| US20070112512A1 (en)* | 1987-09-28 | 2007-05-17 | Verizon Corporate Services Group Inc. | Methods and systems for locating source of computer-originated attack based on GPS equipped computing device |
| US7708189B1 (en) | 2002-05-17 | 2010-05-04 | Cipriano Joseph J | Identification verification system and method |
| US9009084B2 (en)* | 2002-10-21 | 2015-04-14 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
| US7467018B1 (en) | 2002-11-18 | 2008-12-16 | Rockwell Automation Technologies, Inc. | Embedded database systems and methods in an industrial controller environment |
| US20110202565A1 (en)* | 2002-12-31 | 2011-08-18 | American Express Travel Related Services Company, Inc. | Method and system for implementing and managing an enterprise identity management for distributed security in a computer system |
| US7143095B2 (en)* | 2002-12-31 | 2006-11-28 | American Express Travel Related Services Company, Inc. | Method and system for implementing and managing an enterprise identity management for distributed security |
| WO2004066604A1 (en)* | 2003-01-22 | 2004-08-05 | Nimcat Networks Inc. | Call transfer system, method and network devices |
| US7185015B2 (en)* | 2003-03-14 | 2007-02-27 | Websense, Inc. | System and method of monitoring and controlling application files |
| US7529754B2 (en)* | 2003-03-14 | 2009-05-05 | Websense, Inc. | System and method of monitoring and controlling application files |
| US20040210773A1 (en)* | 2003-04-16 | 2004-10-21 | Charles Markosi | System and method for network security |
| US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
| US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
| US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
| US20070113272A2 (en) | 2003-07-01 | 2007-05-17 | Securityprofiling, Inc. | Real-time vulnerability monitoring |
| US7068161B2 (en)* | 2003-07-31 | 2006-06-27 | Ch2M Hill, Inc. | Method and system for analyzing the security of a facility |
| US7194446B1 (en)* | 2003-09-25 | 2007-03-20 | Rockwell Automation Technologies, Inc. | Location-based execution of software/HMI |
| US7483986B2 (en)* | 2003-12-03 | 2009-01-27 | International Business Machines Corporation | Dynamically tuning networks of relationships in self-organizing multi-agent systems |
| US8190723B2 (en)* | 2003-12-14 | 2012-05-29 | Cisco Technology, Inc. | Method and system for automatically determining commands for a network element |
| US8983966B2 (en)* | 2004-02-27 | 2015-03-17 | Ebay Inc. | Method and system to monitor a diverse heterogeneous application environment |
| US8793787B2 (en) | 2004-04-01 | 2014-07-29 | Fireeye, Inc. | Detecting malicious network content using virtual environment components |
| US9106694B2 (en) | 2004-04-01 | 2015-08-11 | Fireeye, Inc. | Electronic message analysis for malware detection |
| US8898788B1 (en) | 2004-04-01 | 2014-11-25 | Fireeye, Inc. | Systems and methods for malware attack prevention |
| US8584239B2 (en) | 2004-04-01 | 2013-11-12 | Fireeye, Inc. | Virtual machine with dynamic data flow analysis |
| US8171553B2 (en) | 2004-04-01 | 2012-05-01 | Fireeye, Inc. | Heuristic based capture with replay to virtual machine |
| US8881282B1 (en) | 2004-04-01 | 2014-11-04 | Fireeye, Inc. | Systems and methods for malware attack detection and identification |
| US8528086B1 (en) | 2004-04-01 | 2013-09-03 | Fireeye, Inc. | System and method of detecting computer worms |
| US8566946B1 (en)* | 2006-04-20 | 2013-10-22 | Fireeye, Inc. | Malware containment on connection |
| US7587537B1 (en) | 2007-11-30 | 2009-09-08 | Altera Corporation | Serializer-deserializer circuits formed from input-output circuit registers |
| US8549638B2 (en) | 2004-06-14 | 2013-10-01 | Fireeye, Inc. | System and method of containing computer worms |
| US8010952B2 (en)* | 2004-06-08 | 2011-08-30 | Cisco Technology, Inc. | Method and apparatus for configuration syntax and semantic validation |
