Movatterモバイル変換


[0]ホーム

URL:


US20070192863A1 - Systems and methods for processing data flows - Google Patents

Systems and methods for processing data flows
Download PDF

Info

Publication number
US20070192863A1
US20070192863A1US11/610,296US61029606AUS2007192863A1US 20070192863 A1US20070192863 A1US 20070192863A1US 61029606 AUS61029606 AUS 61029606AUS 2007192863 A1US2007192863 A1US 2007192863A1
Authority
US
United States
Prior art keywords
network
data
patterns
data flow
flow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/610,296
Inventor
Harsh Kapoor
Moisey Akerman
Stephen Justus
JC Ferguson
Yevgeny Korsunsky
Paul Gallo
Charles Lee
Timothy Martin
Chunsheng Fu
Weidong Xu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Blue Coat Systems LLC
Original Assignee
Crossbeam Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filedlitigationCriticalhttps://patents.darts-ip.com/?family=46326816&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20070192863(A1)"Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority claimed from US11/173,923external-prioritypatent/US7836443B2/en
Priority to US11/610,296priorityCriticalpatent/US20070192863A1/en
Application filed by Crossbeam Systems IncfiledCriticalCrossbeam Systems Inc
Assigned to CROSSBEAM SYSTEMS, INC.reassignmentCROSSBEAM SYSTEMS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: JUSTUS, STEPHEN D., FU, CHUNSHENG, KAPOOR, HARSH, MARTIN, TIMOTHY M., GALLO, PAUL S., KORSUNSKY, YEVGENY, XU, WEIDONG, AKERMAN, MOISEY, FERGUSON, JC, LEE, CHARLES C.
Publication of US20070192863A1publicationCriticalpatent/US20070192863A1/en
Priority to US11/877,792prioritypatent/US20080133517A1/en
Priority to US11/877,813prioritypatent/US20080133518A1/en
Priority to US11/877,801prioritypatent/US20080134330A1/en
Priority to US11/877,819prioritypatent/US8402540B2/en
Priority to US11/926,292prioritypatent/US8010469B2/en
Priority to US11/926,307prioritypatent/US7979368B2/en
Priority to US11/926,311prioritypatent/US20080229415A1/en
Priority to US12/539,175prioritypatent/US20100042565A1/en
Priority to US12/982,795prioritypatent/US20110219035A1/en
Priority to US12/982,772prioritypatent/US20110214157A1/en
Priority to US12/983,025prioritypatent/US20110238855A1/en
Priority to US12/982,999prioritypatent/US9800608B2/en
Priority to US12/983,021prioritypatent/US20110213869A1/en
Priority to US12/983,007prioritypatent/US20110231564A1/en
Priority to US13/216,739prioritypatent/US8135657B2/en
Priority to US13/416,647prioritypatent/US9525696B2/en
Assigned to SILICON VALLEY BANKreassignmentSILICON VALLEY BANKSECURITY AGREEMENTAssignors: CB SYSTEMS ACQUISITION CO., CB SYSTEMS HOLDINGS II, INC., CROSSBEAM SYSTEMS, INC.
Assigned to CROSSBEAM SYSTEMS, INC., CB SYSTEMS ACQUISITION CO., CB SYSTEMS HOLDINGS II, INC.reassignmentCROSSBEAM SYSTEMS, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: SILICON VALLEY BANK
Assigned to JEFFERIES FINANCE LLC, AS COLLATERAL AGENTreassignmentJEFFERIES FINANCE LLC, AS COLLATERAL AGENTSECURITY AGREEMENTAssignors: CROSSBEAM SYSTEMS, INC.
Assigned to BLUE COAT SYSTEMS, INC.reassignmentBLUE COAT SYSTEMS, INC.MERGER (SEE DOCUMENT FOR DETAILS).Assignors: CROSSBEAM SYSTEMS, INC.
Assigned to JEFFERIES FINANCE LLC, AS COLLATERAL AGENTreassignmentJEFFERIES FINANCE LLC, AS COLLATERAL AGENTSECOND LIEN PATENT SECURITY AGREEMENTAssignors: BLUE COAT SYSTEMS, INC.
Assigned to JEFFERIES FINANCE LLC, AS THE COLLATERAL AGENTreassignmentJEFFERIES FINANCE LLC, AS THE COLLATERAL AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BLUE COAT SYSTEMS, INC.
Assigned to BLUE COAT SYSTEMS, INC. AS SUCCESSOR BY MERGER TO CROSSBEAM SYSTEMS, INC.reassignmentBLUE COAT SYSTEMS, INC. AS SUCCESSOR BY MERGER TO CROSSBEAM SYSTEMS, INC.RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL AT REEL/FRAME NO. 29877/0668Assignors: JEFFERIES FINANCE LLC
Assigned to BLUE COAT SYSTEMS, INC.reassignmentBLUE COAT SYSTEMS, INC.RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL AT REEL/FRAME NO. 30740/0181Assignors: JEFFERIES FINANCE LLC
Priority to US15/137,492prioritypatent/US20160366160A1/en
Assigned to BLUE COAT SYSTEMS, INC.reassignmentBLUE COAT SYSTEMS, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: JEFFERIES FINANCE LLC
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.

Description

Claims (25)

US11/610,2962000-09-252006-12-13Systems and methods for processing data flowsAbandonedUS20070192863A1 (en)

Priority Applications (18)

Application NumberPriority DateFiling DateTitle
US11/610,296US20070192863A1 (en)2005-07-012006-12-13Systems and methods for processing data flows
US11/877,792US20080133517A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,813US20080133518A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,801US20080134330A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,819US8402540B2 (en)2000-09-252007-10-24Systems and methods for processing data flows
US11/926,292US8010469B2 (en)2000-09-252007-10-29Systems and methods for processing data flows
US11/926,311US20080229415A1 (en)2005-07-012007-10-29Systems and methods for processing data flows
US11/926,307US7979368B2 (en)2005-07-012007-10-29Systems and methods for processing data flows
US12/539,175US20100042565A1 (en)2000-09-252009-08-11Mezzazine in-depth data analysis facility
US12/982,795US20110219035A1 (en)2000-09-252010-12-30Database security via data flow processing
US12/982,772US20110214157A1 (en)2000-09-252010-12-30Securing a network with data flow processing
US12/983,007US20110231564A1 (en)2000-09-252010-12-31Processing data flows with a data flow processor
US12/983,021US20110213869A1 (en)2000-09-252010-12-31Processing data flows with a data flow processor
US12/982,999US9800608B2 (en)2000-09-252010-12-31Processing data flows with a data flow processor
US12/983,025US20110238855A1 (en)2000-09-252010-12-31Processing data flows with a data flow processor
US13/216,739US8135657B2 (en)2000-09-252011-08-24Systems and methods for processing data flows
US13/416,647US9525696B2 (en)2000-09-252012-03-09Systems and methods for processing data flows
US15/137,492US20160366160A1 (en)2000-09-252016-04-25Systems and Methods for Processing Data Flows

Applications Claiming Priority (10)

Application NumberPriority DateFiling DateTitle
US11/173,923US7836443B2 (en)2000-09-252005-07-01Network application apparatus
US11/174,181US8046465B2 (en)2000-09-252005-07-01Flow scheduling for network application apparatus
US74991505P2005-12-132005-12-13
US75066405P2005-12-142005-12-14
US79570806P2006-04-272006-04-27
US79570706P2006-04-272006-04-27
US79588506P2006-04-272006-04-27
US79588606P2006-04-272006-04-27
US79571206P2006-04-272006-04-27
US11/610,296US20070192863A1 (en)2005-07-012006-12-13Systems and methods for processing data flows

Related Parent Applications (2)

Application NumberTitlePriority DateFiling Date
US11/173,923Continuation-In-PartUS7836443B2 (en)2000-09-252005-07-01Network application apparatus
US11/174,181Continuation-In-PartUS8046465B2 (en)2000-09-252005-07-01Flow scheduling for network application apparatus

Related Child Applications (13)

Application NumberTitlePriority DateFiling Date
US11/877,801ContinuationUS20080134330A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,813ContinuationUS20080133518A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,792ContinuationUS20080133517A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,819ContinuationUS8402540B2 (en)2000-09-252007-10-24Systems and methods for processing data flows
US11/926,311Continuation-In-PartUS20080229415A1 (en)2005-07-012007-10-29Systems and methods for processing data flows
US11/926,292Continuation-In-PartUS8010469B2 (en)2000-09-252007-10-29Systems and methods for processing data flows
US11/926,307Continuation-In-PartUS7979368B2 (en)2005-07-012007-10-29Systems and methods for processing data flows
US12/982,772Continuation-In-PartUS20110214157A1 (en)2000-09-252010-12-30Securing a network with data flow processing
US12/982,795Continuation-In-PartUS20110219035A1 (en)2000-09-252010-12-30Database security via data flow processing
US12/983,007Continuation-In-PartUS20110231564A1 (en)2000-09-252010-12-31Processing data flows with a data flow processor
US12/983,025Continuation-In-PartUS20110238855A1 (en)2000-09-252010-12-31Processing data flows with a data flow processor
US12/983,021Continuation-In-PartUS20110213869A1 (en)2000-09-252010-12-31Processing data flows with a data flow processor
US12/982,999Continuation-In-PartUS9800608B2 (en)2000-09-252010-12-31Processing data flows with a data flow processor

Publications (1)

Publication NumberPublication Date
US20070192863A1true US20070192863A1 (en)2007-08-16

Family

ID=46326816

Family Applications (5)

Application NumberTitlePriority DateFiling Date
US11/610,296AbandonedUS20070192863A1 (en)2000-09-252006-12-13Systems and methods for processing data flows
US11/877,819Expired - Fee RelatedUS8402540B2 (en)2000-09-252007-10-24Systems and methods for processing data flows
US11/877,801AbandonedUS20080134330A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,792AbandonedUS20080133517A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,813AbandonedUS20080133518A1 (en)2005-07-012007-10-24Systems and methods for processing data flows

Family Applications After (4)

Application NumberTitlePriority DateFiling Date
US11/877,819Expired - Fee RelatedUS8402540B2 (en)2000-09-252007-10-24Systems and methods for processing data flows
US11/877,801AbandonedUS20080134330A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,792AbandonedUS20080133517A1 (en)2005-07-012007-10-24Systems and methods for processing data flows
US11/877,813AbandonedUS20080133518A1 (en)2005-07-012007-10-24Systems and methods for processing data flows

Country Status (1)

CountryLink
US (5)US20070192863A1 (en)

