ;   et al. | 2016-04-21 |
Detection Of Malicious Network Connections App 20160080404 - KOHOUT; Jan ;   et al. | 2016-03-17 |
Explaining Network Anomalies Using Decision Trees App 20160036844 - KOPP; MARTIN ;   et al. | 2016-02-04 |
Explaining Causes Of Network Anomalies App 20160021122 - PEVNY; TOMAS | 2016-01-21 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.