| US7735140B2 (en)* | 2004-06-08 | 2010-06-08 | Cisco Technology, Inc. | Method and apparatus providing unified compliant network audit |
| US7721304B2 (en) | 2004-06-08 | 2010-05-18 | Cisco Technology, Inc. | Method and apparatus providing programmable network intelligence |
| US7860874B2 (en)* | 2004-06-08 | 2010-12-28 | Siemens Industry, Inc. | Method for searching across a PLC network |
| US20060015591A1 (en)* | 2004-06-08 | 2006-01-19 | Datla Krishnam R | Apparatus and method for intelligent configuration editor |
| EP1612639A1 (en)* | 2004-06-30 | 2006-01-04 | ST Incard S.r.l. | Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card |
| US7607166B2 (en)* | 2004-07-12 | 2009-10-20 | Cisco Technology, Inc. | Secure manufacturing devices in a switched Ethernet network |
| US8572734B2 (en) | 2004-08-12 | 2013-10-29 | Verizon Patent And Licensing Inc. | Geographical intrusion response prioritization mapping through authentication and flight data correlation |
| US8082506B1 (en)* | 2004-08-12 | 2011-12-20 | Verizon Corporate Services Group Inc. | Geographical vulnerability mitigation response mapping system |
| US8418246B2 (en)* | 2004-08-12 | 2013-04-09 | Verizon Patent And Licensing Inc. | Geographical threat response prioritization mapping system and methods of use |
| US8631493B2 (en)* | 2004-08-12 | 2014-01-14 | Verizon Patent And Licensing Inc. | Geographical intrusion mapping system using telecommunication billing and inventory systems |
| US8091130B1 (en)* | 2004-08-12 | 2012-01-03 | Verizon Corporate Services Group Inc. | Geographical intrusion response prioritization mapping system |
| US20060034305A1 (en)* | 2004-08-13 | 2006-02-16 | Honeywell International Inc. | Anomaly-based intrusion detection |
| US7950044B2 (en)* | 2004-09-28 | 2011-05-24 | Rockwell Automation Technologies, Inc. | Centrally managed proxy-based security for legacy automation systems |
| US8031913B1 (en) | 2004-09-29 | 2011-10-04 | Rockwell Automation Technologies, Inc. | Preemptive change verification via electronic signatures in industrial automation systems |
| US7861085B1 (en)* | 2004-09-29 | 2010-12-28 | Rockwell Automation Technologies, Inc. | Systems and methods providing distributed management of electronic signatures in industrial automation systems |
| US7979706B1 (en) | 2004-09-29 | 2011-07-12 | Rockwell Automation Technologies, Inc. | Systems and methods for queuing an action in industrial automation systems |
| US8756521B1 (en) | 2004-09-30 | 2014-06-17 | Rockwell Automation Technologies, Inc. | Systems and methods for automatic visualization configuration |
| US8132225B2 (en)* | 2004-09-30 | 2012-03-06 | Rockwell Automation Technologies, Inc. | Scalable and flexible information security for industrial automation |
| EP1655647A1 (en)* | 2004-11-04 | 2006-05-10 | Prüftechnik Dieter Busch Ag | Secured connectivity system for Internet-based CM systems |
| US7860318B2 (en) | 2004-11-09 | 2010-12-28 | Intelli-Check, Inc | System and method for comparing documents |
| US8078881B1 (en)* | 2004-11-12 | 2011-12-13 | Liu Gary G | Password resetting method |
| US7832005B1 (en)* | 2004-11-29 | 2010-11-09 | Symantec Corporation | Behavioral learning based security |
| US7310669B2 (en)* | 2005-01-19 | 2007-12-18 | Lockdown Networks, Inc. | Network appliance for vulnerability assessment auditing over multiple networks |
| US8520512B2 (en) | 2005-01-26 | 2013-08-27 | Mcafee, Inc. | Network appliance for customizable quarantining of a node on a network |
| US7810138B2 (en) | 2005-01-26 | 2010-10-05 | Mcafee, Inc. | Enabling dynamic authentication with different protocols on the same port for a switch |
| US20060164199A1 (en)* | 2005-01-26 | 2006-07-27 | Lockdown Networks, Inc. | Network appliance for securely quarantining a node on a network |