Cited By (478)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050076238A1 (en)*2003-10-032005-04-07Ormazabal Gaston S.Security management system for monitoring firewall operation
US20050229254A1 (en)*2004-04-082005-10-13Sumeet SinghDetecting public network attacks using signatures and fast content analysis
US20060098585A1 (en)*2004-11-092006-05-11Cisco Technology, Inc.Detecting malicious attacks using network behavior and header analysis
US20060143499A1 (en)*2000-09-252006-06-29Crossbeam Systems, Inc.Flow scheduling for network application
US20060161986A1 (en)*2004-11-092006-07-20Sumeet SinghMethod and apparatus for content classification
US20070067438A1 (en)*2005-09-212007-03-22Battelle Memorial InstituteMethods and systems for detecting abnormal digital traffic
US20070064610A1 (en)*2005-09-192007-03-22Khandani Mehdi KDetection of nonconforming network traffic flow aggregates for mitigating distributed denial of service attacks
US20070127483A1 (en)*2005-12-022007-06-07AlcatelNetwork node with modular multi-stage packet classification
US20070147380A1 (en)*2005-11-082007-06-28Ormazabal Gaston SSystems and methods for implementing protocol-aware network firewall
US20070192286A1 (en)*2004-07-262007-08-16Sourcefire, Inc.Methods and systems for multi-pattern searching
US20070240218A1 (en)*2006-04-062007-10-11George TuvellMalware Detection System and Method for Mobile Platforms
US20070291650A1 (en)*2003-10-032007-12-20Ormazabal Gaston SMethodology for measurements and analysis of protocol conformance, performance and scalability of stateful border gateways
US20080034433A1 (en)*2006-08-012008-02-07Electronics And Telecommunications Research InstituteIntrusion detection apparatus and method using patterns
US20080037587A1 (en)*2006-08-102008-02-14Sourcefire, Inc.Device, system and method for analysis of fragments in a transmission control protocol (TCP) session
US20080037423A1 (en)*2006-08-082008-02-14Pradeep SinghMapping Off-Network Traffic to an Administered Network
US20080127342A1 (en)*2006-07-272008-05-29Sourcefire, Inc.Device, system and method for analysis of fragments in a fragment train
US20080133518A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US20080168559A1 (en)*2007-01-042008-07-10Cisco Technology, Inc.Protection against reflection distributed denial of service attacks
US20080183520A1 (en)*2006-11-172008-07-31Norwich UniversityMethods and apparatus for evaluating an organization
US20080183705A1 (en)*2007-01-292008-07-31Sharp Laboratories Of America, Inc.Method and system for evaluating media-playing sets
US20080181131A1 (en)*2007-01-312008-07-31Cisco Technology, Inc.Managing multiple application configuration versions in a heterogeneous network
US20080196104A1 (en)*2007-02-092008-08-14George TuvellOff-line mms malware scanning system and method
US20080196085A1 (en)*2005-02-182008-08-14Duaxes CorporationCommunication Control Apparatus
US20080198856A1 (en)*2005-11-142008-08-21Vogel William ASystems and methods for modifying network map attributes
US20080209518A1 (en)*2007-02-282008-08-28Sourcefire, Inc.Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session
US20080208987A1 (en)*2007-02-262008-08-28Red Hat, Inc.Graphical spam detection and filtering
US20080222724A1 (en)*2006-11-082008-09-11Ormazabal Gaston SPREVENTION OF DENIAL OF SERVICE (DoS) ATTACKS ON SESSION INITIATION PROTOCOL (SIP)-BASED SYSTEMS USING RETURN ROUTABILITY CHECK FILTERING
US20080229415A1 (en)*2005-07-012008-09-18Harsh KapoorSystems and methods for processing data flows
US20080235370A1 (en)*2007-03-212008-09-25Somansa Co., Ltd.Method and System for Controlling Network Traffic of P2P and Instant Messenger Softwares
US20080244741A1 (en)*2005-11-142008-10-02Eric GustafsonIntrusion event correlation with network discovery information
US20080262991A1 (en)*2005-07-012008-10-23Harsh KapoorSystems and methods for processing data flows
US20080262990A1 (en)*2000-09-252008-10-23Harsh KapoorSystems and methods for processing data flows
US20080276319A1 (en)*2007-04-302008-11-06Sourcefire, Inc.Real-time user awareness for a computer network
US20080313011A1 (en)*2007-06-152008-12-18Robert RoseOnline marketing platform
US20080313040A1 (en)*2007-06-152008-12-18Robert RoseContent distribution system including cost-per-engagement based advertising
US20090006841A1 (en)*2007-06-292009-01-01Verizon Services Corp.System and method for testing network firewall for denial-of-service (dos) detection and prevention in signaling channel
US20090007220A1 (en)*2007-06-292009-01-01Verizon Services Corp.Theft of service architectural integrity validation tools for session initiation protocol (sip)-based systems
US20090064335A1 (en)*2007-09-052009-03-05Yahoo! Inc.Instant messaging malware protection
WO2009027798A1 (en)*2007-08-302009-03-05Nokia CorporationSystem and method for parallel scanning
US20090083845A1 (en)*2003-10-032009-03-26Verizon Services Corp.Network firewall test methods and apparatus
US20090089359A1 (en)*2007-09-272009-04-02Rockwell Automation Technologies, Inc.Subscription and notification in industrial systems
US20090089233A1 (en)*2007-09-282009-04-02Rockwell Automation Technologies, Inc.Correlation of non-times series events in industrial systems
WO2009045299A1 (en)*2007-10-032009-04-09Virtela Communications, Inc.Virtualized application acceleration infrastructure
WO2009049275A1 (en)*2007-10-122009-04-16Symantec CorporationMethod for detecting and resolving hidden text salting
US20090106838A1 (en)*2007-10-232009-04-23Adam Thomas ClarkBlocking Intrusion Attacks at an Offending Host
US20090112651A1 (en)*2007-10-312009-04-30American Express Travel Reated Services CompanyLatency locator
US20090138794A1 (en)*2007-11-272009-05-28Joseph BeckerSystem and method for securing web applications
US20090150374A1 (en)*2007-12-072009-06-11International Business Machines CorporationSystem, method and program product for detecting sql queries injected into data fields of requests made to applications
US20090150972A1 (en)*2007-12-072009-06-11Moon Yong-HyukApparatus and method for managing p2p traffic
US20090158434A1 (en)*2007-12-182009-06-18Samsung S.D.S. Co., Ltd.Method of detecting virus infection of file
US20090154363A1 (en)*2007-12-182009-06-18Josh StephensMethod of resolving network address to host names in network flows for network device
US20090157473A1 (en)*2007-12-182009-06-18Att Knowledge Ventures L.P.System and method for sending targeted marketing data using proximity data
US20090177768A1 (en)*2008-01-092009-07-09International Business Machines CorporationSystems, methods and computer program products for extracting port-level information of web services with flow-based network monitoring
US20090190479A1 (en)*2007-05-142009-07-30Brian ParsonsMethods, systems and apparatus for monitoring and/or generating communications in a communications network
US20090216841A1 (en)*2008-02-212009-08-27Yahoo! Inc.Identifying ip addresses for spammers
JP2009225084A (en)*2008-03-172009-10-01Mitsubishi Electric CorpInformation leak testing device, computer program, and method of testing information leak
US20090252041A1 (en)*2008-04-032009-10-08Alcatel LucentOptimized statistics processing in integrated DPI service-oriented router deployments
US20090271730A1 (en)*2007-11-302009-10-29Robert RoseSystem and method for conducting online campaigns
US20090288141A1 (en)*2008-05-192009-11-19Microsoft CorporationPre-emptive pre-indexing of sensitive and vulnerable assets
US20090285225A1 (en)*2008-05-162009-11-19Dahod Ashraf MProviding trigger based traffic management
US20090287618A1 (en)*2008-05-192009-11-19Yahoo! Inc.Distributed personal spam filtering
US20090293114A1 (en)*2008-05-202009-11-26Shakeel MustafaDiversity string based pattern matching
US20090300156A1 (en)*2008-05-312009-12-03Ramachandra YalakantiMethods And Systems For Managing Security In A Network
US20090313276A1 (en)*2008-06-172009-12-17Fujitsu LimitedProcess and device for data conversion, and computer-readable recording medium storing data conversion program
WO2009154947A2 (en)2008-05-282009-12-23Zscaler, Inc.Security message processing
US20090328193A1 (en)*2007-07-202009-12-31Hezi MooreSystem and Method for Implementing a Virtualized Security Platform
US20090327943A1 (en)*2008-06-262009-12-31Microsoft CorporationIdentifying application program threats through structural analysis
DE102008030125A1 (en)*2008-06-272010-01-14Klüver, Christina, Dr.Electronically stored text evaluating and searching method, involves assigning search words to neuron such that combining weights depends in frequency of search word in text with neuronal network, and calculating end activation of networks
US20100036786A1 (en)*2008-08-082010-02-11Yahoo! Inc.Real-time ad-hoc spam filtering of email
US20100042565A1 (en)*2000-09-252010-02-18Crossbeam Systems, Inc.Mezzazine in-depth data analysis facility
US20100058457A1 (en)*2003-10-032010-03-04Verizon Services Corp.Methodology, Measurements and Analysis of Performance and Scalability of Stateful Border Gateways
US20100058475A1 (en)*2008-08-262010-03-04Nec Laboratories America, Inc.Feedback-guided fuzz testing for learning inputs of coma
US20100071024A1 (en)*2008-09-122010-03-18Juniper Networks, Inc.Hierarchical application of security services within a computer network
US20100073202A1 (en)*2008-09-252010-03-25Mazed Mohammad APortable internet appliance
US20100077040A1 (en)*2008-09-192010-03-25Yahoo! Inc.Detection of outbound sending of spam
US20100083121A1 (en)*2008-09-292010-04-01Kabushiki Kaisha ToshibaSystem and method for evaluating multiple connectivity options
US20100094849A1 (en)*2007-08-172010-04-15Robert RoseSystems and methods for creating user generated content incorporating content from a content catalog
US20100095367A1 (en)*2008-10-092010-04-15Juniper Networks, Inc.Dynamic access control policy with port restrictions for a network security appliance
US20100107254A1 (en)*2008-10-292010-04-29Eiland Edward ENetwork intrusion detection using mdl compress for deep packet inspection
US7716742B1 (en)2003-05-122010-05-11Sourcefire, Inc.Systems and methods for determining characteristics of a network and analyzing vulnerabilities
US20100122345A1 (en)*2008-11-072010-05-13Chunghwa Telecom Co., Ltd.Control system and protection method for integrated information security services
US20100138925A1 (en)*2007-05-242010-06-03Bikash BaraiMethod and system simulating a hacking attack on a network
US20100145900A1 (en)*2008-12-042010-06-10Yahoo! Inc.Spam filtering based on statistics and token frequency modeling
US20100150006A1 (en)*2008-12-172010-06-17Telefonaktiebolaget L M Ericsson (Publ)Detection of particular traffic in communication networks
US20100153316A1 (en)*2008-12-162010-06-17At&T Intellectual Property I, LpSystems and methods for rule-based anomaly detection on ip network flow
US20100161537A1 (en)*2008-12-232010-06-24At&T Intellectual Property I, L.P.System and Method for Detecting Email Spammers
US20100162399A1 (en)*2008-12-182010-06-24At&T Intellectual Property I, L.P.Methods, apparatus, and computer program products that monitor and protect home and small office networks from botnet and malware activity
US20100205579A1 (en)*2008-12-302010-08-12Keliang ZhaoApplication Design And Data Flow Analysis
US20100211645A1 (en)*2009-02-182010-08-19Yahoo! Inc.Identification of a trusted message sender with traceable receipts
US20100217783A1 (en)*2009-02-132010-08-26Ab Initio Technology LlcCommunicating with data storage systems
US20100218134A1 (en)*2009-02-262010-08-26Oracle International CorporationTechniques for semantic business policy composition
US20100235914A1 (en)*2009-03-132010-09-16Alcatel LucentIntrusion detection for virtual layer-2 services
US20100235909A1 (en)*2009-03-132010-09-16Silver Tail SystemsSystem and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Velocity Analysis
US20100235908A1 (en)*2009-03-132010-09-16Silver Tail SystemsSystem and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Analysis
US20100250918A1 (en)*2009-03-272010-09-30Neuralitc SystemsMethod and system for identifying an application type of encrypted traffic
US20100287613A1 (en)*2009-05-082010-11-11Microsoft CorporationSanitization of packets
US20100293618A1 (en)*2009-05-122010-11-18Microsoft CorporationRuntime analysis of software privacy issues
US20100332601A1 (en)*2009-06-262010-12-30Walter Jason DReal-time spam look-up system
US20110106937A1 (en)*2009-10-292011-05-05Fluke CorporationMixed-mode analysis
US20110145887A1 (en)*2009-12-142011-06-16At&T Intellectual Property I, L.P.System and Method of Selectively Applying Security Measures to Data Services
US20110145748A1 (en)*2009-12-142011-06-16Ab Initio Technology LlcSpecifying user interface elements
WO2011073983A1 (en)2009-12-152011-06-23Seeker Security Ltd.Methods and systems of detecting and analyzing correlated operations in a common storage
US20110149746A1 (en)*2009-12-212011-06-23Electronics And Telecommunications Research InstituteApparatus and method of monitoring packet stream in router using packet identity checking
US20110149736A1 (en)*2005-04-272011-06-23Extreme Networks, Inc.Integrated methods of performing network switch functions
US20110208875A1 (en)*2010-02-242011-08-25Crescendo Networks Ltd.Reducing energy consumption of servers
US20110213869A1 (en)*2000-09-252011-09-01Yevgeny KorsunskyProcessing data flows with a data flow processor
US20110214157A1 (en)*2000-09-252011-09-01Yevgeny KorsunskySecuring a network with data flow processing
US20110219035A1 (en)*2000-09-252011-09-08Yevgeny KorsunskyDatabase security via data flow processing
US8024473B1 (en)*2007-07-192011-09-20Mcafee, Inc.System, method, and computer program product to automate the flagging of obscure network flows as at least potentially unwanted
WO2011127158A1 (en)*2010-04-062011-10-13Justone Database, Inc.Data storage and/or retrieval based on a database model-agnostic, schema-agnostic and workload-agnostic data strorage and access models
US8041641B1 (en)*2006-12-192011-10-18Symantec Operating CorporationBackup service and appliance with single-instance storage of encrypted data
US8042185B1 (en)*2007-09-272011-10-18Netapp, Inc.Anti-virus blade
US20110271341A1 (en)*2010-04-282011-11-03Symantec CorporationBehavioral signature generation using clustering
US20110296527A1 (en)*2005-01-102011-12-01Mcafee, Inc.Integrated firewall, ips, and virus scanner system and method
US20110295894A1 (en)*2010-05-272011-12-01Samsung Sds Co., Ltd.System and method for matching pattern
US20110296003A1 (en)*2010-06-012011-12-01Microsoft CorporationUser account behavior techniques
US20120030202A1 (en)*2010-02-262012-02-02Oracle International CorporationTechniques for analyzing data from multiple sources
US8112800B1 (en)2007-11-082012-02-07Juniper Networks, Inc.Multi-layered application classification and decoding
US8117657B1 (en)*2007-06-202012-02-14Extreme Networks, Inc.Detection and mitigation of rapidly propagating threats from P2P, IRC and gaming
WO2012047885A1 (en)*2010-10-042012-04-12Openwave Systems Inc.Method and system for dynamic traffic steering
US20120110086A1 (en)*2010-11-022012-05-03International Business Machines CorporationEnsemble having one or more computing systems and a controller thereof
US20120123945A1 (en)*2010-11-172012-05-17Inside SecureNfc transaction method and system
US20120131674A1 (en)*2010-11-182012-05-24Raptor Networks Technology, Inc.Vector-Based Anomaly Detection
US20120144014A1 (en)*2010-12-012012-06-07Cisco Technology, Inc.Directing data flows in data centers with clustering services
US20120159629A1 (en)*2010-12-162012-06-21National Taiwan University Of Science And TechnologyMethod and system for detecting malicious script
US20120174222A1 (en)*2010-12-302012-07-05Yunfeng PengMethod for the safety of network terminal devices
US20120185614A1 (en)*2006-10-262012-07-19Reed Coke SNetwork Interface for Use in Parallel Computing Systems
US8239948B1 (en)*2008-12-192012-08-07Symantec CorporationSelecting malware signatures to reduce false-positive detections
US8272055B2 (en)2008-10-082012-09-18Sourcefire, Inc.Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
US8291495B1 (en)*2007-08-082012-10-16Juniper Networks, Inc.Identifying applications for intrusion detection systems
US20120271964A1 (en)*2011-04-202012-10-25Blue Coat Systems, Inc.Load Balancing for Network Devices
US20120317647A1 (en)*2011-05-262012-12-13Carnegie Mellon UniversityAutomated Exploit Generation
US8339959B1 (en)2008-05-202012-12-25Juniper Networks, Inc.Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane
US20130064077A1 (en)*2011-09-132013-03-14Hitachi, Ltd.Node apparatus, system, and packet processing method
US8418249B1 (en)*2011-11-102013-04-09Narus, Inc.Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats
US8433790B2 (en)2010-06-112013-04-30Sourcefire, Inc.System and method for assigning network blocks to sensors
US20130133064A1 (en)*2011-11-232013-05-23Cavium, Inc.Reverse nfa generation and processing
US20130160129A1 (en)*2011-12-192013-06-20Verizon Patent And Licensing Inc.System security evaluation
US8474043B2 (en)2008-04-172013-06-25Sourcefire, Inc.Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing
US20130167234A1 (en)*2010-09-092013-06-27Siemens AktiengesellschaftMethod for Processing Messages in a Communication Network Comprising a Plurality of Network Nodes
US20130179531A1 (en)*2012-01-102013-07-11Daisuke SakaiNetwork communications apparatus, method, and medium
US20130185795A1 (en)*2012-01-122013-07-18Arxceo CorporationMethods and systems for providing network protection by progressive degradation of service
US20130195117A1 (en)*2010-11-292013-08-01Huawei Technologies Co., LtdParameter acquisition method and device for general protocol parsing and general protocol parsing method and device
US8509071B1 (en)2010-10-062013-08-13Juniper Networks, Inc.Multi-dimensional traffic management
US20130247183A1 (en)*2010-08-132013-09-19Mcafee, Inc.System, method, and computer program product for preventing a modification to a domain name system setting
US20130276112A1 (en)*2008-04-292013-10-17Gregory William DalcherSystem, method, and computer program product for dynamically adjusting a level of security applied to a system
US8601034B2 (en)2011-03-112013-12-03Sourcefire, Inc.System and method for real time data awareness
US8612371B1 (en)*2007-07-132013-12-17Larry J. WerthComputing device and method using associative pattern memory using recognition codes for input patterns
US20130339545A1 (en)*2011-02-242013-12-19The University Of TulsaNetwork-based hyperspeed communication and defense
US8615785B2 (en)2005-12-302013-12-24Extreme Network, Inc.Network threat detection and mitigation
US20130347114A1 (en)*2012-04-302013-12-26Verint Systems Ltd.System and method for malware detection
US8631497B1 (en)*2007-02-012014-01-14Mcafee, Inc.Systems and methods for automating blind detection of computational vulnerabilities
US8671182B2 (en)2010-06-222014-03-11Sourcefire, Inc.System and method for resolving operating system or service identity conflicts
US8676729B1 (en)*2011-06-142014-03-18Narus, Inc.Network traffic classification using subspace clustering techniques
US8677486B2 (en)2010-04-162014-03-18Sourcefire, Inc.System and method for near-real time network attack detection, and system and method for unified detection via detection routing
US20140101301A1 (en)*2012-10-042014-04-10Stateless Networks, Inc.System and Method for Dynamic Management of Network Device Data
US8726394B2 (en)2009-12-152014-05-13Seeker Security Ltd.Method and system of runtime analysis
US8726338B2 (en)2012-02-022014-05-13Juniper Networks, Inc.Dynamic threat protection in mobile networks
US20140181312A1 (en)*2010-09-242014-06-26Nexios ItSystems and Methods for Peer-to-Peer IMS
US8769685B1 (en)*2010-02-032014-07-01Symantec CorporationSystems and methods for using file paths to identify potentially malicious computer files
US20140195749A1 (en)*2013-01-102014-07-10Pure Storage, Inc.Deduplication of Volume Regions
US20140201828A1 (en)*2012-11-192014-07-17Samsung Sds Co., Ltd.Anti-malware system, method of processing packet in the same, and computing device
US20140237137A1 (en)*2013-02-182014-08-21Cisco Technology, Inc.System for distributing flow to distributed service nodes using a unified application identifier
US20140245422A1 (en)*2009-11-302014-08-28Iwebgate Technology LimitedSystem and method for network virtualization and security using computer systems and software
WO2014137416A1 (en)*2013-03-082014-09-12The Trustees Of Columbia University In The City Of New YorkIdentification of backdoors and backdoor triggers
US20140304770A1 (en)*2010-12-302014-10-09Korea University Research And Business FoundationTerminal
US8874572B1 (en)*2007-07-312014-10-28Megree, Inc.Method and computer program product for operating a social networking site
US20140330849A1 (en)*2007-02-242014-11-06Trend Micro IncorporatedFast identification of complex strings in a data stream
US8898096B2 (en)2011-05-312014-11-25Oracle International CorporationApplication configuration generation
US8918512B2 (en)2010-11-022014-12-23International Business Machines CorporationManaging a workload of a plurality of virtual servers of a computing environment
US8931087B1 (en)*2008-12-032015-01-06Verizon Patent And Licensing Inc.Reconfigurable virtualized remote computer security system
US20150026794A1 (en)*2013-07-182015-01-22Palo Alto Networks, Inc.Packet classification for network routing
US8954309B2 (en)2011-05-312015-02-10Oracle International CorporationTechniques for application tuning
US8966020B2 (en)2010-11-022015-02-24International Business Machines CorporationIntegration of heterogeneous computing systems into a hybrid computing system
US9054952B2 (en)*2013-03-152015-06-09Extrahop Networks, Inc.Automated passive discovery of applications
US9071635B1 (en)*2011-10-192015-06-30Wichorus, Inc.Methods and apparatus for identifying paging activities during idle mode
US9069930B1 (en)*2011-03-292015-06-30Emc CorporationSecurity information and event management system employing security business objects and workflows
US9081613B2 (en)2010-11-022015-07-14International Business Machines CorporationUnified resource manager providing a single point of control
US20150200962A1 (en)*2012-06-042015-07-16The Board Of Regents Of The University Of Texas SystemMethod and system for resilient and adaptive detection of malicious websites
US20150213730A1 (en)*2008-02-192015-07-30Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US9171160B2 (en)2013-09-302015-10-27Fireeye, Inc.Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US9191288B2 (en)2013-03-152015-11-17Extrahop Networks, Inc.Trigger based recording of flows with play back
US9189627B1 (en)2013-11-212015-11-17Fireeye, Inc.System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
US9195829B1 (en)2013-02-232015-11-24Fireeye, Inc.User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US9202049B1 (en)2010-06-212015-12-01Pulse Secure, LlcDetecting malware on mobile devices
US9210181B1 (en)*2014-05-262015-12-08Solana Networks Inc.Detection of anomaly in network flow data
US20150358345A1 (en)*2014-06-092015-12-10Meadow Hills, LLCActive attack detection system
US9237171B2 (en)2011-08-172016-01-12Mcafee, Inc.System and method for indirect interface monitoring and plumb-lining
US9253016B2 (en)2010-11-022016-02-02International Business Machines CorporationManagement of a data network of a computing environment
US9251343B1 (en)2013-03-152016-02-02Fireeye, Inc.Detecting bootkits resident on compromised computers
US9251535B1 (en)2012-01-052016-02-02Juniper Networks, Inc.Offload of data transfer statistics from a mobile access gateway
US9275336B2 (en)2013-12-312016-03-01Cavium, Inc.Method and system for skipping over group(s) of rules based on skip group rule
US9294442B1 (en)*2015-03-302016-03-22Varmour Networks, Inc.System and method for threat-driven security policy controls
US9298925B1 (en)*2013-03-082016-03-29Ca, Inc.Supply chain cyber security auditing systems, methods and computer program products
US20160094565A1 (en)*2014-09-292016-03-31Juniper Networks, Inc.Targeted attack discovery
US9338147B1 (en)2015-04-242016-05-10Extrahop Networks, Inc.Secure communication secret sharing
US9344366B2 (en)2011-08-022016-05-17Cavium, Inc.System and method for rule matching in a processor
US9374383B2 (en)*2014-10-212016-06-21Cisco Technology, Inc.Events from network flows
US9374342B2 (en)2005-11-082016-06-21Verizon Patent And Licensing Inc.System and method for testing network firewall using fine granularity measurements
US20160180090A1 (en)*2014-12-232016-06-23Mcafee, Inc.Execution profiling detection of malicious objects
US9380027B1 (en)2015-03-302016-06-28Varmour Networks, Inc.Conditional declarative policies
US9398033B2 (en)2011-02-252016-07-19Cavium, Inc.Regular expression processing automaton
US9398043B1 (en)2009-03-242016-07-19Juniper Networks, Inc.Applying fine-grain policy action to encapsulated network attacks
US9400958B2 (en)2010-06-302016-07-26Oracle International CorporationTechniques for display of information related to policies
US9419943B2 (en)2013-12-302016-08-16Cavium, Inc.Method and apparatus for processing of finite automata
US9426165B2 (en)2013-08-302016-08-23Cavium, Inc.Method and apparatus for compilation of finite automata
US9426166B2 (en)2013-08-302016-08-23Cavium, Inc.Method and apparatus for processing finite automata
US9426167B1 (en)*2015-11-162016-08-23International Business Machines CorporationManagement of decommissioned server assets in a shared data environment
US20160246986A1 (en)*2015-02-192016-08-25International Business Machines CorporationCode analysis for providing data privacy in etl systems
US20160248882A1 (en)*2013-06-272016-08-25Hitachi, Ltd.Management system and method
US9432394B1 (en)*2015-03-162016-08-30IxiaMethods, systems, and computer readable media for converging on network protocol stack vulnerabilities using fuzzing variables, vulnerability ratings and progressive convergence
US9432389B1 (en)*2014-03-312016-08-30Fireeye, Inc.System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US9438634B1 (en)*2015-03-132016-09-06Varmour Networks, Inc.Microsegmented networks that implement vulnerability scanning
US9438561B2 (en)2014-04-142016-09-06Cavium, Inc.Processing of finite automata based on a node cache
US20160259864A1 (en)*2013-11-062016-09-08Japan Science And Technology AgencyFluid transition route acquisition apparatus, fluid transition route acquisition method, and program
US9442881B1 (en)2011-08-312016-09-13Yahoo! Inc.Anti-spam transient entity classification
US9449034B2 (en)2009-01-072016-09-20Oracle International CorporationGeneric ontology based semantic business policy engine
US20160294875A1 (en)*2015-03-302016-10-06Varmour Networks, Inc.System and method for threat-driven security policy controls
US9467476B1 (en)2015-03-132016-10-11Varmour Networks, Inc.Context aware microsegmentation
US9473529B2 (en)2006-11-082016-10-18Verizon Patent And Licensing Inc.Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using method vulnerability filtering
US20160308729A1 (en)*2015-04-172016-10-20The Boeing CompanyMethods and systems for improved computer network analysis
US9483317B1 (en)2015-08-172016-11-01Varmour Networks, Inc.Using multiple central processing unit cores for packet forwarding in virtualized networks
US9483742B1 (en)*2014-10-272016-11-01Amazon Technologies, Inc.Intelligent traffic analysis to detect malicious activity
US9497100B2 (en)2014-05-052016-11-15IxiaMethods, systems, and computer readable media for providing fuzz testing functionality
US9507563B2 (en)2013-08-302016-11-29Cavium, Inc.System and method to traverse a non-deterministic finite automata (NFA) graph generated for regular expression patterns with advanced features
US9521115B1 (en)2016-03-242016-12-13Varmour Networks, Inc.Security policy generation using container metadata
US9525697B2 (en)2015-04-022016-12-20Varmour Networks, Inc.Delivering security functions to distributed networks
US9525696B2 (en)2000-09-252016-12-20Blue Coat Systems, Inc.Systems and methods for processing data flows
US20160380938A1 (en)*2012-10-092016-12-29Whatsapp Inc.System and method for detecting unwanted content
US9544402B2 (en)2013-12-312017-01-10Cavium, Inc.Multi-rule approach to encoding a group of rules
US9560081B1 (en)2016-06-242017-01-31Varmour Networks, Inc.Data network microsegmentation
US20170031611A1 (en)*2015-07-272017-02-02International Business Machines CorporationRegular expression matching with back-references using backtracking
KR101703446B1 (en)*2015-10-152017-02-06숭실대학교산학협력단Network capable of detection DoS attacks and Method for controlling thereof, Gateway and Managing server comprising the network
US20170048272A1 (en)*2014-04-252017-02-16Securebrain CorporationFraud detection network system and fraud detection method
US9578055B1 (en)*2008-01-252017-02-21F5 Networks, Inc.Thwarting drone-waged denial of service attacks on a network
US20170063907A1 (en)*2015-08-312017-03-02Splunk Inc.Multi-Stage Network Security Threat Detection
US20170078152A1 (en)*2015-09-142017-03-16Huawei Technologies Canada Co., Ltd.Dedicated Protection for Virtual Network Embedding
US9602532B2 (en)2014-01-312017-03-21Cavium, Inc.Method and apparatus for optimizing finite automata processing
US9609026B2 (en)2015-03-132017-03-28Varmour Networks, Inc.Segmented networks that implement scanning
US9609083B2 (en)2011-02-102017-03-28Varmour Networks, Inc.Distributed service processing of network gateways using virtual machines
US20170111391A1 (en)*2015-10-152017-04-20International Business Machines CorporationEnhanced intrusion prevention system
WO2017074402A1 (en)*2015-10-292017-05-04Cloudcoffer LlcMethods for preventing computer attacks in two-phase filtering and apparatuses using the same
US9652616B1 (en)*2011-03-142017-05-16Symantec CorporationTechniques for classifying non-process threats
US9660879B1 (en)2016-07-252017-05-23Extrahop Networks, Inc.Flow deduplication across a cluster of network monitoring devices
US9665458B2 (en)2011-06-012017-05-30Data Security Solutions, LlcMethod and system for providing information from third party applications to devices
US9667446B2 (en)2014-01-082017-05-30Cavium, Inc.Condition code approach for comparing rule and packet data that are provided in portions
US9680852B1 (en)2016-01-292017-06-13Varmour Networks, Inc.Recursive multi-layer examination for computer network security remediation
US9729416B1 (en)2016-07-112017-08-08Extrahop Networks, Inc.Anomaly detection using device relationship graphs
US9734037B1 (en)*2009-09-152017-08-15Symantec CorporationMobile application sampling for performance and network behavior profiling
WO2017145001A1 (en)2016-02-232017-08-31nChain Holdings LimitedReactive and pre-emptive security system for the protection of computer networks & systems
US9762599B2 (en)2016-01-292017-09-12Varmour Networks, Inc.Multi-node affinity-based examination for computer network security remediation
US9774520B1 (en)2008-10-202017-09-26Juniper Networks, Inc.Service aware path selection with a network acceleration device
US20170279849A1 (en)*2016-03-242017-09-28Cisco Technology, Inc.Constraint-aware resource synchronization across hyper-distributed learning systems
US20170279839A1 (en)*2016-03-252017-09-28Cisco Technology, Inc.Network-based approach for training supervised learning classifiers
US9787639B1 (en)2016-06-242017-10-10Varmour Networks, Inc.Granular segmentation using events
US20170301013A1 (en)*2016-04-152017-10-19Adp, LlcManagement of Payroll Lending Within an Enterprise System
US9800608B2 (en)2000-09-252017-10-24Symantec CorporationProcessing data flows with a data flow processor
US9800592B2 (en)*2014-08-042017-10-24Microsoft Technology Licensing, LlcData center architecture that supports attack detection and mitigation
US9811233B2 (en)2013-02-122017-11-07Ab Initio Technology LlcBuilding applications for configuring processes
US9838757B2 (en)*2007-04-172017-12-05Thomson LicensingMethod to transmit video data in a data stream and associated metadata
US20180026997A1 (en)*2016-07-212018-01-25Level 3 Communications, LlcSystem and method for voice security in a telecommunications network
US9880536B1 (en)*2009-05-042018-01-30Cypress Semiconductor CorporationAutonomous control in a programmable system
US9904630B2 (en)2014-01-312018-02-27Cavium, Inc.Finite automata processing based on a top of stack (TOS) memory
US20180062922A1 (en)*2016-08-262018-03-01Brocade Communications Systems, Inc.Application launcher and management framework for a network device
US9912684B1 (en)2004-04-012018-03-06Fireeye, Inc.System and method for virtual analysis of network data
US9917924B2 (en)2015-03-162018-03-13Keysight Technologies Singapore (Holdings) Pte. Ltd.Methods, systems, and computer readable media for simplistic visual representation of complex interdependent network protocol fields for network protocol fuzzing and graphical framework for reporting instantaneous system level progress
US20180077037A1 (en)*2016-09-092018-03-15Hewlett Packard Enterprise Development LpVerify a network function by inquiring a model using a query language
US9923913B2 (en)2013-06-042018-03-20Verint Systems Ltd.System and method for malware detection learning
US9967292B1 (en)2017-10-252018-05-08Extrahop Networks, Inc.Inline secret sharing
US9973472B2 (en)2015-04-022018-05-15Varmour Networks, Inc.Methods and systems for orchestrating physical and virtual switches to enforce security boundaries
US20180167403A1 (en)*2016-12-122018-06-14Ut Battelle, LlcMalware analysis and recovery
US10002326B2 (en)2014-04-142018-06-19Cavium, Inc.Compilation of finite automata based on memory hierarchy
US10007786B1 (en)*2015-11-282018-06-26Symantec CorporationSystems and methods for detecting malware
US20180183823A1 (en)*2016-12-282018-06-28Samsung Electronics Co., Ltd.Apparatus for detecting anomaly and operating method for the same
US10038611B1 (en)2018-02-082018-07-31Extrahop Networks, Inc.Personalization of alerts based on network monitoring
US10063434B1 (en)2017-08-292018-08-28Extrahop Networks, Inc.Classifying applications or activities based on network behavior
US20180248904A1 (en)*2017-02-242018-08-30LogRhythm Inc.Analytics for processing information system data
US10075416B2 (en)2015-12-302018-09-11Juniper Networks, Inc.Network session data sharing
US10083624B2 (en)2015-07-282018-09-25Architecture Technology CorporationReal-time monitoring of network-based training exercises
US10091238B2 (en)2014-02-112018-10-02Varmour Networks, Inc.Deception using distributed threat detection
US10110558B2 (en)2014-04-142018-10-23Cavium, Inc.Processing of finite automata based on memory hierarchy
US10116679B1 (en)2018-05-182018-10-30Extrahop Networks, Inc.Privilege inference and monitoring based on network behavior
US10142426B2 (en)2015-03-292018-11-27Verint Systems Ltd.System and method for identifying communication session participants based on traffic patterns
US10164861B2 (en)2015-12-282018-12-25Silver Peak Systems, Inc.Dynamic monitoring and visualization for network health characteristics
US10178070B2 (en)2015-03-132019-01-08Varmour Networks, Inc.Methods and systems for providing security to distributed microservices
US10191758B2 (en)2015-12-092019-01-29Varmour Networks, Inc.Directing data traffic between intra-server virtual machines
US10193929B2 (en)2015-03-132019-01-29Varmour Networks, Inc.Methods and systems for improving analytics in distributed networks
US10198427B2 (en)2013-01-292019-02-05Verint Systems Ltd.System and method for keyword spotting using representative dictionary
US10204211B2 (en)2016-02-032019-02-12Extrahop Networks, Inc.Healthcare operations with passive network monitoring
US10257082B2 (en)*2017-02-062019-04-09Silver Peak Systems, Inc.Multi-level learning for classifying traffic flows
US10263863B2 (en)2017-08-112019-04-16Extrahop Networks, Inc.Real-time configuration discovery and management
US10264025B2 (en)2016-06-242019-04-16Varmour Networks, Inc.Security policy generation for virtualization, bare-metal server, and cloud computing environments
US10264003B1 (en)2018-02-072019-04-16Extrahop Networks, Inc.Adaptive network monitoring with tuneable elastic granularity
US10313930B2 (en)2008-07-032019-06-04Silver Peak Systems, Inc.Virtual wide area network overlays
US10320749B2 (en)*2016-11-072019-06-11Nicira, Inc.Firewall rule creation in a virtualized computing environment
US10325094B2 (en)*2014-08-282019-06-18Mitsubishi Electric CorporationProcess analysis apparatus, process analysis method, and process analysis for determining input/output relation of a block of execution trace to detect potential malware
US10326551B2 (en)2016-08-192019-06-18Silver Peak Systems, Inc.Forward packet recovery with constrained network overhead
US10333854B2 (en)*2015-01-042019-06-25Huawei Technologies Co., Ltd.Method and apparatus for detecting type of network data flow
US10356044B2 (en)2014-03-172019-07-16Fortinet, Inc.Security information and event management
US10375098B2 (en)*2017-01-312019-08-06Splunk Inc.Anomaly detection based on relationships between multiple time series
US10389574B1 (en)2018-02-072019-08-20Extrahop Networks, Inc.Ranking alerts based on network monitoring
US10387804B2 (en)2014-09-302019-08-20BoonLogicImplementations of, and methods of use for a pattern memory engine applying associative pattern memory for pattern recognition
US10411978B1 (en)2018-08-092019-09-10Extrahop Networks, Inc.Correlating causes and effects associated with network activity
US10432650B2 (en)2016-03-312019-10-01Stuart StanifordSystem and method to protect a webserver against application exploits and attacks
US10432484B2 (en)2016-06-132019-10-01Silver Peak Systems, Inc.Aggregating select network traffic statistics
US10454894B2 (en)*2015-11-172019-10-22Cyber Adapt, Inc.Cyber threat attenuation using multi-source threat data analysis
US10476673B2 (en)2017-03-222019-11-12Extrahop Networks, Inc.Managing session secrets for continuous packet capture systems
US10491609B2 (en)2016-10-102019-11-26Verint Systems Ltd.System and method for generating data sets for learning to identify user actions
US10515214B1 (en)2013-09-302019-12-24Fireeye, Inc.System and method for classifying malware within content created during analysis of a specimen
US20200014712A1 (en)*2018-07-062020-01-09International Business Machines CorporationDual-port mirroring system for analyzing non-stationary data in a network
US10542071B1 (en)*2016-09-272020-01-21Amazon Technologies, Inc.Event driven health checks for non-HTTP applications
US10546008B2 (en)2015-10-222020-01-28Verint Systems Ltd.System and method for maintaining a dynamic dictionary
US10560842B2 (en)2015-01-282020-02-11Verint Systems Ltd.System and method for combined network-side and off-air monitoring of wireless networks
US10567413B2 (en)*2015-04-172020-02-18Centripetal Networks, Inc.Rule-based network-threat detection
US10587632B1 (en)*2017-09-282020-03-10Amazon Technologies, Inc.Neural network-based malware detection
US10594718B1 (en)2018-08-212020-03-17Extrahop Networks, Inc.Managing incident response operations based on monitored network activity
US20200106793A1 (en)*2018-10-022020-04-02Olympus Infotech, LLCMethods, systems, and computer program products for continuous cyber risk monitoring
US10614107B2 (en)2015-10-222020-04-07Verint Systems Ltd.System and method for keyword searching using both static and dynamic dictionaries
US10623800B2 (en)2018-07-162020-04-14Gracenote, Inc.Dynamic control of fingerprinting rate to facilitate time-accurate revision of media content
US10621314B2 (en)*2016-08-012020-04-14Palantir Technologies Inc.Secure deployment of a software package
US10630588B2 (en)2014-07-242020-04-21Verint Systems Ltd.System and method for range matching
US10637721B2 (en)2018-03-122020-04-28Silver Peak Systems, Inc.Detecting path break conditions while minimizing network overhead
US10659484B2 (en)*2018-02-192020-05-19Cisco Technology, Inc.Hierarchical activation of behavioral modules on a data plane for behavioral analytics
US10666676B1 (en)*2014-08-182020-05-26Trend Micro IncorporatedDetection of targeted email attacks
US20200175370A1 (en)*2018-11-302020-06-04International Business Machines CorporationDecentralized distributed deep learning
FR3090153A1 (en)*2018-12-172020-06-19Commissariat A L'energie Atomique Et Aux Energies Alternatives Anomaly detection method and system in a telecommunications network
US10719588B2 (en)2014-09-052020-07-21Silver Peak Systems, Inc.Dynamic monitoring and authorization of an optimization device
US10742530B1 (en)2019-08-052020-08-11Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US10742677B1 (en)2019-09-042020-08-11Extrahop Networks, Inc.Automatic determination of user roles and asset types based on network monitoring
US10749905B2 (en)*2017-07-312020-08-18Amdocs Development LimitedSystem, method, and computer program providing security in network function virtualization (NFV) based communication networks and software defined networks (SDNS)
US10755334B2 (en)2016-06-302020-08-25Varmour Networks, Inc.Systems and methods for continually scoring and segmenting open opportunities using client data and product predictors
US10764323B1 (en)*2015-12-212020-09-01Amdocs Development LimitedSystem, method, and computer program for isolating services of a communication network in response to a distributed denial of service (DDoS) attack
US10771394B2 (en)*2017-02-062020-09-08Silver Peak Systems, Inc.Multi-level learning for classifying traffic flows on a first packet from DNS data
US10769727B1 (en)*2013-07-112020-09-08Liberty Mutual Insurance CompanyHome telematics devices and insurance applications
US20200286131A1 (en)*2019-03-042020-09-10Iris.Tv, Inc.Dual-optimization of targeted digital assets under volume and position constraints
US10776427B2 (en)*2014-09-262020-09-15British Telecommunications Public Limited CompanyEfficient conditional state mapping in a pattern matching automaton
US10785108B1 (en)*2018-06-212020-09-22Wells Fargo Bank, N.A.Intelligent learning and management of a networked architecture
CN111695115A (en)*2020-05-252020-09-22武汉大学Industrial control system network attack tracing method based on communication delay and security evaluation
US10805840B2 (en)2008-07-032020-10-13Silver Peak Systems, Inc.Data transmission via a virtual wide area network overlay
CN111767198A (en)*2020-06-232020-10-13中国工商银行股份有限公司System risk prediction method and device based on classification label sequence matching
US10803766B1 (en)2015-07-282020-10-13Architecture Technology CorporationModular training of network-based training exercises
US10812361B2 (en)2014-07-302020-10-20Silver Peak Systems, Inc.Determining a transit appliance for data traffic to a software service
US10846598B2 (en)2014-09-262020-11-24British Telecommunications Public Limited CompanyPattern matching
US10892978B2 (en)2017-02-062021-01-12Silver Peak Systems, Inc.Multi-level learning for classifying traffic flows from first packet data
US10908895B2 (en)*2018-12-212021-02-02Pensando Systems Inc.State-preserving upgrade of an intelligent server adapter
US10909419B2 (en)2016-09-202021-02-02Kabushiki Kaisha ToshibaAbnormality detection device, learning device, abnormality detection method, and learning method
US10908835B1 (en)2013-01-102021-02-02Pure Storage, Inc.Reversing deletion of a virtual machine
US20210056203A1 (en)*2019-08-222021-02-25International Business Machines CorporationData breach detection
US10938855B1 (en)*2017-06-232021-03-02Digi International Inc.Systems and methods for automatically and securely provisioning remote computer network infrastructure
US10958613B2 (en)2018-01-012021-03-23Verint Systems Ltd.System and method for identifying pairs of related application users
US10965702B2 (en)2019-05-282021-03-30Extrahop Networks, Inc.Detecting injection attacks using passive network monitoring
US10972508B1 (en)*2018-11-302021-04-06Juniper Networks, Inc.Generating a network security policy based on behavior detected after identification of malicious behavior
US10972558B2 (en)2017-04-302021-04-06Verint Systems Ltd.System and method for tracking users of computer applications
US20210126863A1 (en)*2018-05-182021-04-29Juniper Networks, Inc.Packet fragment forwarding without reassembly
US10999295B2 (en)2019-03-202021-05-04Verint Systems Ltd.System and method for de-anonymizing actions and messages on networks
US11023576B2 (en)*2018-11-282021-06-01International Business Machines CorporationDetecting malicious activity on a computer system
US11044202B2 (en)2017-02-062021-06-22Silver Peak Systems, Inc.Multi-level learning for predicting and classifying traffic flows from first packet data
US11061885B2 (en)*2018-06-152021-07-13Intel CorporationAutonomous anomaly detection and event triggering for data series
CN113313216A (en)*2021-07-302021-08-27深圳市永达电子信息股份有限公司Method and device for extracting main body of network data, electronic equipment and storage medium
US11120132B1 (en)*2015-11-092021-09-148X8, Inc.Restricted replication for protection of replicated databases
US11140023B2 (en)*2017-09-192021-10-05Intel CorporationTrace network used as a configuration network
US11153335B1 (en)2015-11-092021-10-198X8, Inc.Delayed replication for protection of replicated databases
WO2021211911A1 (en)*2020-04-162021-10-21Blackswan Technologies Inc.Artificial intelligence cloud operating system
US11157800B2 (en)2015-07-242021-10-26Brainchip, Inc.Neural processor based accelerator system and method
US11159486B2 (en)*2015-11-172021-10-26Zscaler, Inc.Stream scanner for identifying signature matches
US11165814B2 (en)2019-07-292021-11-02Extrahop Networks, Inc.Modifying triage information based on network monitoring
US11165823B2 (en)2019-12-172021-11-02Extrahop Networks, Inc.Automated preemptive polymorphic deception
US11182150B2 (en)2020-01-142021-11-23Pensando Systems Inc.Zero packet loss upgrade of an IO device
US11212210B2 (en)2017-09-212021-12-28Silver Peak Systems, Inc.Selective route exporting using source type
US11252057B2 (en)*2019-03-142022-02-15Panasonic Intellectual Property Management Co., Ltd.Information processing apparatus, information processing system, information processing method, and computer program
US11265336B2 (en)*2019-03-282022-03-01Red Hat, Inc.Detecting anomalies in networks
US11281453B1 (en)2021-01-062022-03-22Pensando Systems, Inc.Methods and systems for a hitless rollback mechanism during software upgrade of a network appliance
US11290494B2 (en)*2019-05-312022-03-29Varmour Networks, Inc.Reliability prediction for cloud security policies
US11290493B2 (en)2019-05-312022-03-29Varmour Networks, Inc.Template-driven intent-based security
US11296967B1 (en)2021-09-232022-04-05Extrahop Networks, Inc.Combining passive network analysis and active probing
US11303500B1 (en)*2015-08-242022-04-12Virtual Instruments Worldwide, Inc.Storm detection, analysis, remediation, and other network behavior
US11310256B2 (en)2020-09-232022-04-19Extrahop Networks, Inc.Monitoring encrypted network traffic
US11310284B2 (en)2019-05-312022-04-19Varmour Networks, Inc.Validation of cloud security policies
US11349861B1 (en)2021-06-182022-05-31Extrahop Networks, Inc.Identifying network entities based on beaconing activity
US20220191244A1 (en)*2020-12-102022-06-16Cisco Technology, Inc.Malware detection using inverse imbalance subspace searching
US20220201009A1 (en)*2020-12-182022-06-23Dell Products, L.P.Creating and handling workspace indicators of compromise (ioc) based upon configuration drift
US11381977B2 (en)2016-04-252022-07-05Cognyte Technologies Israel Ltd.System and method for decrypting communication exchanged on a wireless local area network
US20220217537A1 (en)*2007-06-122022-07-07Icontrol Networks, Inc.Communication protocols in integrated systems
US11388072B2 (en)2019-08-052022-07-12Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US11399016B2 (en)2019-11-032022-07-26Cognyte Technologies Israel Ltd.System and method for identifying exchanges of encrypted communication traffic
US11403405B1 (en)2019-06-272022-08-02Architecture Technology CorporationPortable vulnerability identification tool for embedded non-IP devices
US11403559B2 (en)2018-08-052022-08-02Cognyte Technologies Israel Ltd.System and method for using a user-action log to learn to classify encrypted traffic
US11423083B2 (en)2017-10-272022-08-23Ab Initio Technology LlcTransforming a specification into a persistent computer program
US11429713B1 (en)2019-01-242022-08-30Architecture Technology CorporationArtificial intelligence modeling for cyber-attack simulation protocols
US11431744B2 (en)2018-02-092022-08-30Extrahop Networks, Inc.Detection of denial of service attacks
US11444974B1 (en)2019-10-232022-09-13Architecture Technology CorporationSystems and methods for cyber-physical threat modeling
US11449618B2 (en)*2018-08-242022-09-20Hewlett-Packard Development Company, L.P.Active testing of access control policy
US20220309171A1 (en)*2020-04-282022-09-29Absolute Software CorporationEndpoint Security using an Action Prediction Model
US11463466B2 (en)2020-09-232022-10-04Extrahop Networks, Inc.Monitoring encrypted network traffic
US11503064B1 (en)2018-06-192022-11-15Architecture Technology CorporationAlert systems and methods for attack-related events
US11503075B1 (en)2020-01-142022-11-15Architecture Technology CorporationSystems and methods for continuous compliance of nodes
US11526553B2 (en)*2020-07-232022-12-13Vmware, Inc.Building a dynamic regular expression from sampled data
CN115567270A (en)*2022-09-212023-01-03中国工商银行股份有限公司 Service attack processing method, device, computer equipment and storage medium thereof
US11546354B2 (en)*2019-11-262023-01-03Kyndryl, Inc.Network shutdown for cyber security
US11570186B2 (en)*2019-12-122023-01-31Intel CorporationSecurity reporting via message tagging
US11568236B2 (en)2018-01-252023-01-31The Research Foundation For The State University Of New YorkFramework and methods of diverse exploration for fast and safe policy improvement
US11570188B2 (en)*2015-12-282023-01-31Sixgill Ltd.Dark web monitoring, analysis and alert system and method
US20230030504A1 (en)*2019-12-192023-02-02Siemens Mobility GmbHTransmission device for transmitting data
US11575563B2 (en)2019-05-312023-02-07Varmour Networks, Inc.Cloud security management
US11575625B2 (en)2017-04-302023-02-07Cognyte Technologies Israel Ltd.System and method for identifying relationships between users of computer applications
TWI791418B (en)*2015-12-082023-02-11美商飛塔公司Systems and methods for detection of malicious code in runtime generated code, and related computer program product
US11582065B2 (en)2007-06-122023-02-14Icontrol Networks, Inc.Systems and methods for device communication
US11588787B2 (en)2004-03-162023-02-21Icontrol Networks, Inc.Premises management configuration and control
US11586956B2 (en)*2013-05-282023-02-21Keysight Technologies, Inc.Searching apparatus utilizing sub-word finite state machines
US11595364B2 (en)2005-03-162023-02-28Icontrol Networks, Inc.System for data routing in networks
US11601865B2 (en)2009-04-302023-03-07Icontrol Networks, Inc.Server-based notification of alarm event subsequent to communication failure with armed security system
US11601810B2 (en)2007-06-122023-03-07Icontrol Networks, Inc.Communication protocols in integrated systems
US11616659B2 (en)2008-08-112023-03-28Icontrol Networks, Inc.Integrated cloud system for premises automation
US11615697B2 (en)2005-03-162023-03-28Icontrol Networks, Inc.Premise management systems and methods
US11625008B2 (en)2004-03-162023-04-11Icontrol Networks, Inc.Premises management networking
US11626006B2 (en)2004-03-162023-04-11Icontrol Networks, Inc.Management of a security system at a premises
US11625161B2 (en)2007-06-122023-04-11Icontrol Networks, Inc.Control system user interface
US11632308B2 (en)2007-06-122023-04-18Icontrol Networks, Inc.Communication protocols in integrated systems
US20230124402A1 (en)*2020-05-182023-04-20Google LlcInference Methods For Word Or Wordpiece Tokenization
US20230129367A1 (en)*2020-03-302023-04-27British Telecommunications Public Limited CompanyMethod of analysing anomalous network traffic
US11641391B2 (en)2008-08-112023-05-02Icontrol Networks Inc.Integrated cloud system with lightweight gateway for premises automation
US11646907B2 (en)2007-06-122023-05-09Icontrol Networks, Inc.Communication protocols in integrated systems
US11645388B1 (en)2018-06-192023-05-09Architecture Technology CorporationSystems and methods for detecting non-malicious faults when processing source codes
US11656667B2 (en)2004-03-162023-05-23Icontrol Networks, Inc.Integrated security system with parallel processing architecture
US11663902B2 (en)2007-04-232023-05-30Icontrol Networks, Inc.Method and system for providing alternate network access
US11700142B2 (en)2005-03-162023-07-11Icontrol Networks, Inc.Security network integrating security system and network devices
US20230224275A1 (en)*2022-01-122023-07-13Bank Of America CorporationPreemptive threat detection for an information system
US11706279B2 (en)2007-01-242023-07-18Icontrol Networks, Inc.Methods and systems for data communication
US11706045B2 (en)2005-03-162023-07-18Icontrol Networks, Inc.Modular electronic display platform
US11711374B2 (en)2019-05-312023-07-25Varmour Networks, Inc.Systems and methods for understanding identity and organizational access to applications within an enterprise environment
US11722515B1 (en)2019-02-042023-08-08Architecture Technology CorporationImplementing hierarchical cybersecurity systems and methods
US11729255B2 (en)2008-08-112023-08-15Icontrol Networks, Inc.Integrated cloud system with lightweight gateway for premises automation
US11733908B2 (en)2013-01-102023-08-22Pure Storage, Inc.Delaying deletion of a dataset
US11734316B2 (en)2021-07-082023-08-22Varmour Networks, Inc.Relationship-based search in a computing environment
US11750414B2 (en)2010-12-162023-09-05Icontrol Networks, Inc.Bidirectional security sensor communication for a premises security system
US11758026B2 (en)2008-08-112023-09-12Icontrol Networks, Inc.Virtual device systems and methods
US11757834B2 (en)2004-03-162023-09-12Icontrol Networks, Inc.Communication protocols in integrated systems
US11768933B2 (en)*2020-08-112023-09-26Saudi Arabian Oil CompanySystem and method for protecting against ransomware without the use of signatures or updates
US11777978B2 (en)2021-01-292023-10-03Varmour Networks, Inc.Methods and systems for accurately assessing application access risk
US11792036B2 (en)2008-08-112023-10-17Icontrol Networks, Inc.Mobile premises automation platform
US11792330B2 (en)2005-03-162023-10-17Icontrol Networks, Inc.Communication and automation in a premises management system
US11809174B2 (en)2007-02-282023-11-07Icontrol Networks, Inc.Method and system for managing communication connectivity
US11811845B2 (en)2004-03-162023-11-07Icontrol Networks, Inc.Communication protocols over internet protocol (IP) networks
US11816323B2 (en)2008-06-252023-11-14Icontrol Networks, Inc.Automation system user interface
US11818152B2 (en)2020-12-232023-11-14Varmour Networks, Inc.Modeling topic-based message-oriented middleware within a security system
US11824675B2 (en)2005-03-162023-11-21Icontrol Networks, Inc.Networked touchscreen with integrated interfaces
US11831462B2 (en)2007-08-242023-11-28Icontrol Networks, Inc.Controlling data routing in premises management systems
US20230385837A1 (en)*2022-05-252023-11-30Dell Products L.P.Machine learning-based detection of potentially malicious behavior on an e-commerce platform
US11843606B2 (en)2022-03-302023-12-12Extrahop Networks, Inc.Detecting abnormal data access based on data similarity
US20230403289A1 (en)*2022-06-142023-12-14Microsoft Technology Licensing, LlcMachine learning approach for solving the cold start problem in stateful models
US11863580B2 (en)2019-05-312024-01-02Varmour Networks, Inc.Modeling application dependencies to identify operational risk
US11876817B2 (en)2020-12-232024-01-16Varmour Networks, Inc.Modeling queue-based message-oriented middleware relationships in a security system
US11887505B1 (en)2019-04-242024-01-30Architecture Technology CorporationSystem for deploying and monitoring network-based training exercises
US11894986B2 (en)2007-06-122024-02-06Icontrol Networks, Inc.Communication protocols in integrated systems
US11900790B2 (en)2010-09-282024-02-13Icontrol Networks, Inc.Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US11916870B2 (en)2004-03-162024-02-27Icontrol Networks, Inc.Gateway registry methods and systems
US11916928B2 (en)2008-01-242024-02-27Icontrol Networks, Inc.Communication protocols over internet protocol (IP) networks
US11943301B2 (en)2014-03-032024-03-26Icontrol Networks, Inc.Media content management
CN117879975A (en)*2024-03-112024-04-12广州翔实信息科技有限公司Method based on 5G mobile communication network security
US11991306B2 (en)2004-03-162024-05-21Icontrol Networks, Inc.Premises system automation
US12003387B2 (en)2012-06-272024-06-04Comcast Cable Communications, LlcControl system user interface
US12021649B2 (en)2010-12-202024-06-25Icontrol Networks, Inc.Defining and implementing sensor triggered response rules
US20240223523A1 (en)*2018-02-202024-07-04Darktrace Holdings LimitedEndpoint agent extension of a machine learning cyber defense system for email
US12050693B2 (en)2021-01-292024-07-30Varmour Networks, Inc.System and method for attributing user behavior from multiple technical telemetry sources
US12063220B2 (en)2004-03-162024-08-13Icontrol Networks, Inc.Communication protocols in integrated systems
US12063221B2 (en)2006-06-122024-08-13Icontrol Networks, Inc.Activation of gateway device
US12100287B2 (en)2010-12-172024-09-24Icontrol Networks, Inc.Method and system for processing security event data
US12124586B2 (en)*2013-09-132024-10-22Omnissa, LlcRisk assessment for managed client devices
US12184443B2 (en)2007-06-122024-12-31Icontrol Networks, Inc.Controlling data routing among networks
US12223418B1 (en)*2015-09-012025-02-11Netronome Systems, Inc.Communicating a neural network feature vector (NNFV) to a host and receiving back a set of weight values for a neural network
US12231403B2 (en)2015-11-172025-02-18Zscaler, Inc.Cloud-based intrusion prevention system, multi-tenant firewall, and stream scanner
US12277853B2 (en)2005-03-162025-04-15Icontrol Networks, Inc.Gateway integrated with premises security system
US12283172B2 (en)2007-06-122025-04-22Icontrol Networks, Inc.Communication protocols in integrated systems
US12284197B1 (en)2017-11-272025-04-22Fortinet, Inc.Reducing amounts of data ingested into a data warehouse
US20250147859A1 (en)*2023-11-022025-05-08Cardinalops Ltd.Inferred Events
CN120582905A (en)*2025-07-312025-09-02湖南军安信达科技有限公司Data interaction method and system of reinforced switch and switch
US12413604B2 (en)*2022-02-212025-09-09Jinan Jubang Information Technology Co., LtdBlockchain-based big data analysis and decision-making system and method
US12443359B2 (en)2023-08-152025-10-14Pure Storage, Inc.Delaying requested deletion of datasets

Families Citing this family (309)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7343413B2 (en)2000-03-212008-03-11F5 Networks, Inc.Method and system for optimizing a network by independently scaling control segments and data flow
US8380854B2 (en)2000-03-212013-02-19F5 Networks, Inc.Simplified method for processing multiple connections from the same client
US7480715B1 (en)*2002-01-252009-01-20Vig Acquisitions Ltd., L.L.C.System and method for performing a predictive threat assessment based on risk factors
US20070113272A2 (en)2003-07-012007-05-17Securityprofiling, Inc.Real-time vulnerability monitoring
US9100431B2 (en)2003-07-012015-08-04Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US8984644B2 (en)2003-07-012015-03-17Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118708B2 (en)2003-07-012015-08-25Securityprofiling, LlcMulti-path remediation
US9118710B2 (en)2003-07-012015-08-25Securityprofiling, LlcSystem, method, and computer program product for reporting an occurrence in different manners
US9118711B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9350752B2 (en)2003-07-012016-05-24Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118709B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US8782654B2 (en)2004-03-132014-07-15Adaptive Computing Enterprises, Inc.Co-allocating a reservation spanning different compute resources types
US9268607B2 (en)2004-03-132016-02-23Adaptive Computing Enterprises, Inc.System and method of providing a self-optimizing reservation in space of compute resources
US20070266388A1 (en)2004-06-182007-11-15Cluster Resources, Inc.System and method for providing advanced reservations in a compute environment
JP5112061B2 (en)*2004-07-022013-01-09ストラスボー Wafer processing method and system
US8176490B1 (en)2004-08-202012-05-08Adaptive Computing Enterprises, Inc.System and method of interfacing a workload manager and scheduler with an identity manager
US8271980B2 (en)2004-11-082012-09-18Adaptive Computing Enterprises, Inc.System and method of providing system jobs within a compute environment
US20060259950A1 (en)*2005-02-182006-11-16Ulf MattssonMulti-layer system for privacy enforcement and monitoring of suspicious data access behavior
US9075657B2 (en)2005-04-072015-07-07Adaptive Computing Enterprises, Inc.On-demand access to compute resources
US8863143B2 (en)2006-03-162014-10-14Adaptive Computing Enterprises, Inc.System and method for managing a hybrid compute environment
US8930536B2 (en)2005-03-162015-01-06Adaptive Computing Enterprises, Inc.Virtual private cluster
US9231886B2 (en)2005-03-162016-01-05Adaptive Computing Enterprises, Inc.Simple integration of an on-demand compute environment
US9122643B2 (en)*2005-12-082015-09-01Nvidia CorporationEvent trigger based data backup services
US8402322B2 (en)*2005-12-082013-03-19Nvidia CorporationEmergency data preservation services
US20070143849A1 (en)*2005-12-192007-06-21Eyal AdarMethod and a software system for end-to-end security assessment for security and CIP professionals
US8392999B2 (en)*2005-12-192013-03-05White Cyber Knight Ltd.Apparatus and methods for assessing and maintaining security of a computerized system under development
US8280805B1 (en)2006-01-102012-10-02Sas Institute Inc.Computer-implemented risk evaluation systems and methods
US7912628B2 (en)2006-03-032011-03-22Inrix, Inc.Determining road traffic conditions using data from multiple data sources
US7899611B2 (en)*2006-03-032011-03-01Inrix, Inc.Detecting anomalous road traffic conditions
US7813870B2 (en)*2006-03-032010-10-12Inrix, Inc.Dynamic time series prediction of future traffic conditions
US8700296B2 (en)2006-03-032014-04-15Inrix, Inc.Dynamic prediction of road traffic conditions
US20070208498A1 (en)*2006-03-032007-09-06Inrix, Inc.Displaying road traffic condition information and user controls
US7912773B1 (en)*2006-03-242011-03-22Sas Institute Inc.Computer-implemented data storage systems and methods for use with predictive model systems
US8220047B1 (en)2006-08-092012-07-10Google Inc.Anti-phishing system and method
US20080040373A1 (en)*2006-08-102008-02-14Business Objects, S.A.Apparatus and method for implementing match transforms in an enterprise information management system
US20080040179A1 (en)*2006-08-142008-02-14Deutsche Boerse AgSystem and method for sharing information and causing an action based on that information
US7908076B2 (en)*2006-08-182011-03-15Inrix, Inc.Representative road traffic flow information based on historical data
US8353031B1 (en)*2006-09-252013-01-08Symantec CorporationVirtual security appliance
US7831607B2 (en)*2006-12-082010-11-09Pandya Ashish AInterval symbol architecture for programmable intelligent search memory
WO2008073824A1 (en)*2006-12-082008-06-19Pandya Ashish ADynamic programmable intelligent search memory
US7890692B2 (en)*2007-08-172011-02-15Pandya Ashish AFSA context switch architecture for programmable intelligent search memory
US7996348B2 (en)2006-12-082011-08-09Pandya Ashish A100GBPS security and search architecture using programmable intelligent search memory (PRISM) that comprises one or more bit interval counters
US20110029549A1 (en)*2006-12-082011-02-03Pandya Ashish ASignature search architecture for programmable intelligent search memory
US9141557B2 (en)*2006-12-082015-09-22Ashish A. PandyaDynamic random access memory (DRAM) that comprises a programmable intelligent search memory (PRISM) and a cryptography processing engine
US8190512B1 (en)2007-02-202012-05-29Sas Institute Inc.Computer-implemented clustering systems and methods for action determination
US8484220B2 (en)2007-03-062013-07-09Mcafee, Inc.Clustered index with differentiated subfields
US7792117B1 (en)2007-05-032010-09-07Xilinx, Inc.Method for simulating a processor of network packets
US7784014B1 (en)2007-05-032010-08-24Xilinx, Inc.Generation of a specification of a network packet processor
US7990867B1 (en)2007-05-032011-08-02Xilinx, Inc.Pipeline for processing network packets
US8284772B1 (en)2007-05-032012-10-09Xilinx, Inc.Method for scheduling a network packet processor
US7788402B1 (en)*2007-05-032010-08-31Xilinx, Inc.Circuit for modification of a network packet by insertion or removal of a data segment
US7805639B2 (en)2007-08-162010-09-28International Business Machines CorporationTool to report the status and drill-down of an application in an automated manufacturing environment
US7493236B1 (en)*2007-08-162009-02-17International Business Machines CorporationMethod for reporting the status of a control application in an automated manufacturing environment
CA2630938C (en)*2007-09-192016-10-04Kevin Gerard BoyceMethod and system for dynamic protocol decoding and analysis
US8041773B2 (en)2007-09-242011-10-18The Research Foundation Of State University Of New YorkAutomatic clustering for self-organizing grids
CN101207665B (en)*2007-11-052010-12-08华为技术有限公司 A method for obtaining attenuation factor
CN100550712C (en)*2007-11-052009-10-14华为技术有限公司A kind of signal processing method and processing unit
US8793362B2 (en)*2007-11-292014-07-29Barclays Capital Inc.Communications enterprise server monitor
US20100198830A1 (en)*2008-03-062010-08-05Nitrosecurity, Inc.Dynamic data distribution aggregation
US8806053B1 (en)2008-04-292014-08-12F5 Networks, Inc.Methods and systems for optimizing network traffic using preemptive acknowledgment signals
CN101577662B (en)2008-05-052012-04-04华为技术有限公司Method and device for matching longest prefix based on tree form data structure
US8805995B1 (en)*2008-05-232014-08-12Symantec CorporationCapturing data relating to a threat
US8515862B2 (en)2008-05-292013-08-20Sas Institute Inc.Computer-implemented systems and methods for integrated model validation for compliance and credit risk
US8548428B2 (en)2009-01-282013-10-01Headwater Partners I LlcDevice group partitions and settlement platform
US8898293B2 (en)2009-01-282014-11-25Headwater Partners I LlcService offer set publishing to device agent with on-device service selection
US8589541B2 (en)2009-01-282013-11-19Headwater Partners I LlcDevice-assisted services for protecting network capacity
US8626115B2 (en)2009-01-282014-01-07Headwater Partners I LlcWireless network service interfaces
US8402111B2 (en)2009-01-282013-03-19Headwater Partners I, LlcDevice assisted services install
US8924543B2 (en)2009-01-282014-12-30Headwater Partners I LlcService design center for device assisted services
US8275830B2 (en)2009-01-282012-09-25Headwater Partners I LlcDevice assisted CDR creation, aggregation, mediation and billing
US8832777B2 (en)2009-03-022014-09-09Headwater Partners I LlcAdapting network policies based on device service processor configuration
US8340634B2 (en)2009-01-282012-12-25Headwater Partners I, LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US8635335B2 (en)2009-01-282014-01-21Headwater Partners I LlcSystem and method for wireless network offloading
US8346225B2 (en)2009-01-282013-01-01Headwater Partners I, LlcQuality of service for device assisted services
US8924469B2 (en)2008-06-052014-12-30Headwater Partners I LlcEnterprise access control and accounting allocation for access networks
US8331901B2 (en)2009-01-282012-12-11Headwater Partners I, LlcDevice assisted ambient services
US8725123B2 (en)2008-06-052014-05-13Headwater Partners I LlcCommunications device with secure data path processing agents
US8391834B2 (en)2009-01-282013-03-05Headwater Partners I LlcSecurity techniques for device assisted services
US8406748B2 (en)2009-01-282013-03-26Headwater Partners I LlcAdaptive ambient services
JP5224953B2 (en)*2008-07-172013-07-03インターナショナル・ビジネス・マシーンズ・コーポレーション Information processing apparatus, information processing method, and program
EP2150022A1 (en)*2008-07-282010-02-03THOMSON LicensingData stream comprising RTP packets, and method and device for encoding/decoding such data stream
US8218442B2 (en)2008-09-112012-07-10Juniper Networks, Inc.Methods and apparatus for flow-controllable multi-staged queues
US8566444B1 (en)*2008-10-302013-10-22F5 Networks, Inc.Methods and system for simultaneous multiple rules checking
US8001243B2 (en)*2008-11-072011-08-16Oracle America, Inc.Distributed denial of service deterrence using outbound packet rewriting
US7916635B2 (en)2008-12-232011-03-29Qwest Communications International, Inc.Transparent network traffic inspection
US8201220B2 (en)2008-12-232012-06-12Qwest Communications International Inc.Network user usage profiling
US8843523B2 (en)*2009-01-122014-09-23Micron Technology, Inc.Devices, systems, and methods for communicating pattern matching results of a parallel pattern search engine
US10326800B2 (en)2009-01-282019-06-18Headwater Research LlcWireless network service interfaces
US9270559B2 (en)2009-01-282016-02-23Headwater Partners I LlcService policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
US9955332B2 (en)2009-01-282018-04-24Headwater Research LlcMethod for child wireless device activation to subscriber account of a master wireless device
US8606911B2 (en)2009-03-022013-12-10Headwater Partners I LlcFlow tagging for service policy implementation
US12388810B2 (en)2009-01-282025-08-12Headwater Research LlcEnd user device that secures an association of application to service policy with an application certificate check
US11985155B2 (en)2009-01-282024-05-14Headwater Research LlcCommunications device with secure data path processing agents
US9572019B2 (en)2009-01-282017-02-14Headwater Partners LLCService selection set published to device agent with on-device service selection
US8793758B2 (en)2009-01-282014-07-29Headwater Partners I LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US10841839B2 (en)2009-01-282020-11-17Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US9980146B2 (en)2009-01-282018-05-22Headwater Research LlcCommunications device with secure data path processing agents
US9755842B2 (en)2009-01-282017-09-05Headwater Research LlcManaging service user discovery and service launch object placement on a device
US9253663B2 (en)2009-01-282016-02-02Headwater Partners I LlcControlling mobile device communications on a roaming network based on device state
US9954975B2 (en)2009-01-282018-04-24Headwater Research LlcEnhanced curfew and protection associated with a device group
US10783581B2 (en)2009-01-282020-09-22Headwater Research LlcWireless end-user device providing ambient or sponsored services
US8745191B2 (en)2009-01-282014-06-03Headwater Partners I LlcSystem and method for providing user notifications
US10237757B2 (en)2009-01-282019-03-19Headwater Research LlcSystem and method for wireless network offloading
US10798252B2 (en)2009-01-282020-10-06Headwater Research LlcSystem and method for providing user notifications
US9578182B2 (en)2009-01-282017-02-21Headwater Partners I LlcMobile device and service management
US12432130B2 (en)2009-01-282025-09-30Headwater Research LlcFlow tagging for service policy implementation
US11218854B2 (en)2009-01-282022-01-04Headwater Research LlcService plan design, user interfaces, application programming interfaces, and device management
US10779177B2 (en)2009-01-282020-09-15Headwater Research LlcDevice group partitions and settlement platform
US10264138B2 (en)2009-01-282019-04-16Headwater Research LlcMobile device and service management
US10200541B2 (en)2009-01-282019-02-05Headwater Research LlcWireless end-user device with divided user space/kernel space traffic policy system
US10064055B2 (en)2009-01-282018-08-28Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US9392462B2 (en)2009-01-282016-07-12Headwater Partners I LlcMobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy
US9565707B2 (en)2009-01-282017-02-07Headwater Partners I LlcWireless end-user device with wireless data attribution to multiple personas
US10484858B2 (en)2009-01-282019-11-19Headwater Research LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US9557889B2 (en)2009-01-282017-01-31Headwater Partners I LlcService plan design, user interfaces, application programming interfaces, and device management
US11973804B2 (en)2009-01-282024-04-30Headwater Research LlcNetwork service plan design
US9647918B2 (en)2009-01-282017-05-09Headwater Research LlcMobile device and method attributing media services network usage to requesting application
US10492102B2 (en)2009-01-282019-11-26Headwater Research LlcIntermediate networking devices
US12389218B2 (en)2009-01-282025-08-12Headwater Research LlcService selection set publishing to device agent with on-device service selection
US12166596B2 (en)2009-01-282024-12-10Disney Enterprises, Inc.Device-assisted services for protecting network capacity
US9858559B2 (en)2009-01-282018-01-02Headwater Research LlcNetwork service plan design
US10057775B2 (en)2009-01-282018-08-21Headwater Research LlcVirtualized policy and charging system
US10248996B2 (en)2009-01-282019-04-02Headwater Research LlcMethod for operating a wireless end-user device mobile payment agent
US8351898B2 (en)2009-01-282013-01-08Headwater Partners I LlcVerifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US8893009B2 (en)2009-01-282014-11-18Headwater Partners I LlcEnd user device that secures an association of application to service policy with an application certificate check
US10715342B2 (en)2009-01-282020-07-14Headwater Research LlcManaging service user discovery and service launch object placement on a device
US9351193B2 (en)2009-01-282016-05-24Headwater Partners I LlcIntermediate networking devices
US9706061B2 (en)2009-01-282017-07-11Headwater Partners I LlcService design center for device assisted services
US9571559B2 (en)2009-01-282017-02-14Headwater Partners I LlcEnhanced curfew and protection associated with a device group
US8099784B1 (en)*2009-02-132012-01-17Symantec CorporationBehavioral detection based on uninstaller modification or removal
KR101042729B1 (en)*2009-04-092011-06-20삼성에스디에스 주식회사 Malware Detection Device Based on System-on-Chip and Custom Semiconductor in Mobile Devices
US8964748B2 (en)*2009-04-172015-02-24Genband Us LlcMethods, systems, and computer readable media for performing flow compilation packet processing
WO2010124138A1 (en)2009-04-222010-10-28Inrix, Inc.Predicting expected road traffic conditions based on historical and current data
US20130247191A1 (en)*2009-05-072013-09-19Harish BalasubramanianSystem, method, and computer program product for performing a remedial action with respect to a first device utilizing a second device
US9871807B2 (en)*2009-06-122018-01-16Microsoft Technology Licensing, LlcGeneric protocol decoder for generic application-level protocol signatures
CN102577304B (en)*2009-08-122015-12-09荷兰皇家Kpn电信集团The method and system of the message of dynamic forwarding first agreement and Controlling vertex thereof
US10157280B2 (en)2009-09-232018-12-18F5 Networks, Inc.System and method for identifying security breach attempts of a website
US11720290B2 (en)2009-10-302023-08-08Iii Holdings 2, LlcMemcached server functionality in a cluster of data processing nodes
US10877695B2 (en)2009-10-302020-12-29Iii Holdings 2, LlcMemcached server functionality in a cluster of data processing nodes
GB0919253D0 (en)2009-11-032009-12-16Cullimore IanAtto 1
US8868961B1 (en)2009-11-062014-10-21F5 Networks, Inc.Methods for acquiring hyper transport timing and devices thereof
US10721269B1 (en)2009-11-062020-07-21F5 Networks, Inc.Methods and system for returning requests with javascript for clients before passing a request to a server
US9313047B2 (en)2009-11-062016-04-12F5 Networks, Inc.Handling high throughput and low latency network data packets in a traffic management device
US8640241B2 (en)2009-11-162014-01-28Quatum CorporationData identification system
US9009293B2 (en)*2009-11-182015-04-14Cisco Technology, Inc.System and method for reporting packet characteristics in a network environment
US9015318B1 (en)2009-11-182015-04-21Cisco Technology, Inc.System and method for inspecting domain name system flows in a network environment
US9148380B2 (en)*2009-11-232015-09-29Cisco Technology, Inc.System and method for providing a sequence numbering mechanism in a network environment
US9098274B2 (en)2009-12-032015-08-04Intel CorporationMethods and apparatuses to improve turbo performance for events handling
US20110145205A1 (en)*2009-12-142011-06-16Sanjeev JainPacket Boundary Spanning Pattern Matching Based At Least In Part Upon History Information
US8792495B1 (en)2009-12-192014-07-29Cisco Technology, Inc.System and method for managing out of order packets in a network environment
US9264321B2 (en)2009-12-232016-02-16Juniper Networks, Inc.Methods and apparatus for tracking data flow based on flow state values
KR101079786B1 (en)*2010-01-062011-11-03충남대학교산학협력단Flow Data Analyze Method by Parallel Computation
US8424072B2 (en)*2010-03-092013-04-16Microsoft CorporationBehavior-based security system
US8769084B2 (en)2010-06-072014-07-01Novell, Inc.System and method for modeling interdependencies in a network datacenter
US9558074B2 (en)2010-06-112017-01-31Quantum CorporationData replica control
US9141625B1 (en)2010-06-222015-09-22F5 Networks, Inc.Methods for preserving flow state during virtual machine migration and devices thereof
US10015286B1 (en)2010-06-232018-07-03F5 Networks, Inc.System and method for proxying HTTP single sign on across network domains
US8527488B1 (en)*2010-07-082013-09-03Netlogic Microsystems, Inc.Negative regular expression search operations
US8908545B1 (en)2010-07-082014-12-09F5 Networks, Inc.System and method for handling TCP performance in network access with driver initiated application tunnel
US8347100B1 (en)2010-07-142013-01-01F5 Networks, Inc.Methods for DNSSEC proxying and deployment amelioration and systems thereof
US8700593B1 (en)*2010-07-162014-04-15Netlogic Microsystems, Inc.Content search system having pipelined engines and a token stitcher
US8589405B1 (en)2010-07-162013-11-19Netlogic Microsystems, Inc.Token stitcher for a content search system having pipelined engines
US8572106B1 (en)2010-07-162013-10-29Netlogic Microsystems, Inc.Memory management in a token stitcher for a content search system having pipelined engines
US9665582B2 (en)*2010-08-042017-05-30Quantum CorporationSoftware, systems, and methods for enhanced replication within virtual machine environments
US9083760B1 (en)2010-08-092015-07-14F5 Networks, Inc.Dynamic cloning and reservation of detached idle connections
CA2712542C (en)*2010-08-252012-09-11Ibm Canada Limited - Ibm Canada LimiteeTwo-tier deep analysis of html traffic
US20120053994A1 (en)*2010-08-302012-03-01Bank Of AmericaOrganization resource allocation based on forecasted change outcomes
US8630174B1 (en)2010-09-142014-01-14F5 Networks, Inc.System and method for post shaping TCP packetization
US8463909B1 (en)2010-09-152013-06-11F5 Networks, Inc.Systems and methods for managing server resources
US8886981B1 (en)2010-09-152014-11-11F5 Networks, Inc.Systems and methods for idle driven scheduling
US8804504B1 (en)2010-09-162014-08-12F5 Networks, Inc.System and method for reducing CPU load in processing PPP packets on a SSL-VPN tunneling device
US8787303B2 (en)2010-10-052014-07-22Cisco Technology, Inc.Methods and apparatus for data traffic offloading at a router
EP2633667B1 (en)2010-10-292017-09-06F5 Networks, IncSystem and method for on the fly protocol conversion in obtaining policy enforcement information
WO2012058486A2 (en)2010-10-292012-05-03F5 Networks, Inc.Automated policy builder
US8875276B2 (en)*2011-09-022014-10-28Iota Computing, Inc.Ultra-low power single-chip firewall security device, system and method
US9003057B2 (en)2011-01-042015-04-07Cisco Technology, Inc.System and method for exchanging information in a mobile wireless network environment
US8627467B2 (en)2011-01-142014-01-07F5 Networks, Inc.System and method for selectively storing web objects in a cache memory based on policy decisions
US10135831B2 (en)2011-01-282018-11-20F5 Networks, Inc.System and method for combining an access control system with a traffic management system
US8626682B2 (en)*2011-02-222014-01-07Thomson Reuters Global ResourcesAutomatic data cleaning for machine learning classifiers
US9122995B2 (en)*2011-03-152015-09-01Microsoft Technology Licensing, LlcClassification of stream-based data using machine learning
US8738767B2 (en)*2011-03-312014-05-27Meas, LlcMainframe management console monitoring
US8738768B2 (en)*2011-03-312014-05-27Meas, LlcMultiple destinations for mainframe event monitoring
US9154826B2 (en)2011-04-062015-10-06Headwater Partners Ii LlcDistributing content and service launch objects to mobile devices
US9104475B2 (en)*2011-04-072015-08-11Qualcomm Innovation Center, Inc.Methods and apparatus for managing operations of a web browser by predicting time period of subsequent script execution activity
US8880991B2 (en)2011-04-212014-11-04Qualcomm Innovation Center, Inc.Methods and apparatus for improved browsing performance by precompilation of high-priority JavaScripts in a webpage and delaying the removal of corresponding compiled code
US8751450B1 (en)*2011-04-272014-06-10Netapp, Inc.Method and system for securely capturing workloads at a live network for replaying at a test network
CN102761535A (en)*2011-04-292012-10-31北京瑞星信息技术有限公司Virus monitoring method and equipment
US8151341B1 (en)*2011-05-232012-04-03Kaspersky Lab ZaoSystem and method for reducing false positives during detection of network attacks
US8948013B1 (en)2011-06-142015-02-03Cisco Technology, Inc.Selective packet sequence acceleration in a network environment
US8792353B1 (en)*2011-06-142014-07-29Cisco Technology, Inc.Preserving sequencing during selective packet acceleration in a network environment
US8743690B1 (en)2011-06-142014-06-03Cisco Technology, Inc.Selective packet sequence acceleration in a network environment
US8737221B1 (en)2011-06-142014-05-27Cisco Technology, Inc.Accelerated processing of aggregate data flows in a network environment
US9246819B1 (en)2011-06-202016-01-26F5 Networks, Inc.System and method for performing message-based load balancing
US9958280B2 (en)2011-08-162018-05-01Inrix, Inc.Assessing inter-modal passenger travel options
US9223618B2 (en)2011-09-202015-12-29Intel CorporationMulti-threaded queuing system for pattern matching
US9756527B2 (en)*2011-10-032017-09-05Intel CorporationCommunication devices and flow restriction devices
US8811183B1 (en)2011-10-042014-08-19Juniper Networks, Inc.Methods and apparatus for multi-path flow control within a multi-stage switch fabric
US8768866B2 (en)2011-10-212014-07-01Sas Institute Inc.Computer-implemented systems and methods for forecasting and estimation using grid regression
CN102427415B (en)*2011-12-072014-01-15广东石油化工学院 Network Intrusion Immune Detection Method Based on Self-set Scale Constraint
US9270766B2 (en)2011-12-302016-02-23F5 Networks, Inc.Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof
US10230566B1 (en)2012-02-172019-03-12F5 Networks, Inc.Methods for dynamically constructing a service principal name and devices thereof
US9172753B1 (en)2012-02-202015-10-27F5 Networks, Inc.Methods for optimizing HTTP header based authentication and devices thereof
US9231879B1 (en)2012-02-202016-01-05F5 Networks, Inc.Methods for policy-based network traffic queue management and devices thereof
US9798588B1 (en)*2012-04-252017-10-24Significs And Elements, LlcEfficient packet forwarding using cyber-security aware policies
US10097616B2 (en)2012-04-272018-10-09F5 Networks, Inc.Methods for optimizing service of content requests and devices thereof
US9338095B2 (en)*2012-05-012016-05-10F5 Networks, Inc.Data flow segment optimized for hot flows
US9154423B1 (en)2012-05-012015-10-06F5 Networks, Inc.Minimize SYN-flood issues with flow cache while maintaining performance
US9525632B1 (en)2012-05-012016-12-20F5 Networks, Inc.Minimize recycle SYN issues for split TCP hot flows to improve system reliability and performance
US9043448B1 (en)*2012-05-082015-05-26Gigamon Inc.Systems and methods for configuring a network component that involves TCAM
US8938511B2 (en)*2012-06-122015-01-20International Business Machines CorporationMethod and apparatus for detecting unauthorized bulk forwarding of sensitive data over a network
US9203771B1 (en)2012-07-232015-12-01F5 Networks, Inc.Hot service flow hardware offloads based on service priority and resource usage
US9392003B2 (en)2012-08-232016-07-12Raytheon Foreground Security, Inc.Internet security cyber threat reporting system and method
US9258321B2 (en)2012-08-232016-02-09Raytheon Foreground Security, Inc.Automated internet threat detection and mitigation system and associated methods
US8856057B2 (en)*2012-09-132014-10-07James Albert IonsonCognitive security system and method
US9268598B2 (en)*2012-09-132016-02-23International Business Machines CorporationRecording and profiling transaction failure source addresses and states of validity indicator corresponding to addresses of aborted transaction in hardware transactional memories
US9252972B1 (en)*2012-12-202016-02-02Juniper Networks, Inc.Policy control using software defined network (SDN) protocol
US9177139B2 (en)*2012-12-302015-11-03Honeywell International Inc.Control system cyber security
JP5987701B2 (en)*2013-01-162016-09-07富士通株式会社 Communication monitoring apparatus, prediction method, and prediction program
JP5958354B2 (en)2013-01-162016-07-27富士通株式会社 Communication monitoring apparatus, occurrence prediction method, and occurrence prediction program
US10375155B1 (en)2013-02-192019-08-06F5 Networks, Inc.System and method for achieving hardware acceleration for asymmetric flow connections
WO2014159862A1 (en)2013-03-142014-10-02Headwater Partners I LlcAutomated credential porting for mobile devices
US9130826B2 (en)*2013-03-152015-09-08Enterasys Networks, Inc.System and related method for network monitoring and control based on applications
US10069862B2 (en)*2013-03-152018-09-04Symantec CorporationTechniques for predicting and protecting spearphishing targets
US9106536B2 (en)*2013-04-152015-08-11International Business Machines CorporationIdentification and classification of web traffic inside encrypted network tunnels
US9049169B1 (en)*2013-05-302015-06-02Trend Micro IncorporatedMobile email protection for private computer networks
US9386103B2 (en)2013-10-042016-07-05Breakingpoint Systems, Inc.Application identification and dynamic signature generation for managing network communications
US10187317B1 (en)2013-11-152019-01-22F5 Networks, Inc.Methods for traffic rate control and devices thereof
US9391771B2 (en)2014-02-062016-07-12Empire Technology Development LlcServer-client secret generation with cached data
US10015143B1 (en)2014-06-052018-07-03F5 Networks, Inc.Methods for securing one or more license entitlement grants and devices thereof
US11838851B1 (en)2014-07-152023-12-05F5, Inc.Methods for managing L7 traffic classification and devices thereof
US9674207B2 (en)*2014-07-232017-06-06Cisco Technology, Inc.Hierarchical attack detection in a network
US10122630B1 (en)2014-08-152018-11-06F5 Networks, Inc.Methods for network traffic presteering and devices thereof
US10666544B1 (en)2014-09-262020-05-26Lumeta CorporationMethod and apparatus for providing situational awareness
CA2966605A1 (en)2014-11-032016-05-12Level 3 Communications, LlcIdentifying a potential ddos attack using statistical analysis
US10182013B1 (en)2014-12-012019-01-15F5 Networks, Inc.Methods for managing progressive image delivery and devices thereof
US11165812B2 (en)2014-12-032021-11-02Splunk Inc.Containment of security threats within a computing environment
US11895138B1 (en)2015-02-022024-02-06F5, Inc.Methods for improving web scanner accuracy and devices thereof
US9560010B1 (en)*2015-03-302017-01-31Amazon Technologies, Inc.Network file transfer
US10834065B1 (en)2015-03-312020-11-10F5 Networks, Inc.Methods for SSL protected NTLM re-authentication and devices thereof
US10320813B1 (en)*2015-04-302019-06-11Amazon Technologies, Inc.Threat detection and mitigation in a virtualized computing environment
KR102720484B1 (en)*2015-05-042024-10-23사이드 캄란 하산 Method and device for security management in computer networks
US11350254B1 (en)2015-05-052022-05-31F5, Inc.Methods for enforcing compliance policies and devices thereof
US10505818B1 (en)2015-05-052019-12-10F5 Networks. Inc.Methods for analyzing and load balancing based on server health and devices thereof
US10749985B2 (en)2015-05-192020-08-18Amazon Technologies, Inc.Custom communication channels for application deployment
WO2017087840A1 (en)*2015-11-202017-05-26Webroot Inc.Binocular fusion analytics security
US9361175B1 (en)2015-12-072016-06-07International Business Machines CorporationDynamic detection of resource management anomalies in a processing system
US11757946B1 (en)2015-12-222023-09-12F5, Inc.Methods for analyzing network traffic and enforcing network policies and devices thereof
WO2017116627A1 (en)*2016-01-032017-07-06Presenso, Ltd.System and method for unsupervised prediction of machine failures
US10404698B1 (en)2016-01-152019-09-03F5 Networks, Inc.Methods for adaptive organization of web application access points in webtops and devices thereof
US10797888B1 (en)2016-01-202020-10-06F5 Networks, Inc.Methods for secured SCEP enrollment for client devices and devices thereof
US11178150B1 (en)2016-01-202021-11-16F5 Networks, Inc.Methods for enforcing access control list based on managed application and devices thereof
US20170214701A1 (en)*2016-01-242017-07-27Syed Kamran HasanComputer security based on artificial intelligence
US10015139B2 (en)*2016-02-032018-07-03Oracle International CorporationInter-arrival time intrusion-detection technique to provide enhanced cybersecurity
WO2017147331A1 (en)*2016-02-242017-08-31Alibaba Group Holding LimitedUser behavior-based dynamic resource adjustment
WO2017155514A1 (en)*2016-03-082017-09-14Hewlett Packard Enterprise Development LpAction based on advertisement indicator in network packet
US10255459B2 (en)2016-05-182019-04-09International Business Machines CorporationPrivacy enabled runtime
US10769285B2 (en)2016-05-182020-09-08International Business Machines CorporationPrivacy enabled runtime
TWI599905B (en)*2016-05-232017-09-21緯創資通股份有限公司Protecting method and system for malicious code, and monitor apparatus
US10791088B1 (en)2016-06-172020-09-29F5 Networks, Inc.Methods for disaggregating subscribers via DHCP address translation and devices thereof
US11063758B1 (en)2016-11-012021-07-13F5 Networks, Inc.Methods for facilitating cipher selection and devices thereof
US10454961B2 (en)2016-11-022019-10-22Cujo LLCExtracting encryption metadata and terminating malicious connections using machine learning
US10505792B1 (en)2016-11-022019-12-10F5 Networks, Inc.Methods for facilitating network traffic analytics and devices thereof
US10904275B2 (en)*2016-11-302021-01-26Cisco Technology, Inc.Leveraging synthetic traffic data samples for flow classifier training
CN106599997B (en)*2016-12-202021-07-02浩鲸云计算科技股份有限公司 Method and system for detection and identification of industrial control attacks based on zero dynamics
US10771483B2 (en)*2016-12-302020-09-08British Telecommunications Public Limited CompanyIdentifying an attacked computing device
US11496438B1 (en)2017-02-072022-11-08F5, Inc.Methods for improved network security using asymmetric traffic delivery and devices thereof
CN107070883B (en)*2017-02-282019-12-31青岛海信移动通信技术股份有限公司Method and device for carrying out security detection on wireless network
US10791119B1 (en)2017-03-142020-09-29F5 Networks, Inc.Methods for temporal password injection and devices thereof
US10812266B1 (en)2017-03-172020-10-20F5 Networks, Inc.Methods for managing security tokens based on security violations and devices thereof
US10475174B2 (en)2017-04-062019-11-12General Electric CompanyVisual anomaly detection system
US10931662B1 (en)2017-04-102021-02-23F5 Networks, Inc.Methods for ephemeral authentication screening and devices thereof
US10972453B1 (en)2017-05-032021-04-06F5 Networks, Inc.Methods for token refreshment based on single sign-on (SSO) for federated identity environments and devices thereof
US11343237B1 (en)2017-05-122022-05-24F5, Inc.Methods for managing a federated identity environment using security and access control data and devices thereof
US11122042B1 (en)2017-05-122021-09-14F5 Networks, Inc.Methods for dynamically managing user access control and devices thereof
US11874845B2 (en)*2017-06-282024-01-16Fortinet, Inc.Centralized state database storing state information
US10931790B2 (en)*2017-08-172021-02-23Saudi Arabian Oil CompanySystems and methods for securely transferring selective datasets between terminals with multi-applications support
US10389685B2 (en)*2017-08-172019-08-20Saudi Arabian Oil CompanySystems and methods for securely transferring selective datasets between terminals
US11122083B1 (en)2017-09-082021-09-14F5 Networks, Inc.Methods for managing network connections based on DNS data and network policies and devices thereof
US10375019B2 (en)2017-10-062019-08-06Stealthpath, Inc.Methods for internet communication security
US10367811B2 (en)2017-10-062019-07-30Stealthpath, Inc.Methods for internet communication security
US10361859B2 (en)2017-10-062019-07-23Stealthpath, Inc.Methods for internet communication security
US10374803B2 (en)2017-10-062019-08-06Stealthpath, Inc.Methods for internet communication security
US10397186B2 (en)2017-10-062019-08-27Stealthpath, Inc.Methods for internet communication security
US10630642B2 (en)2017-10-062020-04-21Stealthpath, Inc.Methods for internet communication security
US10990975B2 (en)*2017-11-082021-04-27Paypal, Inc.Detecting malware by monitoring client-side memory stacks
US10652213B2 (en)*2017-12-182020-05-12Nicira, Inc.Agent-less micro-segmentation of a network
US10673733B2 (en)2018-01-202020-06-02Hcl Technologies LimitedSystem for debugging a network environment
US11658995B1 (en)2018-03-202023-05-23F5, Inc.Methods for dynamically mitigating network attacks and devices thereof
US10761903B2 (en)*2018-03-292020-09-01Servicenow, Inc.Management instrumentation and discovery (MID) server support for executing automated flows within a cloud based system
CN108737406B (en)*2018-05-102020-08-04北京邮电大学Method and system for detecting abnormal flow data
US11044200B1 (en)2018-07-062021-06-22F5 Networks, Inc.Methods for service stitching using a packet header and devices thereof
FR3086481B1 (en)*2018-09-202021-12-10Thales Sa DETECTION AND FILTERING PROCESS OF ILLEGITIMATE FLOWS IN A SATELLITE COMMUNICATION NETWORK
US10708161B2 (en)*2018-09-212020-07-07Juniper Networks, Inc.Network performance monitoring using an active measurement protocol and relay mechanism
US10965694B2 (en)*2018-12-112021-03-30Bank Of America CorporationNetwork security intrusion detection
US10977080B2 (en)2019-01-302021-04-13Bank Of America CorporationResource instrument for processing a real-time resource event
US11164162B2 (en)2019-01-302021-11-02Bank Of America CorporationClosed-loop real-time resource event processing
US11556769B2 (en)*2019-04-292023-01-17Massachusetts Institute Of TechnologySuperconducting parametric amplifier neural network
US11159387B1 (en)2019-07-232021-10-26Fannie MaeSystems and methods for visualization based on historical network traffic and future projection of infrastructure assets
US11201838B2 (en)*2019-09-252021-12-14Intel CorporationSystem, apparatus and method for increasing efficiency of link communications
US11558423B2 (en)2019-09-272023-01-17Stealthpath, Inc.Methods for zero trust security with high quality of service
TWI777156B (en)*2019-12-102022-09-11威聯通科技股份有限公司Internal network monitoring method and internal network monitoring system using the same
US11363050B1 (en)2021-03-252022-06-14Bank Of America CorporationInformation security system and method for incompliance detection in data transmission
US11363048B1 (en)2021-03-252022-06-14Bank Of America CorporationInformation security system and method for security threat detection in data transmission
US11363049B1 (en)2021-03-252022-06-14Bank Of America CorporationInformation security system and method for anomaly detection in data transmission
CN113315790B (en)*2021-07-292021-11-02湖南华菱电子商务有限公司 Intrusion traffic detection method, electronic device and storage medium
US12079329B2 (en)*2022-01-262024-09-03Dell Products L.P.Structured data flow identification for proactive issue detection
US12335303B2 (en)2023-01-032025-06-17Bank Of America CorporationSystem and method for detecting and countering malicious code
US12381853B2 (en)2023-01-032025-08-05Bank Of America CorporationSystem and method for protecting non-public information from malicious users
CN116756225B (en)*2023-08-142023-11-07南京展研信息技术有限公司Situation data information processing method based on computer network security