| US8590011B1 (en)* | 2005-02-24 | 2013-11-19 | Versata Development Group, Inc. | Variable domain resource data security for data processing systems |
| AT502241B1 (en)* | 2005-02-24 | 2007-04-15 | Arc Seibersdorf Res Gmbh | PROCEDURE AND ARRANGEMENT FOR DETERMINING THE DEVIATION OF IDENTIFIED VALUES |
| US7706895B2 (en) | 2005-02-25 | 2010-04-27 | Rockwell Automation Technologies, Inc. | Reliable messaging instruction |
| US7565351B1 (en)* | 2005-03-14 | 2009-07-21 | Rockwell Automation Technologies, Inc. | Automation device data interface |
| CA2544681C (en)* | 2005-04-22 | 2015-11-17 | Protexis Inc. | Location-specific or range-based licensing system |
| US8799800B2 (en) | 2005-05-13 | 2014-08-05 | Rockwell Automation Technologies, Inc. | Automatic user interface generation |
| US7650405B2 (en)* | 2005-05-13 | 2010-01-19 | Rockwell Automation Technologies, Inc. | Tracking and tracing across process boundaries in an industrial automation environment |
| US7676281B2 (en)* | 2005-05-13 | 2010-03-09 | Rockwell Automation Technologies, Inc. | Distributed database in an industrial automation environment |
| US7809683B2 (en) | 2005-05-13 | 2010-10-05 | Rockwell Automation Technologies, Inc. | Library that includes modifiable industrial automation objects |
| US7672737B2 (en)* | 2005-05-13 | 2010-03-02 | Rockwell Automation Technologies, Inc. | Hierarchically structured data model for utilization in industrial automation environments |
| US8800042B2 (en)* | 2005-05-16 | 2014-08-05 | Hewlett-Packard Development Company, L.P. | Secure web application development and execution environment |
| US7233830B1 (en)* | 2005-05-31 | 2007-06-19 | Rockwell Automation Technologies, Inc. | Application and service management for industrial control devices |
| GB0512744D0 (en)* | 2005-06-22 | 2005-07-27 | Blackspider Technologies | Method and system for filtering electronic messages |
| US20070019641A1 (en)* | 2005-07-22 | 2007-01-25 | Rockwell Automation Technologies, Inc. | Execution of industrial automation applications on communication infrastructure devices |
| US8955032B2 (en)* | 2005-08-20 | 2015-02-10 | Riverbed Technology, Inc. | Assessing network and device compliance with security policies |
| US7433741B2 (en)* | 2005-09-30 | 2008-10-07 | Rockwell Automation Technologies, Inc. | Hybrid user interface having base presentation information with variably prominent supplemental information |
| US8413245B2 (en)* | 2005-12-16 | 2013-04-02 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security for polymorphic attacks |
| US7882560B2 (en)* | 2005-12-16 | 2011-02-01 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing |
| US9286469B2 (en)* | 2005-12-16 | 2016-03-15 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic signature generation |
| US8495743B2 (en)* | 2005-12-16 | 2013-07-23 | Cisco Technology, Inc. | Methods and apparatus providing automatic signature generation and enforcement |
| US8453243B2 (en) | 2005-12-28 | 2013-05-28 | Websense, Inc. | Real time lockdown |
| US8244745B2 (en)* | 2005-12-29 | 2012-08-14 | Nextlabs, Inc. | Analyzing usage information of an information management system |
| US7787390B1 (en)* | 2006-01-30 | 2010-08-31 | Marvell International Ltd. | Custom automatic remote monitoring for network devices |
| US7861003B2 (en)* | 2006-01-31 | 2010-12-28 | Genband Us Llc | Adaptive feedback for session over internet protocol |
| US7860990B2 (en)* | 2006-01-31 | 2010-12-28 | Genband Us Llc | Session data records and related alarming within a session over internet protocol (SOIP) network |
| US7865612B2 (en) | 2006-01-31 | 2011-01-04 | Genband Us Llc | Method and apparatus for partitioning resources within a session-over-internet-protocol (SoIP) session controller |