Citations (93)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US723726A (en)*1902-12-061903-03-24George W PerksFountain-pen.
US5062037A (en)*1988-10-241991-10-29Ibm Corp.Method to provide concurrent execution of distributed application programs by a host computer and an intelligent work station on an sna network
US5134691A (en)*1986-04-011992-07-28Westinghouse Electric Corp.Bidirectional communication and control network with programmable microcontroller interfacing digital ICs transmitting in serial format to controlled product
US5276899A (en)*1981-04-011994-01-04Teredata CorporationMulti processor sorting network for sorting while transmitting concurrently presented messages by message content to deliver a highest priority message
US5446680A (en)*1991-08-091995-08-29Ibm Business Machines CorporationSystem and method for obtaining network performance data
US5486982A (en)*1994-06-101996-01-23Hsu; WinstonModular electronic packaging for computer servers
US5522070A (en)*1992-03-191996-05-28Fujitsu LimitedComputer resource distributing method and system for distributing a multiplicity of processes to a plurality of computers connected in a network
US5557742A (en)*1994-03-071996-09-17Haystack Labs, Inc.Method and system for detecting intrusion into and misuse of a data processing system
US5621889A (en)*1993-06-091997-04-15Alcatel Alsthom Compagnie Generale D'electriciteFacility for detecting intruders and suspect callers in a computer installation and a security system including such a facility
US5675797A (en)*1994-05-241997-10-07International Business Machines CorporationGoal-oriented resource allocation manager and performance index technique for servers
US5771234A (en)*1995-12-061998-06-23Industrial Technology Research InstituteMethod and system for ATM cell multiplexing under constant bit rate, variable bit rate and best-effort traffic
US5774668A (en)*1995-06-071998-06-30Microsoft CorporationSystem for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancing
US5790176A (en)*1992-07-081998-08-04Bell Atlantic Network Services, Inc.Media server for supplying video and multi-media data over the public switched telephone network
US5867716A (en)*1994-06-141999-02-02Hitachi, Ltd.Distributed computer system and method of generating automatic operation schedule for the same
US5872779A (en)*1994-09-161999-02-16Lucent Technologies Inc.System and method for private addressing plans using community addressing
US5878420A (en)*1995-08-311999-03-02Compuware CorporationNetwork monitoring and management system
US6014700A (en)*1997-05-082000-01-11International Business Machines CorporationWorkload management in a client-server network with distributed objects
US6058434A (en)*1997-11-262000-05-02Acuity Imaging, LlcApparent network interface for and between embedded and host processors
US6064723A (en)*1994-09-162000-05-16Octel Communications CorporationNetwork-based multimedia communications and directory system and method of operation
US6067546A (en)*1997-02-182000-05-23Ameritech CorporationMethod and system for providing computer-network related information about a calling party
US6088451A (en)*1996-06-282000-07-11Mci Communications CorporationSecurity system and method for network element access
US6088804A (en)*1998-01-122000-07-11Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US6092218A (en)*1992-07-172000-07-18Sun Microsystems, Inc.System and method for self-referential accesses in a multiprocessor computer
US6119236A (en)*1996-10-072000-09-12Shipley; Peter M.Intelligent network security device and method
US6182123B1 (en)*1988-07-152001-01-30Ibm Corp.Interactive computer network and method of operation
US6185207B1 (en)*1997-06-192001-02-06International Business Machines CorporationCommunication system having a local area network adapter for selectively deleting information and method therefor
US6226700B1 (en)*1998-03-132001-05-01Compaq Computer CorporationComputer system with bridge logic that includes an internal modular expansion bus and a common master interface for internal master devices
US20010003831A1 (en)*1998-05-292001-06-14Vernon K. BolandMethod and apparatus for allocating network resources and changing the allocation based on dynamic workload changes
US6278694B1 (en)*1999-04-162001-08-21Concord Communications Inc.Collecting and reporting monitoring data from remote network probes
US6279113B1 (en)*1998-03-162001-08-21Internet Tools, Inc.Dynamic signature inspection-based network intrusion detection
US6279028B1 (en)*1995-12-082001-08-21Silicon Graphics, Inc.Operating system having a mechanism for handling a group of related processes residing on separate machines
US6347398B1 (en)*1996-12-122002-02-12Microsoft CorporationAutomatic software downloading from a computer network
US6370648B1 (en)*1998-12-082002-04-09Visa International Service AssociationComputer network intrusion detection
US6385205B1 (en)*2000-02-082002-05-07The United States Of America As Represented By The National Security AgencyFilter system for information network traffic
US6393569B1 (en)*1996-12-182002-05-21Alexander S. OrenshteynSecured system for accessing application services from a remote station
US6405246B1 (en)*1998-09-222002-06-11International Business Machines CorporationAutomatic and dynamic software code management
US6411986B1 (en)*1998-11-102002-06-25Netscaler, Inc.Internet client-server multiplexer
US6430570B1 (en)*1999-03-012002-08-06Hewlett-Packard CompanyJava application manager for embedded device
US6442599B1 (en)*1995-08-112002-08-27Lsi Logic CorporationVideo storage unit architecture
US6446109B2 (en)*1998-06-292002-09-03Sun Microsystems, Inc.Application computing environment
US6460120B1 (en)*1999-08-272002-10-01International Business Machines CorporationNetwork processor, memory organization and methods
US6466965B1 (en)*1999-04-152002-10-15International Business Machines CorporationCentralized affinity maintenance in a workload managed client/server data processing system
US6519703B1 (en)*2000-04-142003-02-11James B. JoyceMethods and apparatus for heuristic firewall
US6532446B1 (en)*1999-11-242003-03-11Openwave Systems Inc.Server based speech recognition user interface for wireless devices
US20030051195A1 (en)*2000-05-052003-03-13Bosa Patrick A.Systems and methods for isolating faults in computer networks
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US6578066B1 (en)*1999-09-172003-06-10Alteon WebsystemsDistributed load-balancing internet servers
US6597684B1 (en)*1997-12-242003-07-22Nortel Networks Ltd.Distributed architecture and associated protocols for efficient quality of service-based route computation
US20040025044A1 (en)*2002-07-302004-02-05Day Christopher W.Intrusion detection system
US6708212B2 (en)*1998-11-092004-03-16Sri InternationalNetwork surveillance
US6728808B1 (en)*2000-02-072004-04-273Com CorporationMechanism for optimizing transaction retries within a system utilizing a PCI bus architecture
US6735206B1 (en)*2000-01-102004-05-11Sun Microsystems, Inc.Method and apparatus for performing a fast service lookup in cluster networking
US6769066B1 (en)*1999-10-252004-07-27Visa International Service AssociationMethod and apparatus for training a neural network model for use in computer network intrusion detection
US20050018618A1 (en)*2003-07-252005-01-27Mualem Hezi I.System and method for threat detection and response
US20050076228A1 (en)*2003-10-022005-04-07Davis John M.System and method for a secure I/O interface
US20050081058A1 (en)*2003-10-092005-04-14International Business Machines CorporationVLAN router with firewall supporting multiple security layers
US20050086520A1 (en)*2003-08-142005-04-21Sarang DharmapurikarMethod and apparatus for detecting predefined signatures in packet payload using bloom filters
US20050120090A1 (en)*2003-11-272005-06-02Satoshi KamiyaDevice, method and program for band control
US20050123003A1 (en)*1999-07-012005-06-09Cisco Technology, Inc.Method and apparatus for measuring network data packet delay, jitter and loss
US20050122958A1 (en)*2003-12-052005-06-09Shim Choon B.System and method for managing a VoIP network
US20050160340A1 (en)*2004-01-022005-07-21Naoki AbeResource-light method and apparatus for outlier detection
US6952728B1 (en)*1999-12-012005-10-04Nortel Networks LimitedProviding desired service policies to subscribers accessing internet
US20060020595A1 (en)*2004-07-262006-01-26Norton Marc AMethods and systems for multi-pattern searching
US20060025018A1 (en)*2004-07-302006-02-02Finisar CorporationFirst protocol to second protocol adapter
US6999952B1 (en)*2001-04-182006-02-14Cisco Technology, Inc.Linear associative memory-based hardware architecture for fault tolerant ASIC/FPGA work-around
US7013333B1 (en)*1998-12-032006-03-14British Telecommunications Public Limited CompanyNetwork management system
US7023825B1 (en)*1998-08-102006-04-04Nokia Networks OyControlling quality of service in a mobile communications system
US20060104288A1 (en)*2004-11-162006-05-18Wai YimMethod and apparatus for tunneling data using a single simulated stateful TCP connection
US7062556B1 (en)*1999-11-222006-06-13Motorola, Inc.Load balancing method in a communication network
US7069293B2 (en)*1998-12-142006-06-27International Business Machines CorporationMethods, systems and computer program products for distribution of application programs to a target station on a network
US20070041364A1 (en)*2005-08-122007-02-22Cellco Partnership (D/B/A Verizon Wireless)Integrated packet latency aware QoS scheduling using proportional fairness and weighted fair queuing for wireless integrated multimedia packet services
US20070088826A1 (en)*2001-07-262007-04-19Citrix Application Networking, LlcSystems and Methods for Controlling the Number of Connections Established with a Server
US20070180449A1 (en)*2006-01-242007-08-02Citrix Systems, Inc.Methods and systems for providing remote access to a computing environment provided by a virtual machine
US20080133518A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US20080229415A1 (en)*2005-07-012008-09-18Harsh KapoorSystems and methods for processing data flows
US20080262991A1 (en)*2005-07-012008-10-23Harsh KapoorSystems and methods for processing data flows
US20080262900A1 (en)*2007-04-182008-10-23Michael Day DuffyMethods and apparatus to facilitate sales estimates
US20090006659A1 (en)*2001-10-192009-01-01Collins Jack MAdvanced mezzanine card for digital network data inspection
US7516227B2 (en)*1999-11-152009-04-07Fred CohenMethod and apparatus for network deception/emulation
US7574740B1 (en)*2000-04-282009-08-11International Business Machines CorporationMethod and system for intrusion detection in a computer network
US7577623B2 (en)*2006-01-182009-08-18International Business Machines CorporationMethod for controlling risk in a computer security artificial neural network expert system
US20100042565A1 (en)*2000-09-252010-02-18Crossbeam Systems, Inc.Mezzazine in-depth data analysis facility
US7797530B2 (en)*2001-04-092010-09-14Hewlett-Packard CompanyAuthentication and encryption method and apparatus for a wireless local access network
US7913303B1 (en)*2003-01-212011-03-22International Business Machines CorporationMethod and system for dynamically protecting a computer system from attack
US7921204B2 (en)*2002-07-162011-04-05Sonicwall, Inc.Message testing based on a determinate message classification and minimized resource consumption
US7934254B2 (en)*1998-12-092011-04-26International Business Machines CorporationMethod and apparatus for providing network and computer system security
US20110213869A1 (en)*2000-09-252011-09-01Yevgeny KorsunskyProcessing data flows with a data flow processor
US20110219035A1 (en)*2000-09-252011-09-08Yevgeny KorsunskyDatabase security via data flow processing
US20110231564A1 (en)*2000-09-252011-09-22Yevgeny KorsunskyProcessing data flows with a data flow processor
US20110231510A1 (en)*2000-09-252011-09-22Yevgeny KorsunskyProcessing data flows with a data flow processor
US20110238855A1 (en)*2000-09-252011-09-29Yevgeny KorsunskyProcessing data flows with a data flow processor
US20120017262A1 (en)*2000-09-252012-01-19Harsh KapoorSystems and methods for processing data flows
US20120240185A1 (en)*2000-09-252012-09-20Harsh KapoorSystems and methods for processing data flows

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
KR920006283B1 (en)1988-02-191992-08-03미쯔비시덴끼 가부시끼가이샤 Digital signal processing method
JPH0328911A (en)*1989-06-261991-02-07Mitsubishi Electric Corp microprocessor
GB2281793A (en)1993-09-111995-03-15IbmA data processing system for providing user load levelling in a network
US6317775B1 (en)*1995-11-032001-11-13Cisco Technology, Inc.System for distributing load over multiple servers at an internet site
US5978843A (en)*1995-12-061999-11-02Industrial Technology Research InstituteScalable architecture for media-on-demand servers
US6816903B1 (en)*1997-05-272004-11-09Novell, Inc.Directory enabled policy management tool for intelligent traffic management
US6006264A (en)*1997-08-011999-12-21Arrowpoint Communications, Inc.Method and system for directing a flow between a client and a server
US5975945A (en)*1997-08-291999-11-02Lucent Technologies Inc.All-purpose network interface devices using conventional plug-in protectors
US6314463B1 (en)*1998-05-292001-11-06Webspective Software, Inc.Method and system for measuring queue length and delay
US20020165947A1 (en)2000-09-252002-11-07Crossbeam Systems, Inc.Network application apparatus
US7478427B2 (en)*2003-05-052009-01-13Alcatel-Lucent Usa Inc.Method and apparatus for providing adaptive VPN to enable different security levels in virtual private networks (VPNs)
EP2432188B1 (en)2005-12-132016-04-20Blue Coat Systems, Inc.Systems and methods for processing data flows

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US723726A (en)*1902-12-061903-03-24George W PerksFountain-pen.
US5276899A (en)*1981-04-011994-01-04Teredata CorporationMulti processor sorting network for sorting while transmitting concurrently presented messages by message content to deliver a highest priority message
US5134691A (en)*1986-04-011992-07-28Westinghouse Electric Corp.Bidirectional communication and control network with programmable microcontroller interfacing digital ICs transmitting in serial format to controlled product
US6182123B1 (en)*1988-07-152001-01-30Ibm Corp.Interactive computer network and method of operation
US5062037A (en)*1988-10-241991-10-29Ibm Corp.Method to provide concurrent execution of distributed application programs by a host computer and an intelligent work station on an sna network
US5446680A (en)*1991-08-091995-08-29Ibm Business Machines CorporationSystem and method for obtaining network performance data
US5522070A (en)*1992-03-191996-05-28Fujitsu LimitedComputer resource distributing method and system for distributing a multiplicity of processes to a plurality of computers connected in a network
US5790176A (en)*1992-07-081998-08-04Bell Atlantic Network Services, Inc.Media server for supplying video and multi-media data over the public switched telephone network
US6092218A (en)*1992-07-172000-07-18Sun Microsystems, Inc.System and method for self-referential accesses in a multiprocessor computer
US5621889A (en)*1993-06-091997-04-15Alcatel Alsthom Compagnie Generale D'electriciteFacility for detecting intruders and suspect callers in a computer installation and a security system including such a facility
US5557742A (en)*1994-03-071996-09-17Haystack Labs, Inc.Method and system for detecting intrusion into and misuse of a data processing system
US5675797A (en)*1994-05-241997-10-07International Business Machines CorporationGoal-oriented resource allocation manager and performance index technique for servers
US5486982A (en)*1994-06-101996-01-23Hsu; WinstonModular electronic packaging for computer servers
US5867716A (en)*1994-06-141999-02-02Hitachi, Ltd.Distributed computer system and method of generating automatic operation schedule for the same
US6064723A (en)*1994-09-162000-05-16Octel Communications CorporationNetwork-based multimedia communications and directory system and method of operation
US5872779A (en)*1994-09-161999-02-16Lucent Technologies Inc.System and method for private addressing plans using community addressing
US5774668A (en)*1995-06-071998-06-30Microsoft CorporationSystem for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancing
US6442599B1 (en)*1995-08-112002-08-27Lsi Logic CorporationVideo storage unit architecture
US5878420A (en)*1995-08-311999-03-02Compuware CorporationNetwork monitoring and management system
US5771234A (en)*1995-12-061998-06-23Industrial Technology Research InstituteMethod and system for ATM cell multiplexing under constant bit rate, variable bit rate and best-effort traffic
US6279028B1 (en)*1995-12-082001-08-21Silicon Graphics, Inc.Operating system having a mechanism for handling a group of related processes residing on separate machines
US6088451A (en)*1996-06-282000-07-11Mci Communications CorporationSecurity system and method for network element access
US6119236A (en)*1996-10-072000-09-12Shipley; Peter M.Intelligent network security device and method
US6347398B1 (en)*1996-12-122002-02-12Microsoft CorporationAutomatic software downloading from a computer network
US6393569B1 (en)*1996-12-182002-05-21Alexander S. OrenshteynSecured system for accessing application services from a remote station
US6067546A (en)*1997-02-182000-05-23Ameritech CorporationMethod and system for providing computer-network related information about a calling party
US6014700A (en)*1997-05-082000-01-11International Business Machines CorporationWorkload management in a client-server network with distributed objects
US6185207B1 (en)*1997-06-192001-02-06International Business Machines CorporationCommunication system having a local area network adapter for selectively deleting information and method therefor
US6058434A (en)*1997-11-262000-05-02Acuity Imaging, LlcApparent network interface for and between embedded and host processors
US6597684B1 (en)*1997-12-242003-07-22Nortel Networks Ltd.Distributed architecture and associated protocols for efficient quality of service-based route computation
US6088804A (en)*1998-01-122000-07-11Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US6226700B1 (en)*1998-03-132001-05-01Compaq Computer CorporationComputer system with bridge logic that includes an internal modular expansion bus and a common master interface for internal master devices
US6279113B1 (en)*1998-03-162001-08-21Internet Tools, Inc.Dynamic signature inspection-based network intrusion detection
US20010003831A1 (en)*1998-05-292001-06-14Vernon K. BolandMethod and apparatus for allocating network resources and changing the allocation based on dynamic workload changes
US6446109B2 (en)*1998-06-292002-09-03Sun Microsystems, Inc.Application computing environment
US7023825B1 (en)*1998-08-102006-04-04Nokia Networks OyControlling quality of service in a mobile communications system
US6405246B1 (en)*1998-09-222002-06-11International Business Machines CorporationAutomatic and dynamic software code management
US6708212B2 (en)*1998-11-092004-03-16Sri InternationalNetwork surveillance
US6411986B1 (en)*1998-11-102002-06-25Netscaler, Inc.Internet client-server multiplexer
US7013333B1 (en)*1998-12-032006-03-14British Telecommunications Public Limited CompanyNetwork management system
US6370648B1 (en)*1998-12-082002-04-09Visa International Service AssociationComputer network intrusion detection
US7934254B2 (en)*1998-12-092011-04-26International Business Machines CorporationMethod and apparatus for providing network and computer system security
US7069293B2 (en)*1998-12-142006-06-27International Business Machines CorporationMethods, systems and computer program products for distribution of application programs to a target station on a network
US6430570B1 (en)*1999-03-012002-08-06Hewlett-Packard CompanyJava application manager for embedded device
US6466965B1 (en)*1999-04-152002-10-15International Business Machines CorporationCentralized affinity maintenance in a workload managed client/server data processing system
US6278694B1 (en)*1999-04-162001-08-21Concord Communications Inc.Collecting and reporting monitoring data from remote network probes
US20050123003A1 (en)*1999-07-012005-06-09Cisco Technology, Inc.Method and apparatus for measuring network data packet delay, jitter and loss
US6460120B1 (en)*1999-08-272002-10-01International Business Machines CorporationNetwork processor, memory organization and methods
US6578066B1 (en)*1999-09-172003-06-10Alteon WebsystemsDistributed load-balancing internet servers
US6769066B1 (en)*1999-10-252004-07-27Visa International Service AssociationMethod and apparatus for training a neural network model for use in computer network intrusion detection
US7516227B2 (en)*1999-11-152009-04-07Fred CohenMethod and apparatus for network deception/emulation
US7062556B1 (en)*1999-11-222006-06-13Motorola, Inc.Load balancing method in a communication network
US6532446B1 (en)*1999-11-242003-03-11Openwave Systems Inc.Server based speech recognition user interface for wireless devices
US6952728B1 (en)*1999-12-012005-10-04Nortel Networks LimitedProviding desired service policies to subscribers accessing internet
US6735206B1 (en)*2000-01-102004-05-11Sun Microsystems, Inc.Method and apparatus for performing a fast service lookup in cluster networking
US6728808B1 (en)*2000-02-072004-04-273Com CorporationMechanism for optimizing transaction retries within a system utilizing a PCI bus architecture
US6385205B1 (en)*2000-02-082002-05-07The United States Of America As Represented By The National Security AgencyFilter system for information network traffic
US6519703B1 (en)*2000-04-142003-02-11James B. JoyceMethods and apparatus for heuristic firewall
US7574740B1 (en)*2000-04-282009-08-11International Business Machines CorporationMethod and system for intrusion detection in a computer network
US20030051195A1 (en)*2000-05-052003-03-13Bosa Patrick A.Systems and methods for isolating faults in computer networks
US20100042565A1 (en)*2000-09-252010-02-18Crossbeam Systems, Inc.Mezzazine in-depth data analysis facility
US20120240185A1 (en)*2000-09-252012-09-20Harsh KapoorSystems and methods for processing data flows
US8135657B2 (en)*2000-09-252012-03-13Crossbeam Systems, Inc.Systems and methods for processing data flows
US20120017262A1 (en)*2000-09-252012-01-19Harsh KapoorSystems and methods for processing data flows
US20110238855A1 (en)*2000-09-252011-09-29Yevgeny KorsunskyProcessing data flows with a data flow processor
US20080162390A1 (en)*2000-09-252008-07-03Harsh KapoorSystems and methods for processing data flows
US20110231510A1 (en)*2000-09-252011-09-22Yevgeny KorsunskyProcessing data flows with a data flow processor
US20110231564A1 (en)*2000-09-252011-09-22Yevgeny KorsunskyProcessing data flows with a data flow processor
US20110219035A1 (en)*2000-09-252011-09-08Yevgeny KorsunskyDatabase security via data flow processing
US20110213869A1 (en)*2000-09-252011-09-01Yevgeny KorsunskyProcessing data flows with a data flow processor
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US7797530B2 (en)*2001-04-092010-09-14Hewlett-Packard CompanyAuthentication and encryption method and apparatus for a wireless local access network
US6999952B1 (en)*2001-04-182006-02-14Cisco Technology, Inc.Linear associative memory-based hardware architecture for fault tolerant ASIC/FPGA work-around
US20070088826A1 (en)*2001-07-262007-04-19Citrix Application Networking, LlcSystems and Methods for Controlling the Number of Connections Established with a Server
US20090006659A1 (en)*2001-10-192009-01-01Collins Jack MAdvanced mezzanine card for digital network data inspection
US7921204B2 (en)*2002-07-162011-04-05Sonicwall, Inc.Message testing based on a determinate message classification and minimized resource consumption
US7260846B2 (en)*2002-07-302007-08-21Steelcloud, Inc.Intrusion detection system
US20040025044A1 (en)*2002-07-302004-02-05Day Christopher W.Intrusion detection system
US7913303B1 (en)*2003-01-212011-03-22International Business Machines CorporationMethod and system for dynamically protecting a computer system from attack
US20050018618A1 (en)*2003-07-252005-01-27Mualem Hezi I.System and method for threat detection and response
US20050086520A1 (en)*2003-08-142005-04-21Sarang DharmapurikarMethod and apparatus for detecting predefined signatures in packet payload using bloom filters
US20050076228A1 (en)*2003-10-022005-04-07Davis John M.System and method for a secure I/O interface
US20050081058A1 (en)*2003-10-092005-04-14International Business Machines CorporationVLAN router with firewall supporting multiple security layers
US20050120090A1 (en)*2003-11-272005-06-02Satoshi KamiyaDevice, method and program for band control
US20050122958A1 (en)*2003-12-052005-06-09Shim Choon B.System and method for managing a VoIP network
US20050160340A1 (en)*2004-01-022005-07-21Naoki AbeResource-light method and apparatus for outlier detection
US20060020595A1 (en)*2004-07-262006-01-26Norton Marc AMethods and systems for multi-pattern searching
US20060025018A1 (en)*2004-07-302006-02-02Finisar CorporationFirst protocol to second protocol adapter
US20060104288A1 (en)*2004-11-162006-05-18Wai YimMethod and apparatus for tunneling data using a single simulated stateful TCP connection
US20080134330A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US7979368B2 (en)*2005-07-012011-07-12Crossbeam Systems, Inc.Systems and methods for processing data flows
US20080133518A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US20080133517A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US20080229415A1 (en)*2005-07-012008-09-18Harsh KapoorSystems and methods for processing data flows
US20080262991A1 (en)*2005-07-012008-10-23Harsh KapoorSystems and methods for processing data flows
US20070041364A1 (en)*2005-08-122007-02-22Cellco Partnership (D/B/A Verizon Wireless)Integrated packet latency aware QoS scheduling using proportional fairness and weighted fair queuing for wireless integrated multimedia packet services
US7577623B2 (en)*2006-01-182009-08-18International Business Machines CorporationMethod for controlling risk in a computer security artificial neural network expert system
US20070180449A1 (en)*2006-01-242007-08-02Citrix Systems, Inc.Methods and systems for providing remote access to a computing environment provided by a virtual machine
US20080262900A1 (en)*2007-04-182008-10-23Michael Day DuffyMethods and apparatus to facilitate sales estimates