| US20070204323A1 (en)* | 2006-02-24 | 2007-08-30 | Rockwell Automation Technologies, Inc. | Auto-detection capabilities for out of the box experience |
| US8259706B2 (en)* | 2006-02-28 | 2012-09-04 | Genband Us Llc | Multistage prioritization of packets within a session over internet protocol (SOIP) network |
| US8509218B2 (en)* | 2006-02-28 | 2013-08-13 | Genband Us Llc | Prioritization within a session over internet protocol (SOIP) network |
| US7814069B2 (en)* | 2006-03-30 | 2010-10-12 | Oracle International Corporation | Wrapper for use with global standards compliance checkers |
| US8185618B2 (en)* | 2006-06-06 | 2012-05-22 | Cisco Technology, Inc. | Dynamically responding to non-network events at a network device in a computer network |
| US7950056B1 (en)* | 2006-06-30 | 2011-05-24 | Symantec Corporation | Behavior based processing of a new version or variant of a previously characterized program |
| EP1881388B1 (en)* | 2006-07-07 | 2013-11-20 | Ansaldo Energia S.P.A. | Industrial plant security apparatus and monitoring method of security of an industrial plant |
| US8359248B2 (en)* | 2006-08-24 | 2013-01-22 | Blue Pillar, Inc. | Systems, methods, and devices for managing emergency power supply systems |
| US20080137266A1 (en)* | 2006-09-29 | 2008-06-12 | Rockwell Automation Technologies, Inc. | Motor control center with power and data distribution bus |
| FR2907930B1 (en)* | 2006-10-27 | 2009-02-13 | Viaccess Sa | METHOD FOR DETECTING ABNORMAL USE OF A SECURITY PROCESSOR |
| US9654495B2 (en)* | 2006-12-01 | 2017-05-16 | Websense, Llc | System and method of analyzing web addresses |
| US9008617B2 (en)* | 2006-12-28 | 2015-04-14 | Verizon Patent And Licensing Inc. | Layered graphical event mapping |
| GB2458094A (en) | 2007-01-09 | 2009-09-09 | Surfcontrol On Demand Ltd | URL interception and categorization in firewalls |
| GB2445764A (en) | 2007-01-22 | 2008-07-23 | Surfcontrol Plc | Resource access filtering system and database structure for use therewith |
| AU2008214131B2 (en) | 2007-02-02 | 2012-06-14 | Websense, Inc. | System and method for adding context to prevent data leakage over a computer network |
| US9148437B1 (en)* | 2007-03-27 | 2015-09-29 | Amazon Technologies, Inc. | Detecting adverse network conditions for a third-party network site |
| US8533841B2 (en)* | 2007-04-02 | 2013-09-10 | Microsoft Corporation | Deriving remediations from security compliance rules |
| GB0709527D0 (en) | 2007-05-18 | 2007-06-27 | Surfcontrol Plc | Electronic messaging system, message processing apparatus and message processing method |
| US7912062B2 (en)* | 2007-09-28 | 2011-03-22 | Genband Us Llc | Methods and apparatus for managing addresses related to virtual partitions of a session exchange device |
| WO2009061855A2 (en)* | 2007-11-05 | 2009-05-14 | Intelli-Check--Mobilisa, Inc. | Dynamic access control in response to flexible rules |
| US8122510B2 (en)* | 2007-11-14 | 2012-02-21 | Bank Of America Corporation | Method for analyzing and managing unstructured data |
| US20090144545A1 (en)* | 2007-11-29 | 2009-06-04 | International Business Machines Corporation | Computer system security using file system access pattern heuristics |
| US8086582B1 (en) | 2007-12-18 | 2011-12-27 | Mcafee, Inc. | System, method and computer program product for scanning and indexing data for different purposes |
| WO2009114649A2 (en) | 2008-03-12 | 2009-09-17 | Aptima, Inc. | Probabilistic decision making system and methods of use |
| US9015842B2 (en)* | 2008-03-19 | 2015-04-21 | Websense, Inc. | Method and system for protection against information stealing software |
| US8407784B2 (en) | 2008-03-19 | 2013-03-26 | Websense, Inc. | Method and system for protection against information stealing software |
| US8370948B2 (en)* | 2008-03-19 | 2013-02-05 | Websense, Inc. | System and method for analysis of electronic information dissemination events |