Cited By (897)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8046465B2 (en)2000-09-252011-10-25Crossbeam Systems, Inc.Flow scheduling for network application apparatus
US20110231513A1 (en)*2000-09-252011-09-22Yevgeny KorsunskyApplication distribution control network apparatus
US20100042565A1 (en)*2000-09-252010-02-18Crossbeam Systems, Inc.Mezzazine in-depth data analysis facility
US20060143499A1 (en)*2000-09-252006-06-29Crossbeam Systems, Inc.Flow scheduling for network application
US9244739B2 (en)2000-09-252016-01-26Blue Coat Systems, Inc.Applications processing in a network apparatus
US20110219035A1 (en)*2000-09-252011-09-08Yevgeny KorsunskyDatabase security via data flow processing
US9525696B2 (en)2000-09-252016-12-20Blue Coat Systems, Inc.Systems and methods for processing data flows
US20110214157A1 (en)*2000-09-252011-09-01Yevgeny KorsunskySecuring a network with data flow processing
US20110213869A1 (en)*2000-09-252011-09-01Yevgeny KorsunskyProcessing data flows with a data flow processor
US8402540B2 (en)2000-09-252013-03-19Crossbeam Systems, Inc.Systems and methods for processing data flows
US8010469B2 (en)2000-09-252011-08-30Crossbeam Systems, Inc.Systems and methods for processing data flows
US8135657B2 (en)*2000-09-252012-03-13Crossbeam Systems, Inc.Systems and methods for processing data flows
US20080262990A1 (en)*2000-09-252008-10-23Harsh KapoorSystems and methods for processing data flows
US20120017262A1 (en)*2000-09-252012-01-19Harsh KapoorSystems and methods for processing data flows
US7836443B2 (en)2000-09-252010-11-16Crossbeam Systems, Inc.Network application apparatus
US9800608B2 (en)2000-09-252017-10-24Symantec CorporationProcessing data flows with a data flow processor
US20110238783A1 (en)*2000-09-252011-09-29Yevgeny KorsunskySource-based data flow processing network apparatus
US20110238839A1 (en)*2000-09-252011-09-29Yevgeny KorsunskyNetwork intrusion detection apparatus
US20080162390A1 (en)*2000-09-252008-07-03Harsh KapoorSystems and methods for processing data flows
US7730175B1 (en)2003-05-122010-06-01Sourcefire, Inc.Systems and methods for identifying the services of a network
US7885190B1 (en)2003-05-122011-02-08Sourcefire, Inc.Systems and methods for determining characteristics of a network based on flow analysis
US7801980B1 (en)2003-05-122010-09-21Sourcefire, Inc.Systems and methods for determining characteristics of a network
US8578002B1 (en)2003-05-122013-11-05Sourcefire, Inc.Systems and methods for determining characteristics of a network and enforcing policy
US7949732B1 (en)2003-05-122011-05-24Sourcefire, Inc.Systems and methods for determining characteristics of a network and enforcing policy
US7716742B1 (en)2003-05-122010-05-11Sourcefire, Inc.Systems and methods for determining characteristics of a network and analyzing vulnerabilities
US8509095B2 (en)2003-10-032013-08-13Verizon Services Corp.Methodology for measurements and analysis of protocol conformance, performance and scalability of stateful border gateways
US7886348B2 (en)2003-10-032011-02-08Verizon Services Corp.Security management system for monitoring firewall operation
US7886350B2 (en)2003-10-032011-02-08Verizon Services Corp.Methodology for measurements and analysis of protocol conformance, performance and scalability of stateful border gateways
US20050076238A1 (en)*2003-10-032005-04-07Ormazabal Gaston S.Security management system for monitoring firewall operation
US7853996B1 (en)2003-10-032010-12-14Verizon Services Corp.Methodology, measurements and analysis of performance and scalability of stateful border gateways
US8001589B2 (en)2003-10-032011-08-16Verizon Services Corp.Network firewall test methods and apparatus
US20070291650A1 (en)*2003-10-032007-12-20Ormazabal Gaston SMethodology for measurements and analysis of protocol conformance, performance and scalability of stateful border gateways
US8046828B2 (en)2003-10-032011-10-25Verizon Services Corp.Security management system for monitoring firewall operation
US20100058457A1 (en)*2003-10-032010-03-04Verizon Services Corp.Methodology, Measurements and Analysis of Performance and Scalability of Stateful Border Gateways
US8015602B2 (en)2003-10-032011-09-06Verizon Services Corp.Methodology, measurements and analysis of performance and scalability of stateful border gateways
US20090083845A1 (en)*2003-10-032009-03-26Verizon Services Corp.Network firewall test methods and apparatus
US20090205039A1 (en)*2003-10-032009-08-13Verizon Services Corp.Security management system for monitoring firewall operation
US8925063B2 (en)2003-10-032014-12-30Verizon Patent And Licensing Inc.Security management system for monitoring firewall operation
US11916870B2 (en)2004-03-162024-02-27Icontrol Networks, Inc.Gateway registry methods and systems
US12253833B2 (en)2004-03-162025-03-18Icontrol Networks, Inc.Automation system with mobile interface
US11626006B2 (en)2004-03-162023-04-11Icontrol Networks, Inc.Management of a security system at a premises
US11625008B2 (en)2004-03-162023-04-11Icontrol Networks, Inc.Premises management networking
US11810445B2 (en)2004-03-162023-11-07Icontrol Networks, Inc.Cross-client sensor user interface in an integrated security network
US11991306B2 (en)2004-03-162024-05-21Icontrol Networks, Inc.Premises system automation
US11782394B2 (en)2004-03-162023-10-10Icontrol Networks, Inc.Automation system with mobile interface
US11656667B2 (en)2004-03-162023-05-23Icontrol Networks, Inc.Integrated security system with parallel processing architecture
US11757834B2 (en)2004-03-162023-09-12Icontrol Networks, Inc.Communication protocols in integrated systems
US11811845B2 (en)2004-03-162023-11-07Icontrol Networks, Inc.Communication protocols over internet protocol (IP) networks
US11601397B2 (en)2004-03-162023-03-07Icontrol Networks, Inc.Premises management configuration and control
US12063220B2 (en)2004-03-162024-08-13Icontrol Networks, Inc.Communication protocols in integrated systems
US11588787B2 (en)2004-03-162023-02-21Icontrol Networks, Inc.Premises management configuration and control
US11893874B2 (en)2004-03-162024-02-06Icontrol Networks, Inc.Networked touchscreen with integrated interfaces
US10623434B1 (en)2004-04-012020-04-14Fireeye, Inc.System and method for virtual analysis of network data
US9912684B1 (en)2004-04-012018-03-06Fireeye, Inc.System and method for virtual analysis of network data
US8296842B2 (en)2004-04-082012-10-23The Regents Of The University Of CaliforniaDetecting public network attacks using signatures and fast content analysis
US20050229254A1 (en)*2004-04-082005-10-13Sumeet SinghDetecting public network attacks using signatures and fast content analysis
US20080307524A1 (en)*2004-04-082008-12-11The Regents Of The University Of CaliforniaDetecting Public Network Attacks Using Signatures and Fast Content Analysis
US7966658B2 (en)*2004-04-082011-06-21The Regents Of The University Of CaliforniaDetecting public network attacks using signatures and fast content analysis
US7756885B2 (en)2004-07-262010-07-13Sourcefire, Inc.Methods and systems for multi-pattern searching
US7996424B2 (en)2004-07-262011-08-09Sourcefire, Inc.Methods and systems for multi-pattern searching
US20080133523A1 (en)*2004-07-262008-06-05Sourcefire, Inc.Methods and systems for multi-pattern searching
US20070192286A1 (en)*2004-07-262007-08-16Sourcefire, Inc.Methods and systems for multi-pattern searching
US20060161986A1 (en)*2004-11-092006-07-20Sumeet SinghMethod and apparatus for content classification
US20060098585A1 (en)*2004-11-092006-05-11Cisco Technology, Inc.Detecting malicious attacks using network behavior and header analysis
US7936682B2 (en)2004-11-092011-05-03Cisco Technology, Inc.Detecting malicious attacks using network behavior and header analysis
US8010685B2 (en)2004-11-092011-08-30Cisco Technology, Inc.Method and apparatus for content classification
US8640237B2 (en)*2005-01-102014-01-28Mcafee, Inc.Integrated firewall, IPS, and virus scanner system and method
US8555389B2 (en)2005-01-102013-10-08Mcafee, Inc.Integrated firewall, IPS, and virus scanner system and method
US20110296527A1 (en)*2005-01-102011-12-01Mcafee, Inc.Integrated firewall, ips, and virus scanner system and method
US20080196085A1 (en)*2005-02-182008-08-14Duaxes CorporationCommunication Control Apparatus
US11824675B2 (en)2005-03-162023-11-21Icontrol Networks, Inc.Networked touchscreen with integrated interfaces
US11700142B2 (en)2005-03-162023-07-11Icontrol Networks, Inc.Security network integrating security system and network devices
US11792330B2 (en)2005-03-162023-10-17Icontrol Networks, Inc.Communication and automation in a premises management system
US11595364B2 (en)2005-03-162023-02-28Icontrol Networks, Inc.System for data routing in networks
US12277853B2 (en)2005-03-162025-04-15Icontrol Networks, Inc.Gateway integrated with premises security system
US11706045B2 (en)2005-03-162023-07-18Icontrol Networks, Inc.Modular electronic display platform
US11615697B2 (en)2005-03-162023-03-28Icontrol Networks, Inc.Premise management systems and methods
US20110149736A1 (en)*2005-04-272011-06-23Extreme Networks, Inc.Integrated methods of performing network switch functions
US8767549B2 (en)*2005-04-272014-07-01Extreme Networks, Inc.Integrated methods of performing network switch functions
US20080229415A1 (en)*2005-07-012008-09-18Harsh KapoorSystems and methods for processing data flows
US20080134330A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US20080133518A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US20080262991A1 (en)*2005-07-012008-10-23Harsh KapoorSystems and methods for processing data flows
US7979368B2 (en)2005-07-012011-07-12Crossbeam Systems, Inc.Systems and methods for processing data flows
US20080133517A1 (en)*2005-07-012008-06-05Harsh KapoorSystems and methods for processing data flows
US20070064610A1 (en)*2005-09-192007-03-22Khandani Mehdi KDetection of nonconforming network traffic flow aggregates for mitigating distributed denial of service attacks
US7992208B2 (en)*2005-09-192011-08-02University Of MarylandDetection of nonconforming network traffic flow aggregates for mitigating distributed denial of service attacks
US20070067438A1 (en)*2005-09-212007-03-22Battelle Memorial InstituteMethods and systems for detecting abnormal digital traffic
US7908357B2 (en)*2005-09-212011-03-15Battelle Memorial InstituteMethods and systems for detecting abnormal digital traffic
US20070147380A1 (en)*2005-11-082007-06-28Ormazabal Gaston SSystems and methods for implementing protocol-aware network firewall
US9077685B2 (en)2005-11-082015-07-07Verizon Patent And Licensing Inc.Systems and methods for implementing a protocol-aware network firewall
US9374342B2 (en)2005-11-082016-06-21Verizon Patent And Licensing Inc.System and method for testing network firewall using fine granularity measurements
US8027251B2 (en)2005-11-082011-09-27Verizon Services Corp.Systems and methods for implementing protocol-aware network firewall
US8046833B2 (en)2005-11-142011-10-25Sourcefire, Inc.Intrusion event correlation with network discovery information
US20080198856A1 (en)*2005-11-142008-08-21Vogel William ASystems and methods for modifying network map attributes
US20080244741A1 (en)*2005-11-142008-10-02Eric GustafsonIntrusion event correlation with network discovery information
US7733803B2 (en)2005-11-142010-06-08Sourcefire, Inc.Systems and methods for modifying network map attributes
US8289882B2 (en)2005-11-142012-10-16Sourcefire, Inc.Systems and methods for modifying network map attributes
US20070127483A1 (en)*2005-12-022007-06-07AlcatelNetwork node with modular multi-stage packet classification
US8615785B2 (en)2005-12-302013-12-24Extreme Network, Inc.Network threat detection and mitigation
US20070240221A1 (en)*2006-04-062007-10-11George TuvellNon-Signature Malware Detection System and Method for Mobile Platforms
US9104871B2 (en)2006-04-062015-08-11Juniper Networks, Inc.Malware detection system and method for mobile platforms
US8312545B2 (en)2006-04-062012-11-13Juniper Networks, Inc.Non-signature malware detection system and method for mobile platforms
US20070240218A1 (en)*2006-04-062007-10-11George TuvellMalware Detection System and Method for Mobile Platforms
US9542555B2 (en)2006-04-062017-01-10Pulse Secure, LlcMalware detection system and method for compressed data on mobile platforms
US20070240217A1 (en)*2006-04-062007-10-11George TuvellMalware Modeling Detection System And Method for Mobile Platforms
US20070240219A1 (en)*2006-04-062007-10-11George TuvellMalware Detection System And Method for Compressed Data on Mobile Platforms
US9064115B2 (en)2006-04-062015-06-23Pulse Secure, LlcMalware detection system and method for limited access mobile platforms
US9576131B2 (en)2006-04-062017-02-21Juniper Networks, Inc.Malware detection system and method for mobile platforms
US9009818B2 (en)*2006-04-062015-04-14Pulse Secure, LlcMalware detection system and method for compressed data on mobile platforms
US20070240220A1 (en)*2006-04-062007-10-11George TuvellSystem and method for managing malware protection on mobile devices
US8321941B2 (en)2006-04-062012-11-27Juniper Networks, Inc.Malware modeling detection system and method for mobile platforms
US12063221B2 (en)2006-06-122024-08-13Icontrol Networks, Inc.Activation of gateway device
US7948988B2 (en)2006-07-272011-05-24Sourcefire, Inc.Device, system and method for analysis of fragments in a fragment train
US20080127342A1 (en)*2006-07-272008-05-29Sourcefire, Inc.Device, system and method for analysis of fragments in a fragment train
US20080034433A1 (en)*2006-08-012008-02-07Electronics And Telecommunications Research InstituteIntrusion detection apparatus and method using patterns
US8015610B2 (en)*2006-08-012011-09-06Electronics And Telecommunications Research InstituteIntrusion detection apparatus and method using patterns
US20080037423A1 (en)*2006-08-082008-02-14Pradeep SinghMapping Off-Network Traffic to an Administered Network
US7672238B2 (en)*2006-08-082010-03-02Opnet Technologies, Inc.Mapping off-network traffic to an administered network
US7701945B2 (en)*2006-08-102010-04-20Sourcefire, Inc.Device, system and method for analysis of segments in a transmission control protocol (TCP) session
US20080037587A1 (en)*2006-08-102008-02-14Sourcefire, Inc.Device, system and method for analysis of fragments in a transmission control protocol (TCP) session
US20120185614A1 (en)*2006-10-262012-07-19Reed Coke SNetwork Interface for Use in Parallel Computing Systems
US8874797B2 (en)*2006-10-262014-10-28Interactic Holding, LLCNetwork interface for use in parallel computing systems
US9473529B2 (en)2006-11-082016-10-18Verizon Patent And Licensing Inc.Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using method vulnerability filtering
US8966619B2 (en)2006-11-082015-02-24Verizon Patent And Licensing Inc.Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using return routability check filtering
US20080222724A1 (en)*2006-11-082008-09-11Ormazabal Gaston SPREVENTION OF DENIAL OF SERVICE (DoS) ATTACKS ON SESSION INITIATION PROTOCOL (SIP)-BASED SYSTEMS USING RETURN ROUTABILITY CHECK FILTERING
US20080183520A1 (en)*2006-11-172008-07-31Norwich UniversityMethods and apparatus for evaluating an organization
US8041641B1 (en)*2006-12-192011-10-18Symantec Operating CorporationBackup service and appliance with single-instance storage of encrypted data
US8812442B1 (en)*2006-12-192014-08-19Symantec Operating CorporationBackup service and appliance with single-instance storage of encrypted data
US8156557B2 (en)*2007-01-042012-04-10Cisco Technology, Inc.Protection against reflection distributed denial of service attacks
US20080168559A1 (en)*2007-01-042008-07-10Cisco Technology, Inc.Protection against reflection distributed denial of service attacks
US12120171B2 (en)2007-01-242024-10-15Icontrol Networks, Inc.Methods and systems for data communication
US11706279B2 (en)2007-01-242023-07-18Icontrol Networks, Inc.Methods and systems for data communication
US20080183705A1 (en)*2007-01-292008-07-31Sharp Laboratories Of America, Inc.Method and system for evaluating media-playing sets
US7647326B2 (en)*2007-01-292010-01-12Sharp Laboratories Of America, Inc.Method and system for evaluating media-playing sets
US8745179B2 (en)*2007-01-312014-06-03Cisco Technology, Inc.Managing multiple application configuration versions in a heterogeneous network
US20080181131A1 (en)*2007-01-312008-07-31Cisco Technology, Inc.Managing multiple application configuration versions in a heterogeneous network
US8631497B1 (en)*2007-02-012014-01-14Mcafee, Inc.Systems and methods for automating blind detection of computational vulnerabilities
US9369480B2 (en)2007-02-012016-06-14Mcafee, Inc.Systems and methods for automating blind detection of computational vulnerabilities
US20080196104A1 (en)*2007-02-092008-08-14George TuvellOff-line mms malware scanning system and method
US20140330849A1 (en)*2007-02-242014-11-06Trend Micro IncorporatedFast identification of complex strings in a data stream
US9600537B2 (en)2007-02-242017-03-21Trend Micro IncorporatedFast identification of complex strings in a data stream
US10169426B2 (en)*2007-02-242019-01-01Trend Micro IncorporatedFast identification of complex strings in a data stream
US10169425B2 (en)2007-02-242019-01-01Trend Micro IncorporatedFast identification of complex strings in a data stream
US10095755B2 (en)2007-02-242018-10-09Trend Micro IncorporatedFast identification of complex strings in a data stream
US8291021B2 (en)*2007-02-262012-10-16Red Hat, Inc.Graphical spam detection and filtering
US20080208987A1 (en)*2007-02-262008-08-28Red Hat, Inc.Graphical spam detection and filtering
US11809174B2 (en)2007-02-282023-11-07Icontrol Networks, Inc.Method and system for managing communication connectivity
US8069352B2 (en)2007-02-282011-11-29Sourcefire, Inc.Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session
US20080209518A1 (en)*2007-02-282008-08-28Sourcefire, Inc.Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session
US20080235370A1 (en)*2007-03-212008-09-25Somansa Co., Ltd.Method and System for Controlling Network Traffic of P2P and Instant Messenger Softwares
US9838757B2 (en)*2007-04-172017-12-05Thomson LicensingMethod to transmit video data in a data stream and associated metadata
US11663902B2 (en)2007-04-232023-05-30Icontrol Networks, Inc.Method and system for providing alternate network access
US8127353B2 (en)2007-04-302012-02-28Sourcefire, Inc.Real-time user awareness for a computer network
US20080276319A1 (en)*2007-04-302008-11-06Sourcefire, Inc.Real-time user awareness for a computer network
US8179803B2 (en)*2007-05-142012-05-15Advanced Media Systems Ltd.Methods, systems and apparatus for monitoring and/or generating communications in a communications network
US20090190479A1 (en)*2007-05-142009-07-30Brian ParsonsMethods, systems and apparatus for monitoring and/or generating communications in a communications network
US8464346B2 (en)*2007-05-242013-06-11Iviz Techno Solutions Pvt. LtdMethod and system simulating a hacking attack on a network
US20100138925A1 (en)*2007-05-242010-06-03Bikash BaraiMethod and system simulating a hacking attack on a network
US11601810B2 (en)2007-06-122023-03-07Icontrol Networks, Inc.Communication protocols in integrated systems
US12284057B2 (en)2007-06-122025-04-22Icontrol Networks, Inc.Systems and methods for device communication
US12250547B2 (en)2007-06-122025-03-11Icontrol Networks, Inc.Communication protocols in integrated systems
US12283172B2 (en)2007-06-122025-04-22Icontrol Networks, Inc.Communication protocols in integrated systems
US12184443B2 (en)2007-06-122024-12-31Icontrol Networks, Inc.Controlling data routing among networks
US11582065B2 (en)2007-06-122023-02-14Icontrol Networks, Inc.Systems and methods for device communication
US20220217537A1 (en)*2007-06-122022-07-07Icontrol Networks, Inc.Communication protocols in integrated systems
US11625161B2 (en)2007-06-122023-04-11Icontrol Networks, Inc.Control system user interface
US11646907B2 (en)2007-06-122023-05-09Icontrol Networks, Inc.Communication protocols in integrated systems
US11894986B2 (en)2007-06-122024-02-06Icontrol Networks, Inc.Communication protocols in integrated systems
US11632308B2 (en)2007-06-122023-04-18Icontrol Networks, Inc.Communication protocols in integrated systems
US11722896B2 (en)*2007-06-122023-08-08Icontrol Networks, Inc.Communication protocols in integrated systems
US20080313040A1 (en)*2007-06-152008-12-18Robert RoseContent distribution system including cost-per-engagement based advertising
US20080313011A1 (en)*2007-06-152008-12-18Robert RoseOnline marketing platform
US20080313026A1 (en)*2007-06-152008-12-18Robert RoseSystem and method for voting in online competitions
US8788335B2 (en)2007-06-152014-07-22Social Mecca, Inc.Content distribution system including cost-per-engagement based advertising
US8788334B2 (en)2007-06-152014-07-22Social Mecca, Inc.Online marketing platform
US8117657B1 (en)*2007-06-202012-02-14Extreme Networks, Inc.Detection and mitigation of rapidly propagating threats from P2P, IRC and gaming
US20120137357A1 (en)*2007-06-292012-05-31Verizon Patent And Licensing, Inc.System and method for testing network firewall for denial-of-service (dos) detection and prevention in signaling channel
US8635693B2 (en)*2007-06-292014-01-21Verizon Patent And Licensing Inc.System and method for testing network firewall for denial-of-service (DoS) detection and prevention in signaling channel
US8302186B2 (en)*2007-06-292012-10-30Verizon Patent And Licensing Inc.System and method for testing network firewall for denial-of-service (DOS) detection and prevention in signaling channel
US20090006841A1 (en)*2007-06-292009-01-01Verizon Services Corp.System and method for testing network firewall for denial-of-service (dos) detection and prevention in signaling channel
US20090007220A1 (en)*2007-06-292009-01-01Verizon Services Corp.Theft of service architectural integrity validation tools for session initiation protocol (sip)-based systems
US8522344B2 (en)2007-06-292013-08-27Verizon Patent And Licensing Inc.Theft of service architectural integrity validation tools for session initiation protocol (SIP)-based systems
USRE47830E1 (en)*2007-07-132020-01-28BoonLogic, LLCComputing device and method using associative pattern memory using recognition codes for input patterns
US8612371B1 (en)*2007-07-132013-12-17Larry J. WerthComputing device and method using associative pattern memory using recognition codes for input patterns
US8024473B1 (en)*2007-07-192011-09-20Mcafee, Inc.System, method, and computer program product to automate the flagging of obscure network flows as at least potentially unwanted
US8560715B1 (en)2007-07-192013-10-15Mcafee IncSystem, method, and computer program product to automate the flagging of obscure flows as at least potentially unwanted
US20090328193A1 (en)*2007-07-202009-12-31Hezi MooreSystem and Method for Implementing a Virtualized Security Platform
US8874572B1 (en)*2007-07-312014-10-28Megree, Inc.Method and computer program product for operating a social networking site
US9712490B1 (en)*2007-08-082017-07-18Juniper Networks, Inc.Identifying applications for intrusion detection systems
US10033696B1 (en)2007-08-082018-07-24Juniper Networks, Inc.Identifying applications for intrusion detection systems
US8291495B1 (en)*2007-08-082012-10-16Juniper Networks, Inc.Identifying applications for intrusion detection systems
US11815969B2 (en)2007-08-102023-11-14Icontrol Networks, Inc.Integrated security system with parallel processing architecture
US20100094849A1 (en)*2007-08-172010-04-15Robert RoseSystems and methods for creating user generated content incorporating content from a content catalog
US12301379B2 (en)2007-08-242025-05-13Icontrol Networks, Inc.Controlling data routing in premises management systems
US11831462B2 (en)2007-08-242023-11-28Icontrol Networks, Inc.Controlling data routing in premises management systems
US8069315B2 (en)2007-08-302011-11-29Nokia CorporationSystem and method for parallel scanning
WO2009027798A1 (en)*2007-08-302009-03-05Nokia CorporationSystem and method for parallel scanning
US20090063809A1 (en)*2007-08-302009-03-05Nokia CorporationSystem and method for parallel scanning
US8689330B2 (en)2007-09-052014-04-01Yahoo! Inc.Instant messaging malware protection
US20090064335A1 (en)*2007-09-052009-03-05Yahoo! Inc.Instant messaging malware protection
US20090089359A1 (en)*2007-09-272009-04-02Rockwell Automation Technologies, Inc.Subscription and notification in industrial systems
US8042185B1 (en)*2007-09-272011-10-18Netapp, Inc.Anti-virus blade
US20090089233A1 (en)*2007-09-282009-04-02Rockwell Automation Technologies, Inc.Correlation of non-times series events in industrial systems
US7908360B2 (en)*2007-09-282011-03-15Rockwell Automation Technologies, Inc.Correlation of non-times series events in industrial systems
US9300598B2 (en)2007-10-032016-03-29Virtela Technology Services IncorporatedVirtualized application acceleration infrastructure
WO2009045299A1 (en)*2007-10-032009-04-09Virtela Communications, Inc.Virtualized application acceleration infrastructure
US9300600B2 (en)2007-10-032016-03-29Virtela Technology Services IncorporatedVirtualized application acceleration infrastructure
US20090092137A1 (en)*2007-10-032009-04-09Virtela Communications, Inc.Virtualized application acceleration infrastructure
US8855114B2 (en)2007-10-032014-10-07Virtela Technology Services IncorporatedVirtualized application acceleration infrastructure
US9917792B2 (en)2007-10-032018-03-13Virtela Technology Services IncorporatedVirtualized application acceleration infrastructure
US20100290422A1 (en)*2007-10-032010-11-18Virtela Communications, Inc.Virtualized application acceleration infrastructure
WO2009049275A1 (en)*2007-10-122009-04-16Symantec CorporationMethod for detecting and resolving hidden text salting
US9300680B2 (en)*2007-10-232016-03-29International Business Machines CorporationBlocking intrusion attacks at an offending host
US10033749B2 (en)*2007-10-232018-07-24International Business Machines CorporationBlocking intrusion attacks at an offending host
US20120324576A1 (en)*2007-10-232012-12-20International Business Machines CorporationBlocking intrusion attacks at an offending host
US8286243B2 (en)*2007-10-232012-10-09International Business Machines CorporationBlocking intrusion attacks at an offending host
US20160191556A1 (en)*2007-10-232016-06-30International Business Machines CorporationBlocking intrusion attacks at an offending host
US9686298B2 (en)*2007-10-232017-06-20International Business Machines CorporationBlocking intrusion attacks at an offending host
US20090106838A1 (en)*2007-10-232009-04-23Adam Thomas ClarkBlocking Intrusion Attacks at an Offending Host
US20090112651A1 (en)*2007-10-312009-04-30American Express Travel Reated Services CompanyLatency locator
US20110153820A1 (en)*2007-10-312011-06-23American Express Travel Related Services Company, Inc.Latency locator
US7917446B2 (en)*2007-10-312011-03-29American Express Travel Related Services Company, Inc.Latency locator
US8280820B2 (en)2007-10-312012-10-02American Express Travel Related Services Company, Inc.Latency locator
US9485216B1 (en)2007-11-082016-11-01Juniper Networks, Inc.Multi-layered application classification and decoding
US8789180B1 (en)2007-11-082014-07-22Juniper Networks, Inc.Multi-layered application classification and decoding
US8112800B1 (en)2007-11-082012-02-07Juniper Networks, Inc.Multi-layered application classification and decoding
US9860210B1 (en)2007-11-082018-01-02Juniper Networks, Inc.Multi-layered application classification and decoding
US20090138794A1 (en)*2007-11-272009-05-28Joseph BeckerSystem and method for securing web applications
WO2009070714A1 (en)*2007-11-272009-06-04Joseph BeckerSystem and method for securing web applications
US20090271730A1 (en)*2007-11-302009-10-29Robert RoseSystem and method for conducting online campaigns
US8656298B2 (en)*2007-11-302014-02-18Social Mecca, Inc.System and method for conducting online campaigns
US20090150972A1 (en)*2007-12-072009-06-11Moon Yong-HyukApparatus and method for managing p2p traffic
US8010522B2 (en)*2007-12-072011-08-30International Business Machines CorporationSystem, method and program product for detecting SQL queries injected into data fields of requests made to applications
US20090150374A1 (en)*2007-12-072009-06-11International Business Machines CorporationSystem, method and program product for detecting sql queries injected into data fields of requests made to applications
US8146133B2 (en)*2007-12-072012-03-27Electronics And Telecommunications Research InstituteApparatus and method for managing P2P traffic
WO2009082438A3 (en)*2007-12-182009-08-13Solarwinds Worldwide LlcMethod of resolving network address to host names in network flows for network device
US20090158434A1 (en)*2007-12-182009-06-18Samsung S.D.S. Co., Ltd.Method of detecting virus infection of file
US20090154363A1 (en)*2007-12-182009-06-18Josh StephensMethod of resolving network address to host names in network flows for network device
US20090157473A1 (en)*2007-12-182009-06-18Att Knowledge Ventures L.P.System and method for sending targeted marketing data using proximity data
US20090177768A1 (en)*2008-01-092009-07-09International Business Machines CorporationSystems, methods and computer program products for extracting port-level information of web services with flow-based network monitoring
US7792959B2 (en)*2008-01-092010-09-07International Business Machines CorporationSystems, methods and computer program products for extracting port-level information of web services with flow-based network monitoring
US11916928B2 (en)2008-01-242024-02-27Icontrol Networks, Inc.Communication protocols over internet protocol (IP) networks
US9578055B1 (en)*2008-01-252017-02-21F5 Networks, Inc.Thwarting drone-waged denial of service attacks on a network
US20150213730A1 (en)*2008-02-192015-07-30Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US10777093B1 (en)2008-02-192020-09-15Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US9384677B2 (en)*2008-02-192016-07-05Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US10068493B2 (en)2008-02-192018-09-04Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US7849146B2 (en)2008-02-212010-12-07Yahoo! Inc.Identifying IP addresses for spammers
US20090216841A1 (en)*2008-02-212009-08-27Yahoo! Inc.Identifying ip addresses for spammers
JP2009225084A (en)*2008-03-172009-10-01Mitsubishi Electric CorpInformation leak testing device, computer program, and method of testing information leak
US20090252041A1 (en)*2008-04-032009-10-08Alcatel LucentOptimized statistics processing in integrated DPI service-oriented router deployments
US8474043B2 (en)2008-04-172013-06-25Sourcefire, Inc.Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing
US20150186646A1 (en)*2008-04-292015-07-02Mcafee, Inc.System, method, and computer program product for dynamically adjusting a level of security applied to a system
US20130276112A1 (en)*2008-04-292013-10-17Gregory William DalcherSystem, method, and computer program product for dynamically adjusting a level of security applied to a system
US8621608B2 (en)*2008-04-292013-12-31Mcafee, Inc.System, method, and computer program product for dynamically adjusting a level of security applied to a system
US8955121B2 (en)2008-04-292015-02-10Mcafee, Inc.System, method, and computer program product for dynamically adjusting a level of security applied to a system
US9338687B2 (en)2008-05-162016-05-10Cisco Technology, Inc.Quality of service determination based on upstream content source
US20090285225A1 (en)*2008-05-162009-11-19Dahod Ashraf MProviding trigger based traffic management
CN102027713A (en)*2008-05-162011-04-20思达伦特网络有限责任公司Providing trigger based traffic management
US8339954B2 (en)*2008-05-162012-12-25Cisco Technology, Inc.Providing trigger based traffic management
US8817618B2 (en)2008-05-162014-08-26Cisco Technology, Inc.Quality of service determination based on upstream content source
US8800043B2 (en)2008-05-192014-08-05Microsoft CorporationPre-emptive pre-indexing of sensitive and vulnerable assets
US20090287618A1 (en)*2008-05-192009-11-19Yahoo! Inc.Distributed personal spam filtering
US20090288141A1 (en)*2008-05-192009-11-19Microsoft CorporationPre-emptive pre-indexing of sensitive and vulnerable assets
US8108323B2 (en)2008-05-192012-01-31Yahoo! Inc.Distributed spam filtering utilizing a plurality of global classifiers and a local classifier
US9032503B2 (en)*2008-05-202015-05-12Shakeel MustafaDiversity string based pattern matching
US8339959B1 (en)2008-05-202012-12-25Juniper Networks, Inc.Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane
US20090293114A1 (en)*2008-05-202009-11-26Shakeel MustafaDiversity string based pattern matching
WO2009154947A2 (en)2008-05-282009-12-23Zscaler, Inc.Security message processing
EP2283670A4 (en)*2008-05-282014-11-05Zscaler Inc TREATMENT OF SECURITY MESSAGES
US20090300156A1 (en)*2008-05-312009-12-03Ramachandra YalakantiMethods And Systems For Managing Security In A Network
US9185122B2 (en)*2008-05-312015-11-10Hewlett-Packard Development Company, L.P.Methods and systems for managing security in a network
US20090313276A1 (en)*2008-06-172009-12-17Fujitsu LimitedProcess and device for data conversion, and computer-readable recording medium storing data conversion program
US11816323B2 (en)2008-06-252023-11-14Icontrol Networks, Inc.Automation system user interface
US20090327943A1 (en)*2008-06-262009-12-31Microsoft CorporationIdentifying application program threats through structural analysis
DE102008030125A1 (en)*2008-06-272010-01-14Klüver, Christina, Dr.Electronically stored text evaluating and searching method, involves assigning search words to neuron such that combining weights depends in frequency of search word in text with neuronal network, and calculating end activation of networks
US11419011B2 (en)2008-07-032022-08-16Hewlett Packard Enterprise Development LpData transmission via bonded tunnels of a virtual wide area network overlay with error correction
US10313930B2 (en)2008-07-032019-06-04Silver Peak Systems, Inc.Virtual wide area network overlays
US10805840B2 (en)2008-07-032020-10-13Silver Peak Systems, Inc.Data transmission via a virtual wide area network overlay
US11412416B2 (en)2008-07-032022-08-09Hewlett Packard Enterprise Development LpData transmission via bonded tunnels of a virtual wide area network overlay
US20100036786A1 (en)*2008-08-082010-02-11Yahoo! Inc.Real-time ad-hoc spam filtering of email
US8069128B2 (en)2008-08-082011-11-29Yahoo! Inc.Real-time ad-hoc spam filtering of email
US11962672B2 (en)2008-08-112024-04-16Icontrol Networks, Inc.Virtual device systems and methods
US11616659B2 (en)2008-08-112023-03-28Icontrol Networks, Inc.Integrated cloud system for premises automation
US11729255B2 (en)2008-08-112023-08-15Icontrol Networks, Inc.Integrated cloud system with lightweight gateway for premises automation
US12244663B2 (en)2008-08-112025-03-04Icontrol Networks, Inc.Integrated cloud system with lightweight gateway for premises automation
US11711234B2 (en)2008-08-112023-07-25Icontrol Networks, Inc.Integrated cloud system for premises automation
US11792036B2 (en)2008-08-112023-10-17Icontrol Networks, Inc.Mobile premises automation platform
US11758026B2 (en)2008-08-112023-09-12Icontrol Networks, Inc.Virtual device systems and methods
US12341865B2 (en)2008-08-112025-06-24Icontrol Networks, Inc.Virtual device systems and methods
US12267385B2 (en)2008-08-112025-04-01Icontrol Networks, Inc.Integrated cloud system with lightweight gateway for premises automation
US11641391B2 (en)2008-08-112023-05-02Icontrol Networks Inc.Integrated cloud system with lightweight gateway for premises automation
US20100058475A1 (en)*2008-08-262010-03-04Nec Laboratories America, Inc.Feedback-guided fuzz testing for learning inputs of coma
US20100071024A1 (en)*2008-09-122010-03-18Juniper Networks, Inc.Hierarchical application of security services within a computer network
US8955107B2 (en)*2008-09-122015-02-10Juniper Networks, Inc.Hierarchical application of security services within a computer network
US20100077043A1 (en)*2008-09-192010-03-25Yahoo! Inc.Detecting spam from a bulk registered e-mail account
US20100077040A1 (en)*2008-09-192010-03-25Yahoo! Inc.Detection of outbound sending of spam
US8892661B2 (en)2008-09-192014-11-18Yahoo! Inc.Detecting spam from a bulk registered e-mail account
US8868663B2 (en)2008-09-192014-10-21Yahoo! Inc.Detection of outbound sending of spam
US8826450B2 (en)2008-09-192014-09-02Yahoo! Inc.Detecting bulk fraudulent registration of email accounts
US20100073202A1 (en)*2008-09-252010-03-25Mazed Mohammad APortable internet appliance
CN102204172A (en)*2008-09-292011-09-28株式会社东芝Famolari david [us]; manousakis kyriakos [us]; sinkar kaustubh
US8868791B2 (en)2008-09-292014-10-21Toshiba America Research, Inc.System and method for evaluating multiple connectivity options
US20100083121A1 (en)*2008-09-292010-04-01Kabushiki Kaisha ToshibaSystem and method for evaluating multiple connectivity options
WO2010037131A1 (en)*2008-09-292010-04-01Kabushiki Kaisha ToshibaSystem and method for evaluating multiple connectivity options
CN102204172B (en)*2008-09-292015-03-18株式会社东芝System and method for evaluating multiple connectivity options
US8272055B2 (en)2008-10-082012-09-18Sourcefire, Inc.Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
US9055094B2 (en)2008-10-082015-06-09Cisco Technology, Inc.Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
US9450975B2 (en)2008-10-082016-09-20Cisco Technology, Inc.Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
US9258329B2 (en)2008-10-092016-02-09Juniper Networks, Inc.Dynamic access control policy with port restrictions for a network security appliance
US8572717B2 (en)2008-10-092013-10-29Juniper Networks, Inc.Dynamic access control policy with port restrictions for a network security appliance
US20100095367A1 (en)*2008-10-092010-04-15Juniper Networks, Inc.Dynamic access control policy with port restrictions for a network security appliance
US9774520B1 (en)2008-10-202017-09-26Juniper Networks, Inc.Service aware path selection with a network acceleration device
US8312542B2 (en)*2008-10-292012-11-13Lockheed Martin CorporationNetwork intrusion detection using MDL compress for deep packet inspection
US20100107254A1 (en)*2008-10-292010-04-29Eiland Edward ENetwork intrusion detection using mdl compress for deep packet inspection
US20100122345A1 (en)*2008-11-072010-05-13Chunghwa Telecom Co., Ltd.Control system and protection method for integrated information security services
US8621612B2 (en)*2008-11-072013-12-31Chunghwa Telecom Co., Ltd.Control system and protection method for integrated information security services
US8931087B1 (en)*2008-12-032015-01-06Verizon Patent And Licensing Inc.Reconfigurable virtualized remote computer security system
US8364766B2 (en)2008-12-042013-01-29Yahoo! Inc.Spam filtering based on statistics and token frequency modeling
US20100145900A1 (en)*2008-12-042010-06-10Yahoo! Inc.Spam filtering based on statistics and token frequency modeling
US9680877B2 (en)*2008-12-162017-06-13At&T Intellectual Property I, L.P.Systems and methods for rule-based anomaly detection on IP network flow
US9258217B2 (en)*2008-12-162016-02-09At&T Intellectual Property I, L.P.Systems and methods for rule-based anomaly detection on IP network flow
US20160105462A1 (en)*2008-12-162016-04-14At&T Intellectual Property I, L.P.Systems and Methods for Rule-Based Anomaly Detection on IP Network Flow
US20100153316A1 (en)*2008-12-162010-06-17At&T Intellectual Property I, LpSystems and methods for rule-based anomaly detection on ip network flow
US20100150006A1 (en)*2008-12-172010-06-17Telefonaktiebolaget L M Ericsson (Publ)Detection of particular traffic in communication networks
US20100162399A1 (en)*2008-12-182010-06-24At&T Intellectual Property I, L.P.Methods, apparatus, and computer program products that monitor and protect home and small office networks from botnet and malware activity
US8239948B1 (en)*2008-12-192012-08-07Symantec CorporationSelecting malware signatures to reduce false-positive detections
US20100161537A1 (en)*2008-12-232010-06-24At&T Intellectual Property I, L.P.System and Method for Detecting Email Spammers
US8898623B2 (en)2008-12-302014-11-25The Regents Of The University Of CaliforniaApplication design and data flow analysis
WO2010077362A3 (en)*2008-12-302010-09-02The Regents Of The University Of CaliforniaApplication design and data flow analysis
US20100205579A1 (en)*2008-12-302010-08-12Keliang ZhaoApplication Design And Data Flow Analysis
US9449034B2 (en)2009-01-072016-09-20Oracle International CorporationGeneric ontology based semantic business policy engine
US20100217783A1 (en)*2009-02-132010-08-26Ab Initio Technology LlcCommunicating with data storage systems
CN102395950A (en)*2009-02-132012-03-28起元技术有限责任公司Communicating with data storage systems
US9846732B2 (en)*2009-02-132017-12-19Ab Initio Technology LlcCommunicating with data storage systems
US20100211645A1 (en)*2009-02-182010-08-19Yahoo! Inc.Identification of a trusted message sender with traceable receipts
US9672478B2 (en)2009-02-262017-06-06Oracle International CorporationTechniques for semantic business policy composition
US10685312B2 (en)2009-02-262020-06-16Oracle International CorporationTechniques for semantic business policy composition
US20100218134A1 (en)*2009-02-262010-08-26Oracle International CorporationTechniques for semantic business policy composition
US10878358B2 (en)2009-02-262020-12-29Oracle International CorporationTechniques for semantic business policy composition
US20100235914A1 (en)*2009-03-132010-09-16Alcatel LucentIntrusion detection for virtual layer-2 services
US20100235909A1 (en)*2009-03-132010-09-16Silver Tail SystemsSystem and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Velocity Analysis
US20100235908A1 (en)*2009-03-132010-09-16Silver Tail SystemsSystem and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Analysis
US9398043B1 (en)2009-03-242016-07-19Juniper Networks, Inc.Applying fine-grain policy action to encapsulated network attacks
US20100250918A1 (en)*2009-03-272010-09-30Neuralitc SystemsMethod and system for identifying an application type of encrypted traffic
US8539221B2 (en)*2009-03-272013-09-17Guavus, Inc.Method and system for identifying an application type of encrypted traffic
US11856502B2 (en)2009-04-302023-12-26Icontrol Networks, Inc.Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises
US12245131B2 (en)2009-04-302025-03-04Icontrol Networks, Inc.Security, monitoring and automation controller access and use of legacy security control panel information
US11778534B2 (en)2009-04-302023-10-03Icontrol Networks, Inc.Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
US11997584B2 (en)2009-04-302024-05-28Icontrol Networks, Inc.Activation of a home automation controller
US11665617B2 (en)2009-04-302023-05-30Icontrol Networks, Inc.Server-based notification of alarm event subsequent to communication failure with armed security system
US11601865B2 (en)2009-04-302023-03-07Icontrol Networks, Inc.Server-based notification of alarm event subsequent to communication failure with armed security system
US12127095B2 (en)2009-04-302024-10-22Icontrol Networks, Inc.Custom content for premises management
US9880536B1 (en)*2009-05-042018-01-30Cypress Semiconductor CorporationAutonomous control in a programmable system
US20100287613A1 (en)*2009-05-082010-11-11Microsoft CorporationSanitization of packets
US8954725B2 (en)*2009-05-082015-02-10Microsoft Technology Licensing, LlcSanitization of packets
US20100293618A1 (en)*2009-05-122010-11-18Microsoft CorporationRuntime analysis of software privacy issues
US8959157B2 (en)*2009-06-262015-02-17Microsoft CorporationReal-time spam look-up system
US20100332601A1 (en)*2009-06-262010-12-30Walter Jason DReal-time spam look-up system
US9734037B1 (en)*2009-09-152017-08-15Symantec CorporationMobile application sampling for performance and network behavior profiling
US20110106937A1 (en)*2009-10-292011-05-05Fluke CorporationMixed-mode analysis
US9531670B2 (en)*2009-11-302016-12-27Iwebgate Technology LimitedSystem and method for network virtualization and security using computer systems and software
US20140245422A1 (en)*2009-11-302014-08-28Iwebgate Technology LimitedSystem and method for network virtualization and security using computer systems and software
US8925039B2 (en)*2009-12-142014-12-30At&T Intellectual Property I, L.P.System and method of selectively applying security measures to data services
US10845962B2 (en)2009-12-142020-11-24Ab Initio Technology LlcSpecifying user interface elements
US20110145887A1 (en)*2009-12-142011-06-16At&T Intellectual Property I, L.P.System and Method of Selectively Applying Security Measures to Data Services
US20110145748A1 (en)*2009-12-142011-06-16Ab Initio Technology LlcSpecifying user interface elements
US9043924B2 (en)2009-12-152015-05-26Seeker Security Ltd.Method and system of runtime analysis
US20160191557A1 (en)*2009-12-152016-06-30Synopsys, Inc.Methods and Systems of Detecting and Analyzing Correlated Operations in a Common Storage
EP2513800A4 (en)*2009-12-152017-06-14Synopsys, Inc.Methods and systems of detecting and analyzing correlated operations in a common storage
US10057280B2 (en)*2009-12-152018-08-21Synopsys, Inc.Methods and systems of detecting and analyzing correlated operations in a common storage
US8726394B2 (en)2009-12-152014-05-13Seeker Security Ltd.Method and system of runtime analysis
WO2011073983A1 (en)2009-12-152011-06-23Seeker Security Ltd.Methods and systems of detecting and analyzing correlated operations in a common storage
US9280668B2 (en)*2009-12-152016-03-08Synopsys, Inc.Methods and systems of detecting and analyzing correlated operations in a common storage
US20110149746A1 (en)*2009-12-212011-06-23Electronics And Telecommunications Research InstituteApparatus and method of monitoring packet stream in router using packet identity checking
US8769685B1 (en)*2010-02-032014-07-01Symantec CorporationSystems and methods for using file paths to identify potentially malicious computer files
US8260958B2 (en)*2010-02-242012-09-04F5 Networks, Inc.Reducing energy consumption of servers
US8447883B1 (en)2010-02-242013-05-21F5 Networks, Inc.Reducing energy consumption of servers
US20110208875A1 (en)*2010-02-242011-08-25Crescendo Networks Ltd.Reducing energy consumption of servers
US20120030202A1 (en)*2010-02-262012-02-02Oracle International CorporationTechniques for analyzing data from multiple sources
US8949236B2 (en)*2010-02-262015-02-03Oracle International CorporationTechniques for analyzing data from multiple sources
WO2011127158A1 (en)*2010-04-062011-10-13Justone Database, Inc.Data storage and/or retrieval based on a database model-agnostic, schema-agnostic and workload-agnostic data strorage and access models
US9965481B2 (en)2010-04-062018-05-08Edge Intelligence Software, Inc.Apparatus, systems and methods for data storage and/or retrieval based on a database model-agnostic, schema-agnostic and workload-agnostic data storage and access models
US8738608B2 (en)2010-04-062014-05-27Justone Database, Inc.Apparatus, systems and methods for data storage and/or retrieval based on a database model-agnostic, schema-agnostic and workload-agnostic data storage and access models
US8677486B2 (en)2010-04-162014-03-18Sourcefire, Inc.System and method for near-real time network attack detection, and system and method for unified detection via detection routing
US20110271341A1 (en)*2010-04-282011-11-03Symantec CorporationBehavioral signature generation using clustering
US8464345B2 (en)*2010-04-282013-06-11Symantec CorporationBehavioral signature generation using clustering
US9392005B2 (en)*2010-05-272016-07-12Samsung Sds Co., Ltd.System and method for matching pattern
US20110295894A1 (en)*2010-05-272011-12-01Samsung Sds Co., Ltd.System and method for matching pattern
US20110296003A1 (en)*2010-06-012011-12-01Microsoft CorporationUser account behavior techniques
US9110905B2 (en)2010-06-112015-08-18Cisco Technology, Inc.System and method for assigning network blocks to sensors
US8433790B2 (en)2010-06-112013-04-30Sourcefire, Inc.System and method for assigning network blocks to sensors
US10320835B1 (en)2010-06-212019-06-11Pulse Secure, LlcDetecting malware on mobile devices
US9202049B1 (en)2010-06-212015-12-01Pulse Secure, LlcDetecting malware on mobile devices
US8671182B2 (en)2010-06-222014-03-11Sourcefire, Inc.System and method for resolving operating system or service identity conflicts
US9400958B2 (en)2010-06-302016-07-26Oracle International CorporationTechniques for display of information related to policies
US10169763B2 (en)2010-07-292019-01-01Oracle International CorporationTechniques for analyzing data from multiple sources
US20130247183A1 (en)*2010-08-132013-09-19Mcafee, Inc.System, method, and computer program product for preventing a modification to a domain name system setting
US9294505B2 (en)2010-08-132016-03-22Mcafee, Inc.System, method, and computer program product for preventing a modification to a domain name system setting
US8869272B2 (en)*2010-08-132014-10-21Mcafee, Inc.System, method, and computer program product for preventing a modification to a domain name system setting
US9021588B2 (en)*2010-09-092015-04-28Siemens AktiengesellschaftMethod for processing messages in a communication network comprising a plurality of network nodes
US20130167234A1 (en)*2010-09-092013-06-27Siemens AktiengesellschaftMethod for Processing Messages in a Communication Network Comprising a Plurality of Network Nodes
US20140181312A1 (en)*2010-09-242014-06-26Nexios ItSystems and Methods for Peer-to-Peer IMS
US11900790B2 (en)2010-09-282024-02-13Icontrol Networks, Inc.Method, system and apparatus for automated reporting of account and sensor zone information to a central station
WO2012047885A1 (en)*2010-10-042012-04-12Openwave Systems Inc.Method and system for dynamic traffic steering
US8509071B1 (en)2010-10-062013-08-13Juniper Networks, Inc.Multi-dimensional traffic management
US8966020B2 (en)2010-11-022015-02-24International Business Machines CorporationIntegration of heterogeneous computing systems into a hybrid computing system
US8984109B2 (en)*2010-11-022015-03-17International Business Machines CorporationEnsemble having one or more computing systems and a controller thereof
US9081613B2 (en)2010-11-022015-07-14International Business Machines CorporationUnified resource manager providing a single point of control
US8972538B2 (en)2010-11-022015-03-03International Business Machines CorporationIntegration of heterogeneous computing systems into a hybrid computing system
US8959220B2 (en)2010-11-022015-02-17International Business Machines CorporationManaging a workload of a plurality of virtual servers of a computing environment
US9086918B2 (en)2010-11-022015-07-21International Business Machiness CorporationUnified resource manager providing a single point of control
US9253016B2 (en)2010-11-022016-02-02International Business Machines CorporationManagement of a data network of a computing environment
US9253017B2 (en)2010-11-022016-02-02International Business Machines CorporationManagement of a data network of a computing environment
US8918512B2 (en)2010-11-022014-12-23International Business Machines CorporationManaging a workload of a plurality of virtual servers of a computing environment
US20120110086A1 (en)*2010-11-022012-05-03International Business Machines CorporationEnsemble having one or more computing systems and a controller thereof
US10169754B2 (en)2010-11-172019-01-01Inside SecureMethod and system for NFC transaction
US10185950B2 (en)2010-11-172019-01-22Inside SecureNFC transaction server
US20120123945A1 (en)*2010-11-172012-05-17Inside SecureNfc transaction method and system
US9716723B2 (en)*2010-11-182017-07-25Nant Holdings Ip, LlcVector-based anomaly detection
US8683591B2 (en)*2010-11-182014-03-25Nant Holdings Ip, LlcVector-based anomaly detection
US20190238578A1 (en)*2010-11-182019-08-01Nant Holdings Ip, LlcVector-based anomaly detection
US10218732B2 (en)2010-11-182019-02-26Nant Holdings Ip, LlcVector-based anomaly detection
US20140165201A1 (en)*2010-11-182014-06-12Nant Holdings Ip, LlcVector-Based Anomaly Detection
US12206697B2 (en)2010-11-182025-01-21Nant Holdings Ip, LlcVector-based anomaly detection
US11848951B2 (en)2010-11-182023-12-19Nant Holdings Ip, LlcVector-based anomaly detection
US10542027B2 (en)*2010-11-182020-01-21Nant Holdings Ip, LlcVector-based anomaly detection
US11228608B2 (en)2010-11-182022-01-18Nant Holdings Ip, LlcVector-based anomaly detection
US20120131674A1 (en)*2010-11-182012-05-24Raptor Networks Technology, Inc.Vector-Based Anomaly Detection
US9197658B2 (en)*2010-11-182015-11-24Nant Holdings Ip, LlcVector-based anomaly detection
US20130195117A1 (en)*2010-11-292013-08-01Huawei Technologies Co., LtdParameter acquisition method and device for general protocol parsing and general protocol parsing method and device
US9917743B2 (en)2010-12-012018-03-13Cisco Technology, Inc.Directing data flows in data centers with clustering services
US20120144014A1 (en)*2010-12-012012-06-07Cisco Technology, Inc.Directing data flows in data centers with clustering services
US8533285B2 (en)*2010-12-012013-09-10Cisco Technology, Inc.Directing data flows in data centers with clustering services
US10587481B2 (en)2010-12-012020-03-10Cisco Technology, Inc.Directing data flows in data centers with clustering services
US12088425B2 (en)2010-12-162024-09-10Icontrol Networks, Inc.Bidirectional security sensor communication for a premises security system
US11750414B2 (en)2010-12-162023-09-05Icontrol Networks, Inc.Bidirectional security sensor communication for a premises security system
US20120159629A1 (en)*2010-12-162012-06-21National Taiwan University Of Science And TechnologyMethod and system for detecting malicious script
US12100287B2 (en)2010-12-172024-09-24Icontrol Networks, Inc.Method and system for processing security event data
US12021649B2 (en)2010-12-202024-06-25Icontrol Networks, Inc.Defining and implementing sensor triggered response rules
US20140304770A1 (en)*2010-12-302014-10-09Korea University Research And Business FoundationTerminal
US9264893B2 (en)*2010-12-302016-02-16Korea University Research And Business FoundationMethod for selecting access point with reliability
US20120174222A1 (en)*2010-12-302012-07-05Yunfeng PengMethod for the safety of network terminal devices
US9609083B2 (en)2011-02-102017-03-28Varmour Networks, Inc.Distributed service processing of network gateways using virtual machines
US20130339545A1 (en)*2011-02-242013-12-19The University Of TulsaNetwork-based hyperspeed communication and defense
US9432282B2 (en)*2011-02-242016-08-30The University Of TulsaNetwork-based hyperspeed communication and defense
US9398033B2 (en)2011-02-252016-07-19Cavium, Inc.Regular expression processing automaton
US8601034B2 (en)2011-03-112013-12-03Sourcefire, Inc.System and method for real time data awareness
US9135432B2 (en)2011-03-112015-09-15Cisco Technology, Inc.System and method for real time data awareness
US9584535B2 (en)2011-03-112017-02-28Cisco Technology, Inc.System and method for real time data awareness
US9652616B1 (en)*2011-03-142017-05-16Symantec CorporationTechniques for classifying non-process threats
US9069930B1 (en)*2011-03-292015-06-30Emc CorporationSecurity information and event management system employing security business objects and workflows
US9705977B2 (en)*2011-04-202017-07-11Symantec CorporationLoad balancing for network devices
US20120271964A1 (en)*2011-04-202012-10-25Blue Coat Systems, Inc.Load Balancing for Network Devices
US20120317647A1 (en)*2011-05-262012-12-13Carnegie Mellon UniversityAutomated Exploit Generation
US9135405B2 (en)*2011-05-262015-09-15Carnegie Mellon UniversityAutomated exploit generation
US8954309B2 (en)2011-05-312015-02-10Oracle International CorporationTechniques for application tuning
US8898096B2 (en)2011-05-312014-11-25Oracle International CorporationApplication configuration generation
US9665458B2 (en)2011-06-012017-05-30Data Security Solutions, LlcMethod and system for providing information from third party applications to devices
US8676729B1 (en)*2011-06-142014-03-18Narus, Inc.Network traffic classification using subspace clustering techniques
US10277510B2 (en)2011-08-022019-04-30Cavium, LlcSystem and method for storing lookup request rules in multiple memories
US9596222B2 (en)2011-08-022017-03-14Cavium, Inc.Method and apparatus encoding a rule for a lookup request in a processor
US9344366B2 (en)2011-08-022016-05-17Cavium, Inc.System and method for rule matching in a processor
US9866540B2 (en)2011-08-022018-01-09Cavium, Inc.System and method for rule matching in a processor
US9237171B2 (en)2011-08-172016-01-12Mcafee, Inc.System and method for indirect interface monitoring and plumb-lining
US9442881B1 (en)2011-08-312016-09-13Yahoo! Inc.Anti-spam transient entity classification
US20130064077A1 (en)*2011-09-132013-03-14Hitachi, Ltd.Node apparatus, system, and packet processing method
US9071635B1 (en)*2011-10-192015-06-30Wichorus, Inc.Methods and apparatus for identifying paging activities during idle mode
US8418249B1 (en)*2011-11-102013-04-09Narus, Inc.Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats
US20160021060A1 (en)*2011-11-232016-01-21Cavium, Inc.Reverse NFA Generation And Processing
US9762544B2 (en)*2011-11-232017-09-12Cavium, Inc.Reverse NFA generation and processing
US9203805B2 (en)*2011-11-232015-12-01Cavium, Inc.Reverse NFA generation and processing
US20130133064A1 (en)*2011-11-232013-05-23Cavium, Inc.Reverse nfa generation and processing
US20160021123A1 (en)*2011-11-232016-01-21Cavium, Inc.Reverse NFA Generation And Processing
US20130160129A1 (en)*2011-12-192013-06-20Verizon Patent And Licensing Inc.System security evaluation
US9813345B1 (en)2012-01-052017-11-07Juniper Networks, Inc.Offload of data transfer statistics from a mobile access gateway
US9251535B1 (en)2012-01-052016-02-02Juniper Networks, Inc.Offload of data transfer statistics from a mobile access gateway
US20130179531A1 (en)*2012-01-102013-07-11Daisuke SakaiNetwork communications apparatus, method, and medium
US20130185795A1 (en)*2012-01-122013-07-18Arxceo CorporationMethods and systems for providing network protection by progressive degradation of service
US8726338B2 (en)2012-02-022014-05-13Juniper Networks, Inc.Dynamic threat protection in mobile networks
US20190034631A1 (en)*2012-04-302019-01-31Verint Systems Ltd.System and method for malware detection
US11316878B2 (en)*2012-04-302022-04-26Cognyte Technologies Israel Ltd.System and method for malware detection
US10061922B2 (en)*2012-04-302018-08-28Verint Systems Ltd.System and method for malware detection
US20130347114A1 (en)*2012-04-302013-12-26Verint Systems Ltd.System and method for malware detection
US20150200962A1 (en)*2012-06-042015-07-16The Board Of Regents Of The University Of Texas SystemMethod and system for resilient and adaptive detection of malicious websites
US12003387B2 (en)2012-06-272024-06-04Comcast Cable Communications, LlcControl system user interface
US10511497B2 (en)*2012-10-042019-12-17Fortinet, Inc.System and method for dynamic management of network device data
US20140101301A1 (en)*2012-10-042014-04-10Stateless Networks, Inc.System and Method for Dynamic Management of Network Device Data
US20160380938A1 (en)*2012-10-092016-12-29Whatsapp Inc.System and method for detecting unwanted content
US9948588B2 (en)*2012-10-092018-04-17Whatsapp Inc.System and method for detecting unwanted content
US9306908B2 (en)*2012-11-192016-04-05Samsung Sds Co., Ltd.Anti-malware system, method of processing packet in the same, and computing device
US20140201828A1 (en)*2012-11-192014-07-17Samsung Sds Co., Ltd.Anti-malware system, method of processing packet in the same, and computing device
US10908835B1 (en)2013-01-102021-02-02Pure Storage, Inc.Reversing deletion of a virtual machine
US9891858B1 (en)*2013-01-102018-02-13Pure Storage, Inc.Deduplication of regions with a storage system
US11733908B2 (en)2013-01-102023-08-22Pure Storage, Inc.Delaying deletion of a dataset
US11573727B1 (en)2013-01-102023-02-07Pure Storage, Inc.Virtual machine backup and restoration
US20140195749A1 (en)*2013-01-102014-07-10Pure Storage, Inc.Deduplication of Volume Regions
US9589008B2 (en)*2013-01-102017-03-07Pure Storage, Inc.Deduplication of volume regions
US10198427B2 (en)2013-01-292019-02-05Verint Systems Ltd.System and method for keyword spotting using representative dictionary
US9811233B2 (en)2013-02-122017-11-07Ab Initio Technology LlcBuilding applications for configuring processes
US20140237137A1 (en)*2013-02-182014-08-21Cisco Technology, Inc.System for distributing flow to distributed service nodes using a unified application identifier
US10929266B1 (en)2013-02-232021-02-23Fireeye, Inc.Real-time visual playback with synchronous textual analysis log display and event/time indexing
US9195829B1 (en)2013-02-232015-11-24Fireeye, Inc.User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US10019338B1 (en)2013-02-232018-07-10Fireeye, Inc.User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
WO2014137416A1 (en)*2013-03-082014-09-12The Trustees Of Columbia University In The City Of New YorkIdentification of backdoors and backdoor triggers
US9916449B2 (en)2013-03-082018-03-13The Trustees Of Columbia University In The City Of New YorkIdentification of backdoors and backdoor triggers
US9298925B1 (en)*2013-03-082016-03-29Ca, Inc.Supply chain cyber security auditing systems, methods and computer program products
US9251343B1 (en)2013-03-152016-02-02Fireeye, Inc.Detecting bootkits resident on compromised computers
US9054952B2 (en)*2013-03-152015-06-09Extrahop Networks, Inc.Automated passive discovery of applications
US9191288B2 (en)2013-03-152015-11-17Extrahop Networks, Inc.Trigger based recording of flows with play back
US11586956B2 (en)*2013-05-282023-02-21Keysight Technologies, Inc.Searching apparatus utilizing sub-word finite state machines
US11038907B2 (en)2013-06-042021-06-15Verint Systems Ltd.System and method for malware detection learning
US9923913B2 (en)2013-06-042018-03-20Verint Systems Ltd.System and method for malware detection learning
US9654560B2 (en)*2013-06-272017-05-16Hitachi, Ltd.Management system and method
US20160248882A1 (en)*2013-06-272016-08-25Hitachi, Ltd.Management system and method
US11688020B1 (en)2013-07-112023-06-27Liberty Mutual Insurance CompanyHome telematics devices and insurance applications
US11393042B1 (en)2013-07-112022-07-19Liberty Mutual Insurance CompanyHome telematics devices and insurance applications
US10769727B1 (en)*2013-07-112020-09-08Liberty Mutual Insurance CompanyHome telematics devices and insurance applications
US12002109B1 (en)2013-07-112024-06-04Liberty Mutual Insurance CompanyHome telematics devices and insurance applications
US20150026794A1 (en)*2013-07-182015-01-22Palo Alto Networks, Inc.Packet classification for network routing
US9461967B2 (en)*2013-07-182016-10-04Palo Alto Networks, Inc.Packet classification for network routing
US11811731B2 (en)2013-07-182023-11-07Palo Alto Networks, Inc.Packet classification for network routing
US11394688B2 (en)2013-07-182022-07-19Palo Alto Networks, Inc.Packet classification for network routing
US12199949B2 (en)2013-07-182025-01-14Palo Alto Networks, Inc.Packet classification for network routing
US9426165B2 (en)2013-08-302016-08-23Cavium, Inc.Method and apparatus for compilation of finite automata
US10466964B2 (en)2013-08-302019-11-05Cavium, LlcEngine architecture for processing finite automata
US9563399B2 (en)2013-08-302017-02-07Cavium, Inc.Generating a non-deterministic finite automata (NFA) graph for regular expression patterns with advanced features
US9823895B2 (en)2013-08-302017-11-21Cavium, Inc.Memory management for finite automata processing
US9507563B2 (en)2013-08-302016-11-29Cavium, Inc.System and method to traverse a non-deterministic finite automata (NFA) graph generated for regular expression patterns with advanced features
US9785403B2 (en)2013-08-302017-10-10Cavium, Inc.Engine architecture for processing finite automata
US9426166B2 (en)2013-08-302016-08-23Cavium, Inc.Method and apparatus for processing finite automata
US12124586B2 (en)*2013-09-132024-10-22Omnissa, LlcRisk assessment for managed client devices
US9171160B2 (en)2013-09-302015-10-27Fireeye, Inc.Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US9910988B1 (en)2013-09-302018-03-06Fireeye, Inc.Malware analysis in accordance with an analysis plan
US10515214B1 (en)2013-09-302019-12-24Fireeye, Inc.System and method for classifying malware within content created during analysis of a specimen
US10713362B1 (en)2013-09-302020-07-14Fireeye, Inc.Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US20160259864A1 (en)*2013-11-062016-09-08Japan Science And Technology AgencyFluid transition route acquisition apparatus, fluid transition route acquisition method, and program
US10565321B2 (en)*2013-11-062020-02-18Japan Science And Technology AgencyFluid transition route acquisition apparatus, fluid transition route acquisition method, and program
US9560059B1 (en)2013-11-212017-01-31Fireeye, Inc.System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
US9189627B1 (en)2013-11-212015-11-17Fireeye, Inc.System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
US9419943B2 (en)2013-12-302016-08-16Cavium, Inc.Method and apparatus for processing of finite automata
US9275336B2 (en)2013-12-312016-03-01Cavium, Inc.Method and system for skipping over group(s) of rules based on skip group rule
US9544402B2 (en)2013-12-312017-01-10Cavium, Inc.Multi-rule approach to encoding a group of rules
US9667446B2 (en)2014-01-082017-05-30Cavium, Inc.Condition code approach for comparing rule and packet data that are provided in portions
US9904630B2 (en)2014-01-312018-02-27Cavium, Inc.Finite automata processing based on a top of stack (TOS) memory
US9602532B2 (en)2014-01-312017-03-21Cavium, Inc.Method and apparatus for optimizing finite automata processing
US10091238B2 (en)2014-02-112018-10-02Varmour Networks, Inc.Deception using distributed threat detection
US11943301B2 (en)2014-03-032024-03-26Icontrol Networks, Inc.Media content management
US10356044B2 (en)2014-03-172019-07-16Fortinet, Inc.Security information and event management
US9432389B1 (en)*2014-03-312016-08-30Fireeye, Inc.System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US10110558B2 (en)2014-04-142018-10-23Cavium, Inc.Processing of finite automata based on memory hierarchy
US10002326B2 (en)2014-04-142018-06-19Cavium, Inc.Compilation of finite automata based on memory hierarchy
US9438561B2 (en)2014-04-142016-09-06Cavium, Inc.Processing of finite automata based on a node cache
US20170048272A1 (en)*2014-04-252017-02-16Securebrain CorporationFraud detection network system and fraud detection method
US10469531B2 (en)*2014-04-252019-11-05SecureBrain Corporation & Hitachi Systems, Ltd.Fraud detection network system and fraud detection method
US9497100B2 (en)2014-05-052016-11-15IxiaMethods, systems, and computer readable media for providing fuzz testing functionality
US9210181B1 (en)*2014-05-262015-12-08Solana Networks Inc.Detection of anomaly in network flow data
US20150358345A1 (en)*2014-06-092015-12-10Meadow Hills, LLCActive attack detection system
US9628502B2 (en)*2014-06-092017-04-18Meadow Hills, LLCActive attack detection system
US11463360B2 (en)2014-07-242022-10-04Cognyte Technologies Israel Ltd.System and method for range matching
US10630588B2 (en)2014-07-242020-04-21Verint Systems Ltd.System and method for range matching
US10812361B2 (en)2014-07-302020-10-20Silver Peak Systems, Inc.Determining a transit appliance for data traffic to a software service
US11374845B2 (en)2014-07-302022-06-28Hewlett Packard Enterprise Development LpDetermining a transit appliance for data traffic to a software service
US11381493B2 (en)2014-07-302022-07-05Hewlett Packard Enterprise Development LpDetermining a transit appliance for data traffic to a software service
US9800592B2 (en)*2014-08-042017-10-24Microsoft Technology Licensing, LlcData center architecture that supports attack detection and mitigation
US10666676B1 (en)*2014-08-182020-05-26Trend Micro IncorporatedDetection of targeted email attacks
US10325094B2 (en)*2014-08-282019-06-18Mitsubishi Electric CorporationProcess analysis apparatus, process analysis method, and process analysis for determining input/output relation of a block of execution trace to detect potential malware
US10885156B2 (en)2014-09-052021-01-05Silver Peak Systems, Inc.Dynamic monitoring and authorization of an optimization device
US10719588B2 (en)2014-09-052020-07-21Silver Peak Systems, Inc.Dynamic monitoring and authorization of an optimization device
US11921827B2 (en)2014-09-052024-03-05Hewlett Packard Enterprise Development LpDynamic monitoring and authorization of an optimization device
US11954184B2 (en)2014-09-052024-04-09Hewlett Packard Enterprise Development LpDynamic monitoring and authorization of an optimization device
US11868449B2 (en)2014-09-052024-01-09Hewlett Packard Enterprise Development LpDynamic monitoring and authorization of an optimization device
US10846598B2 (en)2014-09-262020-11-24British Telecommunications Public Limited CompanyPattern matching
US10776427B2 (en)*2014-09-262020-09-15British Telecommunications Public Limited CompanyEfficient conditional state mapping in a pattern matching automaton
US9954887B2 (en)2014-09-292018-04-24Juniper Networks, Inc.Targeted attack discovery
US9571519B2 (en)*2014-09-292017-02-14Juniper Networks, Inc.Targeted attack discovery
US20160094565A1 (en)*2014-09-292016-03-31Juniper Networks, Inc.Targeted attack discovery
US10387804B2 (en)2014-09-302019-08-20BoonLogicImplementations of, and methods of use for a pattern memory engine applying associative pattern memory for pattern recognition
US9374383B2 (en)*2014-10-212016-06-21Cisco Technology, Inc.Events from network flows
US9483742B1 (en)*2014-10-272016-11-01Amazon Technologies, Inc.Intelligent traffic analysis to detect malicious activity
CN107408176A (en)*2014-12-232017-11-28迈克菲有限责任公司The execution of malicious objects dissects detection
US20160180090A1 (en)*2014-12-232016-06-23Mcafee, Inc.Execution profiling detection of malicious objects
US9934380B2 (en)*2014-12-232018-04-03Mcafee, LlcExecution profiling detection of malicious objects
US10333854B2 (en)*2015-01-042019-06-25Huawei Technologies Co., Ltd.Method and apparatus for detecting type of network data flow
US10560842B2 (en)2015-01-282020-02-11Verint Systems Ltd.System and method for combined network-side and off-air monitoring of wireless networks
US11432139B2 (en)2015-01-282022-08-30Cognyte Technologies Israel Ltd.System and method for combined network-side and off-air monitoring of wireless networks
US9716700B2 (en)*2015-02-192017-07-25International Business Machines CorporationCode analysis for providing data privacy in ETL systems
US20160246986A1 (en)*2015-02-192016-08-25International Business Machines CorporationCode analysis for providing data privacy in etl systems
US9716704B2 (en)*2015-02-192017-07-25International Business Machines CorporationCode analysis for providing data privacy in ETL systems
US20160248743A1 (en)*2015-02-192016-08-25International Business Machines CorporationCode analysis for providing data privacy in etl systems
US9609026B2 (en)2015-03-132017-03-28Varmour Networks, Inc.Segmented networks that implement scanning
WO2017040148A1 (en)*2015-03-132017-03-09Varmour Networks, Inc.Microsegmented networks that implement vulnerability scanning
US10110636B2 (en)2015-03-132018-10-23Varmour Networks, Inc.Segmented networks that implement scanning
US10193929B2 (en)2015-03-132019-01-29Varmour Networks, Inc.Methods and systems for improving analytics in distributed networks
US10178070B2 (en)2015-03-132019-01-08Varmour Networks, Inc.Methods and systems for providing security to distributed microservices
US9467476B1 (en)2015-03-132016-10-11Varmour Networks, Inc.Context aware microsegmentation
US9438634B1 (en)*2015-03-132016-09-06Varmour Networks, Inc.Microsegmented networks that implement vulnerability scanning
US10158672B2 (en)2015-03-132018-12-18Varmour Networks, Inc.Context aware microsegmentation
US9917924B2 (en)2015-03-162018-03-13Keysight Technologies Singapore (Holdings) Pte. Ltd.Methods, systems, and computer readable media for simplistic visual representation of complex interdependent network protocol fields for network protocol fuzzing and graphical framework for reporting instantaneous system level progress
US9432394B1 (en)*2015-03-162016-08-30IxiaMethods, systems, and computer readable media for converging on network protocol stack vulnerabilities using fuzzing variables, vulnerability ratings and progressive convergence
US10142426B2 (en)2015-03-292018-11-27Verint Systems Ltd.System and method for identifying communication session participants based on traffic patterns
US10623503B2 (en)2015-03-292020-04-14Verint Systems Ltd.System and method for identifying communication session participants based on traffic patterns
US20160294875A1 (en)*2015-03-302016-10-06Varmour Networks, Inc.System and method for threat-driven security policy controls
US10009381B2 (en)*2015-03-302018-06-26Varmour Networks, Inc.System and method for threat-driven security policy controls
US10333986B2 (en)2015-03-302019-06-25Varmour Networks, Inc.Conditional declarative policies
US9294442B1 (en)*2015-03-302016-03-22Varmour Networks, Inc.System and method for threat-driven security policy controls
US9621595B2 (en)2015-03-302017-04-11Varmour Networks, Inc.Conditional declarative policies
WO2016160595A1 (en)*2015-03-302016-10-06Varmour Networks, Inc.System and method for threat-driven security policy controls
US9380027B1 (en)2015-03-302016-06-28Varmour Networks, Inc.Conditional declarative policies
US9973472B2 (en)2015-04-022018-05-15Varmour Networks, Inc.Methods and systems for orchestrating physical and virtual switches to enforce security boundaries
US9525697B2 (en)2015-04-022016-12-20Varmour Networks, Inc.Delivering security functions to distributed networks
US10547515B2 (en)*2015-04-172020-01-28The Boeing CompanyMethods and systems for improved computer network analysis
US10200254B2 (en)*2015-04-172019-02-05The Boeing CompanyMethods and systems for improved computer network analysis
US11516241B2 (en)2015-04-172022-11-29Centripetal Networks, Inc.Rule-based network-threat detection
US10567413B2 (en)*2015-04-172020-02-18Centripetal Networks, Inc.Rule-based network-threat detection
US11792220B2 (en)2015-04-172023-10-17Centripetal Networks, LlcRule-based network-threat detection
US11012459B2 (en)2015-04-172021-05-18Centripetal Networks, Inc.Rule-based network-threat detection
US11700273B2 (en)2015-04-172023-07-11Centripetal Networks, LlcRule-based network-threat detection
US12015626B2 (en)2015-04-172024-06-18Centripetal Networks, LlcRule-based network-threat detection
US20160308729A1 (en)*2015-04-172016-10-20The Boeing CompanyMethods and systems for improved computer network analysis
US20190052540A1 (en)*2015-04-172019-02-14The Boeing CompanyMethods and systems for improved computer network analysis
US11496500B2 (en)2015-04-172022-11-08Centripetal Networks, Inc.Rule-based network-threat detection
US9621523B2 (en)2015-04-242017-04-11Extrahop Networks, Inc.Secure communication secret sharing
US9338147B1 (en)2015-04-242016-05-10Extrahop Networks, Inc.Secure communication secret sharing
US10326741B2 (en)2015-04-242019-06-18Extrahop Networks, Inc.Secure communication secret sharing
US11157800B2 (en)2015-07-242021-10-26Brainchip, Inc.Neural processor based accelerator system and method
US20170031611A1 (en)*2015-07-272017-02-02International Business Machines CorporationRegular expression matching with back-references using backtracking
US9875045B2 (en)*2015-07-272018-01-23International Business Machines CorporationRegular expression matching with back-references using backtracking
US10803766B1 (en)2015-07-282020-10-13Architecture Technology CorporationModular training of network-based training exercises
US10872539B1 (en)2015-07-282020-12-22Architecture Technology CorporationReal-time monitoring of network-based training exercises
US10083624B2 (en)2015-07-282018-09-25Architecture Technology CorporationReal-time monitoring of network-based training exercises
US9483317B1 (en)2015-08-172016-11-01Varmour Networks, Inc.Using multiple central processing unit cores for packet forwarding in virtualized networks
US11303500B1 (en)*2015-08-242022-04-12Virtual Instruments Worldwide, Inc.Storm detection, analysis, remediation, and other network behavior
US20170063907A1 (en)*2015-08-312017-03-02Splunk Inc.Multi-Stage Network Security Threat Detection
US11824646B1 (en)2015-08-312023-11-21Splunk Inc.Processing anomaly data to identify network security threats by use of rarity analysis
US12223418B1 (en)*2015-09-012025-02-11Netronome Systems, Inc.Communicating a neural network feature vector (NNFV) to a host and receiving back a set of weight values for a neural network
US10313195B2 (en)*2015-09-142019-06-04Huawei Technologies Co., Ltd.Dedicated protection for virtual network embedding
US20170078152A1 (en)*2015-09-142017-03-16Huawei Technologies Canada Co., Ltd.Dedicated Protection for Virtual Network Embedding
US20170111391A1 (en)*2015-10-152017-04-20International Business Machines CorporationEnhanced intrusion prevention system
KR101703446B1 (en)*2015-10-152017-02-06숭실대학교산학협력단Network capable of detection DoS attacks and Method for controlling thereof, Gateway and Managing server comprising the network
US10614107B2 (en)2015-10-222020-04-07Verint Systems Ltd.System and method for keyword searching using both static and dynamic dictionaries
US11093534B2 (en)2015-10-222021-08-17Verint Systems Ltd.System and method for keyword searching using both static and dynamic dictionaries
US10546008B2 (en)2015-10-222020-01-28Verint Systems Ltd.System and method for maintaining a dynamic dictionary
US11386135B2 (en)2015-10-222022-07-12Cognyte Technologies Israel Ltd.System and method for maintaining a dynamic dictionary
US20180322284A1 (en)*2015-10-292018-11-08Kuo ChiangMethods for preventing computer attacks in two-phase filtering and apparatuses using the same
CN109074456A (en)*2015-10-292018-12-21江格Computer attack blocking method of two-stage filtering and device using method
WO2017074402A1 (en)*2015-10-292017-05-04Cloudcoffer LlcMethods for preventing computer attacks in two-phase filtering and apparatuses using the same
TWI625641B (en)*2015-10-292018-06-01江格Methods for preventing computer attacks in two-phase filtering and apparatuses using the same
US11120132B1 (en)*2015-11-092021-09-148X8, Inc.Restricted replication for protection of replicated databases
US11153335B1 (en)2015-11-092021-10-198X8, Inc.Delayed replication for protection of replicated databases
US9521045B1 (en)*2015-11-162016-12-13International Business Machines CorporationManagement of decommissioned server assets in a shared data environment
US9917754B2 (en)*2015-11-162018-03-13International Business Machines CorporationManagement of decommissioned server assets in a shared data environment
US9559920B1 (en)*2015-11-162017-01-31International Business Machines CorporationManagement of decommissioned server assets in a shared data environment
US9426167B1 (en)*2015-11-162016-08-23International Business Machines CorporationManagement of decommissioned server assets in a shared data environment
US10979391B2 (en)2015-11-172021-04-13Cyber Adapt, Inc.Cyber threat attenuation using multi-source threat data analysis
US12231403B2 (en)2015-11-172025-02-18Zscaler, Inc.Cloud-based intrusion prevention system, multi-tenant firewall, and stream scanner
US11159486B2 (en)*2015-11-172021-10-26Zscaler, Inc.Stream scanner for identifying signature matches
US10454894B2 (en)*2015-11-172019-10-22Cyber Adapt, Inc.Cyber threat attenuation using multi-source threat data analysis
US10007786B1 (en)*2015-11-282018-06-26Symantec CorporationSystems and methods for detecting malware
TWI791418B (en)*2015-12-082023-02-11美商飛塔公司Systems and methods for detection of malicious code in runtime generated code, and related computer program product
US10191758B2 (en)2015-12-092019-01-29Varmour Networks, Inc.Directing data traffic between intra-server virtual machines
US10764323B1 (en)*2015-12-212020-09-01Amdocs Development LimitedSystem, method, and computer program for isolating services of a communication network in response to a distributed denial of service (DDoS) attack
US11570188B2 (en)*2015-12-282023-01-31Sixgill Ltd.Dark web monitoring, analysis and alert system and method
US10164861B2 (en)2015-12-282018-12-25Silver Peak Systems, Inc.Dynamic monitoring and visualization for network health characteristics
US10771370B2 (en)2015-12-282020-09-08Silver Peak Systems, Inc.Dynamic monitoring and visualization for network health characteristics
US11336553B2 (en)2015-12-282022-05-17Hewlett Packard Enterprise Development LpDynamic monitoring and visualization for network health characteristics of network device pairs
US10075416B2 (en)2015-12-302018-09-11Juniper Networks, Inc.Network session data sharing
US10382467B2 (en)2016-01-292019-08-13Varmour Networks, Inc.Recursive multi-layer examination for computer network security remediation
US9762599B2 (en)2016-01-292017-09-12Varmour Networks, Inc.Multi-node affinity-based examination for computer network security remediation
US9680852B1 (en)2016-01-292017-06-13Varmour Networks, Inc.Recursive multi-layer examination for computer network security remediation
US10204211B2 (en)2016-02-032019-02-12Extrahop Networks, Inc.Healthcare operations with passive network monitoring
EP3771173A1 (en)2016-02-232021-01-27Nchain Holdings LimitedReactive and pre-emptive security system for the protection of computer networks & systems
EP4156605A1 (en)2016-02-232023-03-29nChain Licensing AGReactive and pre-emptive security system for the protection of computer networks & systems
WO2017145001A1 (en)2016-02-232017-08-31nChain Holdings LimitedReactive and pre-emptive security system for the protection of computer networks & systems
US10735466B2 (en)2016-02-232020-08-04nChain Holdings LimitedReactive and pre-emptive security system for the protection of computer networks and systems
US12328339B2 (en)2016-02-232025-06-10Nchain Licensing AgReactive and pre-emptive security system for the protection of computer networks and systems
US20170279849A1 (en)*2016-03-242017-09-28Cisco Technology, Inc.Constraint-aware resource synchronization across hyper-distributed learning systems
US10009317B2 (en)2016-03-242018-06-26Varmour Networks, Inc.Security policy generation using container metadata
US9521115B1 (en)2016-03-242016-12-13Varmour Networks, Inc.Security policy generation using container metadata
US10552763B2 (en)*2016-03-242020-02-04Cisco Technology, Inc.Constraint-aware resource synchronization across hyper-distributed learning systems
US10187413B2 (en)*2016-03-252019-01-22Cisco Technology, Inc.Network-based approach for training supervised learning classifiers
US20170279839A1 (en)*2016-03-252017-09-28Cisco Technology, Inc.Network-based approach for training supervised learning classifiers
US10432650B2 (en)2016-03-312019-10-01Stuart StanifordSystem and method to protect a webserver against application exploits and attacks
US10762559B2 (en)*2016-04-152020-09-01Adp, LlcManagement of payroll lending within an enterprise system
US20170301013A1 (en)*2016-04-152017-10-19Adp, LlcManagement of Payroll Lending Within an Enterprise System
US11381977B2 (en)2016-04-252022-07-05Cognyte Technologies Israel Ltd.System and method for decrypting communication exchanged on a wireless local area network
US12388731B2 (en)2016-06-132025-08-12Hewlett Packard Enterprise Development LpHierarchical aggregation of select network traffic statistics
US10432484B2 (en)2016-06-132019-10-01Silver Peak Systems, Inc.Aggregating select network traffic statistics
US12355645B2 (en)2016-06-132025-07-08Hewlett Packard Enterprise Development LpAggregation of select network traffic statistics
US11757739B2 (en)2016-06-132023-09-12Hewlett Packard Enterprise Development LpAggregation of select network traffic statistics
US11757740B2 (en)2016-06-132023-09-12Hewlett Packard Enterprise Development LpAggregation of select network traffic statistics
US11601351B2 (en)2016-06-132023-03-07Hewlett Packard Enterprise Development LpAggregation of select network traffic statistics
US10009383B2 (en)2016-06-242018-06-26Varmour Networks, Inc.Data network microsegmentation
US10264025B2 (en)2016-06-242019-04-16Varmour Networks, Inc.Security policy generation for virtualization, bare-metal server, and cloud computing environments
US9560081B1 (en)2016-06-242017-01-31Varmour Networks, Inc.Data network microsegmentation
US9787639B1 (en)2016-06-242017-10-10Varmour Networks, Inc.Granular segmentation using events
US10755334B2 (en)2016-06-302020-08-25Varmour Networks, Inc.Systems and methods for continually scoring and segmenting open opportunities using client data and product predictors
US9729416B1 (en)2016-07-112017-08-08Extrahop Networks, Inc.Anomaly detection using device relationship graphs
US10382303B2 (en)2016-07-112019-08-13Extrahop Networks, Inc.Anomaly detection using device relationship graphs
US20180026997A1 (en)*2016-07-212018-01-25Level 3 Communications, LlcSystem and method for voice security in a telecommunications network
US10536468B2 (en)*2016-07-212020-01-14Level 3 Communications, LlcSystem and method for voice security in a telecommunications network
US9660879B1 (en)2016-07-252017-05-23Extrahop Networks, Inc.Flow deduplication across a cluster of network monitoring devices
US11741195B2 (en)*2016-08-012023-08-29Palantir Technologies Inc.Secure deployment of a software package
US20200233937A1 (en)*2016-08-012020-07-23Palantir Technologies Inc.Secure deployment of a software package
US10621314B2 (en)*2016-08-012020-04-14Palantir Technologies Inc.Secure deployment of a software package
US12277201B2 (en)2016-08-012025-04-15Palantir Technologies Inc.Secure deployment of a software package
US10848268B2 (en)2016-08-192020-11-24Silver Peak Systems, Inc.Forward packet recovery with constrained network overhead
US10326551B2 (en)2016-08-192019-06-18Silver Peak Systems, Inc.Forward packet recovery with constrained network overhead
US11424857B2 (en)2016-08-192022-08-23Hewlett Packard Enterprise Development LpForward packet recovery with constrained network overhead
US10203966B2 (en)*2016-08-262019-02-12Avago Technologies International Sales Pte. LimitedApplication launcher and management framework for a network device
US20180062922A1 (en)*2016-08-262018-03-01Brocade Communications Systems, Inc.Application launcher and management framework for a network device
US10958547B2 (en)*2016-09-092021-03-23Hewlett Packard Enterprise Development LpVerify a network function by inquiring a model using a query language
US20180077037A1 (en)*2016-09-092018-03-15Hewlett Packard Enterprise Development LpVerify a network function by inquiring a model using a query language
US10909419B2 (en)2016-09-202021-02-02Kabushiki Kaisha ToshibaAbnormality detection device, learning device, abnormality detection method, and learning method
US10542071B1 (en)*2016-09-272020-01-21Amazon Technologies, Inc.Event driven health checks for non-HTTP applications
US10491609B2 (en)2016-10-102019-11-26Verint Systems Ltd.System and method for generating data sets for learning to identify user actions
US11303652B2 (en)2016-10-102022-04-12Cognyte Technologies Israel LtdSystem and method for generating data sets for learning to identify user actions
US10944763B2 (en)2016-10-102021-03-09Verint Systems, Ltd.System and method for generating data sets for learning to identify user actions
US10320749B2 (en)*2016-11-072019-06-11Nicira, Inc.Firewall rule creation in a virtualized computing environment
US10931685B2 (en)*2016-12-122021-02-23Ut-Battelle, LlcMalware analysis and recovery
US20180167403A1 (en)*2016-12-122018-06-14Ut Battelle, LlcMalware analysis and recovery
US20180183823A1 (en)*2016-12-282018-06-28Samsung Electronics Co., Ltd.Apparatus for detecting anomaly and operating method for the same
US10594715B2 (en)*2016-12-282020-03-17Samsung Electronics Co., Ltd.Apparatus for detecting anomaly and operating method for the same
US20190306184A1 (en)*2017-01-312019-10-03Splunk Inc.Detection of anomalies in a time series using values of a different time series
US20210037037A1 (en)*2017-01-312021-02-04Splunk Inc.Predictive model selection for anomaly detection
US10375098B2 (en)*2017-01-312019-08-06Splunk Inc.Anomaly detection based on relationships between multiple time series
US10855712B2 (en)*2017-01-312020-12-01Splunk Inc.Detection of anomalies in a time series using values of a different time series
US11632383B2 (en)*2017-01-312023-04-18Splunk Inc.Predictive model selection for anomaly detection
US11044202B2 (en)2017-02-062021-06-22Silver Peak Systems, Inc.Multi-level learning for predicting and classifying traffic flows from first packet data
US10771394B2 (en)*2017-02-062020-09-08Silver Peak Systems, Inc.Multi-level learning for classifying traffic flows on a first packet from DNS data
US10892978B2 (en)2017-02-062021-01-12Silver Peak Systems, Inc.Multi-level learning for classifying traffic flows from first packet data
US11582157B2 (en)*2017-02-062023-02-14Hewlett Packard Enterprise Development LpMulti-level learning for classifying traffic flows on a first packet from DNS response data
US11729090B2 (en)2017-02-062023-08-15Hewlett Packard Enterprise Development LpMulti-level learning for classifying network traffic flows from first packet data
US10257082B2 (en)*2017-02-062019-04-09Silver Peak Systems, Inc.Multi-level learning for classifying traffic flows
US12149547B2 (en)2017-02-242024-11-19LogRhythm Inc.Processing pipeline for monitoring information systems
US11777963B2 (en)*2017-02-242023-10-03LogRhythm Inc.Analytics for processing information system data
US20180248904A1 (en)*2017-02-242018-08-30LogRhythm Inc.Analytics for processing information system data
US11546153B2 (en)2017-03-222023-01-03Extrahop Networks, Inc.Managing session secrets for continuous packet capture systems
US10476673B2 (en)2017-03-222019-11-12Extrahop Networks, Inc.Managing session secrets for continuous packet capture systems
US11095736B2 (en)2017-04-302021-08-17Verint Systems Ltd.System and method for tracking users of computer applications
US11336738B2 (en)2017-04-302022-05-17Cognyte Technologies Israel Ltd.System and method for tracking users of computer applications
US11575625B2 (en)2017-04-302023-02-07Cognyte Technologies Israel Ltd.System and method for identifying relationships between users of computer applications
US10972558B2 (en)2017-04-302021-04-06Verint Systems Ltd.System and method for tracking users of computer applications
US10938855B1 (en)*2017-06-232021-03-02Digi International Inc.Systems and methods for automatically and securely provisioning remote computer network infrastructure
US10749905B2 (en)*2017-07-312020-08-18Amdocs Development LimitedSystem, method, and computer program providing security in network function virtualization (NFV) based communication networks and software defined networks (SDNS)
US10263863B2 (en)2017-08-112019-04-16Extrahop Networks, Inc.Real-time configuration discovery and management
US10511499B2 (en)2017-08-112019-12-17Extrahop Networks, Inc.Real-time configuration discovery and management
US10382296B2 (en)2017-08-292019-08-13Extrahop Networks, Inc.Classifying applications or activities based on network behavior
US10063434B1 (en)2017-08-292018-08-28Extrahop Networks, Inc.Classifying applications or activities based on network behavior
US11140023B2 (en)*2017-09-192021-10-05Intel CorporationTrace network used as a configuration network
US11805045B2 (en)2017-09-212023-10-31Hewlett Packard Enterprise Development LpSelective routing
US11212210B2 (en)2017-09-212021-12-28Silver Peak Systems, Inc.Selective route exporting using source type
US10587632B1 (en)*2017-09-282020-03-10Amazon Technologies, Inc.Neural network-based malware detection
US9967292B1 (en)2017-10-252018-05-08Extrahop Networks, Inc.Inline secret sharing
US11165831B2 (en)2017-10-252021-11-02Extrahop Networks, Inc.Inline secret sharing
US11665207B2 (en)2017-10-252023-05-30Extrahop Networks, Inc.Inline secret sharing
US11423083B2 (en)2017-10-272022-08-23Ab Initio Technology LlcTransforming a specification into a persistent computer program
US12045286B2 (en)2017-10-272024-07-23Ab Initio Technology LlcTransforming a specification into a persistent computer program
US12284197B1 (en)2017-11-272025-04-22Fortinet, Inc.Reducing amounts of data ingested into a data warehouse
US10958613B2 (en)2018-01-012021-03-23Verint Systems Ltd.System and method for identifying pairs of related application users
US11336609B2 (en)2018-01-012022-05-17Cognyte Technologies Israel Ltd.System and method for identifying pairs of related application users
US11568236B2 (en)2018-01-252023-01-31The Research Foundation For The State University Of New YorkFramework and methods of diverse exploration for fast and safe policy improvement
US10389574B1 (en)2018-02-072019-08-20Extrahop Networks, Inc.Ranking alerts based on network monitoring
US10979282B2 (en)2018-02-072021-04-13Extrahop Networks, Inc.Ranking alerts based on network monitoring
US11463299B2 (en)2018-02-072022-10-04Extrahop Networks, Inc.Ranking alerts based on network monitoring
US10264003B1 (en)2018-02-072019-04-16Extrahop Networks, Inc.Adaptive network monitoring with tuneable elastic granularity
US10594709B2 (en)2018-02-072020-03-17Extrahop Networks, Inc.Adaptive network monitoring with tuneable elastic granularity
US10728126B2 (en)2018-02-082020-07-28Extrahop Networks, Inc.Personalization of alerts based on network monitoring
US10038611B1 (en)2018-02-082018-07-31Extrahop Networks, Inc.Personalization of alerts based on network monitoring
US11431744B2 (en)2018-02-092022-08-30Extrahop Networks, Inc.Detection of denial of service attacks
US10659484B2 (en)*2018-02-192020-05-19Cisco Technology, Inc.Hierarchical activation of behavioral modules on a data plane for behavioral analytics
US20240223523A1 (en)*2018-02-202024-07-04Darktrace Holdings LimitedEndpoint agent extension of a machine learning cyber defense system for email
US11405265B2 (en)2018-03-122022-08-02Hewlett Packard Enterprise Development LpMethods and systems for detecting path break conditions while minimizing network overhead
US10637721B2 (en)2018-03-122020-04-28Silver Peak Systems, Inc.Detecting path break conditions while minimizing network overhead
US10887159B2 (en)2018-03-122021-01-05Silver Peak Systems, Inc.Methods and systems for detecting path break conditions while minimizing network overhead
US10116679B1 (en)2018-05-182018-10-30Extrahop Networks, Inc.Privilege inference and monitoring based on network behavior
US20210126863A1 (en)*2018-05-182021-04-29Juniper Networks, Inc.Packet fragment forwarding without reassembly
US11736399B2 (en)*2018-05-182023-08-22Juniper Networks, Inc.Packet fragment forwarding without reassembly
US10277618B1 (en)2018-05-182019-04-30Extrahop Networks, Inc.Privilege inference and monitoring based on network behavior
US11061885B2 (en)*2018-06-152021-07-13Intel CorporationAutonomous anomaly detection and event triggering for data series
US11645388B1 (en)2018-06-192023-05-09Architecture Technology CorporationSystems and methods for detecting non-malicious faults when processing source codes
US11997129B1 (en)2018-06-192024-05-28Architecture Technology CorporationAttack-related events and alerts
US11503064B1 (en)2018-06-192022-11-15Architecture Technology CorporationAlert systems and methods for attack-related events
US11658873B1 (en)2018-06-212023-05-23Wells Fargo Bank, N.A.Intelligent learning and management of a networked architecture
US10785108B1 (en)*2018-06-212020-09-22Wells Fargo Bank, N.A.Intelligent learning and management of a networked architecture
US11438228B1 (en)2018-06-212022-09-06Wells Fargo Bank, N.A.Intelligent learning and management of a networked architecture
US10924504B2 (en)*2018-07-062021-02-16International Business Machines CorporationDual-port mirroring system for analyzing non-stationary data in a network
US20200014712A1 (en)*2018-07-062020-01-09International Business Machines CorporationDual-port mirroring system for analyzing non-stationary data in a network
TWI725906B (en)*2018-07-162021-04-21美商葛蘭諾公司Dynamic control of fingerprinting rate to facilitate time-accurate revision of media content
US11503362B2 (en)2018-07-162022-11-15Roku, Inc.Dynamic control of fingerprinting rate to facilitate time-accurate revision of media content
TWI736511B (en)*2018-07-162021-08-11美商葛蘭諾公司Dynamic control of fingerprinting rate to facilitate time-accurate revision of media content
US10992981B2 (en)2018-07-162021-04-27Gracenote, Inc.Dynamic control of fingerprinting rate to facilitate time-accurate revision of media content
US11290770B2 (en)2018-07-162022-03-29Roku, Inc.Dynamic control of fingerprinting rate to facilitate time-accurate revision of media content
US10979758B2 (en)2018-07-162021-04-13Gracenote, Inc.Dynamic control of fingerprinting rate to facilitate time-accurate revision of media content
US10623800B2 (en)2018-07-162020-04-14Gracenote, Inc.Dynamic control of fingerprinting rate to facilitate time-accurate revision of media content
TWI701947B (en)*2018-07-162020-08-11美商葛蘭諾公司Dynamic control of fingerprinting rate to facilitate time-accurate revision of media content
US11403559B2 (en)2018-08-052022-08-02Cognyte Technologies Israel Ltd.System and method for using a user-action log to learn to classify encrypted traffic
US11012329B2 (en)2018-08-092021-05-18Extrahop Networks, Inc.Correlating causes and effects associated with network activity
US11496378B2 (en)2018-08-092022-11-08Extrahop Networks, Inc.Correlating causes and effects associated with network activity
US10411978B1 (en)2018-08-092019-09-10Extrahop Networks, Inc.Correlating causes and effects associated with network activity
US11323467B2 (en)2018-08-212022-05-03Extrahop Networks, Inc.Managing incident response operations based on monitored network activity
US10594718B1 (en)2018-08-212020-03-17Extrahop Networks, Inc.Managing incident response operations based on monitored network activity
US11449618B2 (en)*2018-08-242022-09-20Hewlett-Packard Development Company, L.P.Active testing of access control policy
US20200106793A1 (en)*2018-10-022020-04-02Olympus Infotech, LLCMethods, systems, and computer program products for continuous cyber risk monitoring
US11023576B2 (en)*2018-11-282021-06-01International Business Machines CorporationDetecting malicious activity on a computer system
US10972508B1 (en)*2018-11-302021-04-06Juniper Networks, Inc.Generating a network security policy based on behavior detected after identification of malicious behavior
US11521067B2 (en)*2018-11-302022-12-06International Business Machines CorporationDecentralized distributed deep learning
US20200175370A1 (en)*2018-11-302020-06-04International Business Machines CorporationDecentralized distributed deep learning
WO2020126994A1 (en)*2018-12-172020-06-25Commissariat A L'energie Atomique Et Aux Energies AlternativesMethod and system for detecting anomalies in a telecommunications network
FR3090153A1 (en)*2018-12-172020-06-19Commissariat A L'energie Atomique Et Aux Energies Alternatives Anomaly detection method and system in a telecommunications network
US10908895B2 (en)*2018-12-212021-02-02Pensando Systems Inc.State-preserving upgrade of an intelligent server adapter
US11429713B1 (en)2019-01-242022-08-30Architecture Technology CorporationArtificial intelligence modeling for cyber-attack simulation protocols
US12032681B1 (en)2019-01-242024-07-09Architecture Technology CorporationSystem for cyber-attack simulation using artificial intelligence modeling
US11722515B1 (en)2019-02-042023-08-08Architecture Technology CorporationImplementing hierarchical cybersecurity systems and methods
US20200286131A1 (en)*2019-03-042020-09-10Iris.Tv, Inc.Dual-optimization of targeted digital assets under volume and position constraints
US11568451B2 (en)*2019-03-042023-01-31Iris.TV Inc.Dual-optimization of targeted digital assets under volume and position constraints
US11252057B2 (en)*2019-03-142022-02-15Panasonic Intellectual Property Management Co., Ltd.Information processing apparatus, information processing system, information processing method, and computer program
US10999295B2 (en)2019-03-202021-05-04Verint Systems Ltd.System and method for de-anonymizing actions and messages on networks
US11444956B2 (en)2019-03-202022-09-13Cognyte Technologies Israel Ltd.System and method for de-anonymizing actions and messages on networks
US11265336B2 (en)*2019-03-282022-03-01Red Hat, Inc.Detecting anomalies in networks
US11887505B1 (en)2019-04-242024-01-30Architecture Technology CorporationSystem for deploying and monitoring network-based training exercises
US10965702B2 (en)2019-05-282021-03-30Extrahop Networks, Inc.Detecting injection attacks using passive network monitoring
US11706233B2 (en)2019-05-282023-07-18Extrahop Networks, Inc.Detecting injection attacks using passive network monitoring
US11290494B2 (en)*2019-05-312022-03-29Varmour Networks, Inc.Reliability prediction for cloud security policies
US11310284B2 (en)2019-05-312022-04-19Varmour Networks, Inc.Validation of cloud security policies
US11575563B2 (en)2019-05-312023-02-07Varmour Networks, Inc.Cloud security management
US11863580B2 (en)2019-05-312024-01-02Varmour Networks, Inc.Modeling application dependencies to identify operational risk
US11711374B2 (en)2019-05-312023-07-25Varmour Networks, Inc.Systems and methods for understanding identity and organizational access to applications within an enterprise environment
US11290493B2 (en)2019-05-312022-03-29Varmour Networks, Inc.Template-driven intent-based security
US12019756B1 (en)2019-06-272024-06-25Architecture Technology CorporationAutomated cyber evaluation system
US11403405B1 (en)2019-06-272022-08-02Architecture Technology CorporationPortable vulnerability identification tool for embedded non-IP devices
US11165814B2 (en)2019-07-292021-11-02Extrahop Networks, Inc.Modifying triage information based on network monitoring
US12309192B2 (en)2019-07-292025-05-20Extrahop Networks, Inc.Modifying triage information based on network monitoring
US11652714B2 (en)2019-08-052023-05-16Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US11388072B2 (en)2019-08-052022-07-12Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US11438247B2 (en)2019-08-052022-09-06Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US10742530B1 (en)2019-08-052020-08-11Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US20210056203A1 (en)*2019-08-222021-02-25International Business Machines CorporationData breach detection
US11562065B2 (en)*2019-08-222023-01-24International Business Machines CorporationData breach detection
US10742677B1 (en)2019-09-042020-08-11Extrahop Networks, Inc.Automatic determination of user roles and asset types based on network monitoring
US11463465B2 (en)2019-09-042022-10-04Extrahop Networks, Inc.Automatic determination of user roles and asset types based on network monitoring
US12120146B1 (en)2019-10-232024-10-15Architecture Technology CorporationSystems and methods for applying attack tree models and physics-based models for detecting cyber-physical threats
US11444974B1 (en)2019-10-232022-09-13Architecture Technology CorporationSystems and methods for cyber-physical threat modeling
US11399016B2 (en)2019-11-032022-07-26Cognyte Technologies Israel Ltd.System and method for identifying exchanges of encrypted communication traffic
US11546354B2 (en)*2019-11-262023-01-03Kyndryl, Inc.Network shutdown for cyber security
US20230179609A1 (en)*2019-12-122023-06-08Intel CorporationSecurity reporting via message tagging
US12047398B2 (en)*2019-12-122024-07-23Intel CorporationSecurity reporting via message tagging
US11570186B2 (en)*2019-12-122023-01-31Intel CorporationSecurity reporting via message tagging
US12355816B2 (en)2019-12-172025-07-08Extrahop Networks, Inc.Automated preemptive polymorphic deception
US11165823B2 (en)2019-12-172021-11-02Extrahop Networks, Inc.Automated preemptive polymorphic deception
US12107888B2 (en)2019-12-172024-10-01Extrahop Networks, Inc.Automated preemptive polymorphic deception
US20230030504A1 (en)*2019-12-192023-02-02Siemens Mobility GmbHTransmission device for transmitting data
US12375320B2 (en)*2019-12-192025-07-29Siemens Mobility GmbHTransmission device for transmitting data and detecting anomalies
US11182150B2 (en)2020-01-142021-11-23Pensando Systems Inc.Zero packet loss upgrade of an IO device
US11503075B1 (en)2020-01-142022-11-15Architecture Technology CorporationSystems and methods for continuous compliance of nodes
US12225032B2 (en)*2020-03-302025-02-11British Telecommunications Public Limited CompanyMethod of analysing anomalous network traffic
US20230129367A1 (en)*2020-03-302023-04-27British Telecommunications Public Limited CompanyMethod of analysing anomalous network traffic
WO2021211911A1 (en)*2020-04-162021-10-21Blackswan Technologies Inc.Artificial intelligence cloud operating system
US20220309171A1 (en)*2020-04-282022-09-29Absolute Software CorporationEndpoint Security using an Action Prediction Model
US11763083B2 (en)*2020-05-182023-09-19Google LlcInference methods for word or wordpiece tokenization
US20230124402A1 (en)*2020-05-182023-04-20Google LlcInference Methods For Word Or Wordpiece Tokenization
CN111695115A (en)*2020-05-252020-09-22武汉大学Industrial control system network attack tracing method based on communication delay and security evaluation
CN111767198A (en)*2020-06-232020-10-13中国工商银行股份有限公司System risk prediction method and device based on classification label sequence matching
US11526553B2 (en)*2020-07-232022-12-13Vmware, Inc.Building a dynamic regular expression from sampled data
US11768933B2 (en)*2020-08-112023-09-26Saudi Arabian Oil CompanySystem and method for protecting against ransomware without the use of signatures or updates
US11558413B2 (en)2020-09-232023-01-17Extrahop Networks, Inc.Monitoring encrypted network traffic
US11310256B2 (en)2020-09-232022-04-19Extrahop Networks, Inc.Monitoring encrypted network traffic
US11463466B2 (en)2020-09-232022-10-04Extrahop Networks, Inc.Monitoring encrypted network traffic
US20220191244A1 (en)*2020-12-102022-06-16Cisco Technology, Inc.Malware detection using inverse imbalance subspace searching
US11799904B2 (en)*2020-12-102023-10-24Cisco Technology, Inc.Malware detection using inverse imbalance subspace searching
US20220201009A1 (en)*2020-12-182022-06-23Dell Products, L.P.Creating and handling workspace indicators of compromise (ioc) based upon configuration drift
US11522883B2 (en)*2020-12-182022-12-06Dell Products, L.P.Creating and handling workspace indicators of compromise (IOC) based upon configuration drift
US11818152B2 (en)2020-12-232023-11-14Varmour Networks, Inc.Modeling topic-based message-oriented middleware within a security system
US11876817B2 (en)2020-12-232024-01-16Varmour Networks, Inc.Modeling queue-based message-oriented middleware relationships in a security system
US11281453B1 (en)2021-01-062022-03-22Pensando Systems, Inc.Methods and systems for a hitless rollback mechanism during software upgrade of a network appliance
US11777978B2 (en)2021-01-292023-10-03Varmour Networks, Inc.Methods and systems for accurately assessing application access risk
US12050693B2 (en)2021-01-292024-07-30Varmour Networks, Inc.System and method for attributing user behavior from multiple technical telemetry sources
US11349861B1 (en)2021-06-182022-05-31Extrahop Networks, Inc.Identifying network entities based on beaconing activity
US12225030B2 (en)2021-06-182025-02-11Extrahop Networks, Inc.Identifying network entities based on beaconing activity
US11734316B2 (en)2021-07-082023-08-22Varmour Networks, Inc.Relationship-based search in a computing environment
CN113313216A (en)*2021-07-302021-08-27深圳市永达电子信息股份有限公司Method and device for extracting main body of network data, electronic equipment and storage medium
US11296967B1 (en)2021-09-232022-04-05Extrahop Networks, Inc.Combining passive network analysis and active probing
US11916771B2 (en)2021-09-232024-02-27Extrahop Networks, Inc.Combining passive network analysis and active probing
US12267299B2 (en)*2022-01-122025-04-01Bank Of America CorporationPreemptive threat detection for an information system
US20230224275A1 (en)*2022-01-122023-07-13Bank Of America CorporationPreemptive threat detection for an information system
US12413604B2 (en)*2022-02-212025-09-09Jinan Jubang Information Technology Co., LtdBlockchain-based big data analysis and decision-making system and method
US11843606B2 (en)2022-03-302023-12-12Extrahop Networks, Inc.Detecting abnormal data access based on data similarity
US11995658B2 (en)*2022-05-252024-05-28Dell Products L.P.Machine learning-based detection of potentially malicious behavior on an e-commerce platform
US20230385837A1 (en)*2022-05-252023-11-30Dell Products L.P.Machine learning-based detection of potentially malicious behavior on an e-commerce platform
US12355786B2 (en)*2022-06-142025-07-08Microsoft Technology Licensing, LlcMachine learning approach for solving the cold start problem in stateful models
US20230403289A1 (en)*2022-06-142023-12-14Microsoft Technology Licensing, LlcMachine learning approach for solving the cold start problem in stateful models
CN115567270A (en)*2022-09-212023-01-03中国工商银行股份有限公司 Service attack processing method, device, computer equipment and storage medium thereof
US12443359B2 (en)2023-08-152025-10-14Pure Storage, Inc.Delaying requested deletion of datasets
US20250147859A1 (en)*2023-11-022025-05-08Cardinalops Ltd.Inferred Events
CN117879975A (en)*2024-03-112024-04-12广州翔实信息科技有限公司Method based on 5G mobile communication network security
CN120582905A (en)*2025-07-312025-09-02湖南军安信达科技有限公司Data interaction method and system of reinforced switch and switch

Also Published As

Publication numberPublication date
US20080133517A1 (en)2008-06-05
US20080162390A1 (en)2008-07-03
US20080133518A1 (en)2008-06-05
US8402540B2 (en)2013-03-19
US20080134330A1 (en)2008-06-05

Similar Documents

PublicationPublication DateTitle
US8402540B2 (en)Systems and methods for processing data flows
US7979368B2 (en)Systems and methods for processing data flows
US9525696B2 (en)Systems and methods for processing data flows
US8135657B2 (en)Systems and methods for processing data flows
EP2432188B1 (en)Systems and methods for processing data flows
US9800608B2 (en)Processing data flows with a data flow processor
US20080229415A1 (en)Systems and methods for processing data flows
US20110219035A1 (en)Database security via data flow processing
US20110214157A1 (en)Securing a network with data flow processing
US20110213869A1 (en)Processing data flows with a data flow processor
US20110231564A1 (en)Processing data flows with a data flow processor
US20110238855A1 (en)Processing data flows with a data flow processor
Agarwal et al.A closer look at intrusion detection system for web applications
US11457025B2 (en)Method and system for detecting and preventing data exfiltration attacks
US20030084319A1 (en)Node, method and computer readable medium for inserting an intrusion prevention system into a network stack
US20030014662A1 (en)Protocol-parsing state machine and method of using same
SinghIntrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) For Network Security: A Critical Analysis
JP2022541250A (en) Inline malware detection
Alencar et al.AI techniques for automated penetration testing in MQTT networks: a literature investigation
AlshamraniCyber attacks detection and mitigation in sdn environments
WaraichAutomated attack signature generation: A survey
ErlacherEfficient intrusion detection in high-speed networks.
UusiheimalaAdvanced threat detection through Snort integration: a study of IDS/IPS implementation at an institute of higher education
AngelakisFirewall & WAF–Analysis & implementation of a machine learning integrated solution
ÖztürkA method for security breach detection through file access monitoring and pattern recognition

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:CROSSBEAM SYSTEMS, INC., MASSACHUSETTS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAPOOR, HARSH;AKERMAN, MOISEY;JUSTUS, STEPHEN D.;AND OTHERS;REEL/FRAME:019139/0167;SIGNING DATES FROM 20070214 TO 20070407

ASAssignment

Owner name:SILICON VALLEY BANK, MASSACHUSETTS

Free format text:SECURITY AGREEMENT;ASSIGNORS:CROSSBEAM SYSTEMS, INC.;CB SYSTEMS HOLDINGS II, INC.;CB SYSTEMS ACQUISITION CO.;REEL/FRAME:029275/0605

Effective date:20121108

ASAssignment

Owner name:CROSSBEAM SYSTEMS, INC., MASSACHUSETTS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:029599/0731

Effective date:20121231

Owner name:CB SYSTEMS HOLDINGS II, INC., MASSACHUSETTS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:029599/0731

Effective date:20121231

Owner name:CB SYSTEMS ACQUISITION CO., MASSACHUSETTS

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:029599/0731

Effective date:20121231

ASAssignment

Owner name:JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YO

Free format text:SECURITY AGREEMENT;ASSIGNOR:CROSSBEAM SYSTEMS, INC.;REEL/FRAME:029877/0668

Effective date:20130215

ASAssignment

Owner name:BLUE COAT SYSTEMS, INC., CALIFORNIA

Free format text:MERGER;ASSIGNOR:CROSSBEAM SYSTEMS, INC.;REEL/FRAME:030492/0146

Effective date:20130308

ASAssignment

Owner name:JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YO

Free format text:SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:BLUE COAT SYSTEMS, INC.;REEL/FRAME:030740/0181

Effective date:20130628

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:JEFFERIES FINANCE LLC, AS THE COLLATERAL AGENT, NE

Free format text:SECURITY INTEREST;ASSIGNOR:BLUE COAT SYSTEMS, INC.;REEL/FRAME:035751/0348

Effective date:20150522

ASAssignment

Owner name:BLUE COAT SYSTEMS, INC. AS SUCCESSOR BY MERGER TO

Free format text:RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL AT REEL/FRAME NO. 29877/0668;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:035797/0004

Effective date:20150522

Owner name:BLUE COAT SYSTEMS, INC., CALIFORNIA

Free format text:RELEASE OF SECURITY INTEREST IN PATENT COLLATERAL AT REEL/FRAME NO. 30740/0181;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:035797/0280

Effective date:20150522

ASAssignment

Owner name:BLUE COAT SYSTEMS, INC., CALIFORNIA

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:039516/0929

Effective date:20160801


[8]ページ先頭

©2009-2025 Movatter.jp