| US9130986B2 (en)* | 2008-03-19 | 2015-09-08 | Websense, Inc. | Method and system for protection against information stealing software |
| US20090319531A1 (en)* | 2008-06-20 | 2009-12-24 | Bong Jun Ko | Method and Apparatus for Detecting Devices Having Implementation Characteristics Different from Documented Characteristics |
| EP2318955A1 (en) | 2008-06-30 | 2011-05-11 | Websense, Inc. | System and method for dynamic and real-time categorization of webpages |
| US20100064297A1 (en)* | 2008-09-05 | 2010-03-11 | Invensys Systems, Inc. | Configuring And Providing Enhanced Access To Profibus Device Diagnostic Data |
| US8997219B2 (en) | 2008-11-03 | 2015-03-31 | Fireeye, Inc. | Systems and methods for detecting malicious PDF network content |
| EP2200249A1 (en)* | 2008-12-17 | 2010-06-23 | Abb Research Ltd. | Network analysis |
| US8341748B2 (en)* | 2008-12-18 | 2012-12-25 | Caterpillar Inc. | Method and system to detect breaks in a border of a computer network |
| CA2763513A1 (en) | 2009-05-26 | 2010-12-02 | Roy Barkan | Systems and methods for efficient detection of fingerprinted data and information |
| US9489651B2 (en)* | 2009-07-29 | 2016-11-08 | International Business Machines Corporation | Autonomic manufacturing operator authorization adjustment |
| EP2296340A3 (en) | 2009-09-14 | 2014-10-01 | Hirschmann Automation and Control GmbH | Method for operating a firewall device in automation networks |
| US8832829B2 (en) | 2009-09-30 | 2014-09-09 | Fireeye, Inc. | Network-based binary file extraction and analysis for malware detection |
| US8484401B2 (en) | 2010-04-15 | 2013-07-09 | Rockwell Automation Technologies, Inc. | Systems and methods for conducting communications among components of multidomain industrial automation system |
| US8984533B2 (en) | 2010-04-15 | 2015-03-17 | Rockwell Automation Technologies, Inc. | Systems and methods for conducting communications among components of multidomain industrial automation system |
| US9392072B2 (en) | 2010-04-15 | 2016-07-12 | Rockwell Automation Technologies, Inc. | Systems and methods for conducting communications among components of multidomain industrial automation system |
| US9191367B2 (en) | 2010-06-01 | 2015-11-17 | Radiflow Ltd. | Plant communication network |
| US20120117656A1 (en)* | 2010-11-10 | 2012-05-10 | Sap Ag | Security Validation of Business Processes |
| US8775607B2 (en)* | 2010-12-10 | 2014-07-08 | International Business Machines Corporation | Identifying stray assets in a computing enviroment and responsively taking resolution actions |
| US20120159624A1 (en)* | 2010-12-21 | 2012-06-21 | Fujitsu Technology Solutions Intellectual Property Gmbh | Computer security method, system and model |
| JP5739182B2 (en) | 2011-02-04 | 2015-06-24 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Control system, method and program |
| JP5731223B2 (en) | 2011-02-14 | 2015-06-10 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Abnormality detection device, monitoring control system, abnormality detection method, program, and recording medium |
| JP5689333B2 (en) | 2011-02-15 | 2015-03-25 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Abnormality detection system, abnormality detection device, abnormality detection method, program, and recording medium |
| US8893216B2 (en)* | 2011-06-15 | 2014-11-18 | Cisco Technology, Inc. | Security measures for the smart grid |
| DE102011078309A1 (en)* | 2011-06-29 | 2013-01-03 | Siemens Aktiengesellschaft | Method and device for monitoring a VPN tunnel |
| US8839349B2 (en) | 2011-10-18 | 2014-09-16 | Mcafee, Inc. | Integrating security policy and event management |
| US9594367B2 (en)* | 2011-10-31 | 2017-03-14 | Rockwell Automation Technologies, Inc. | Systems and methods for process control including process-initiated workflow |
| EP2624083A1 (en)* | 2012-02-01 | 2013-08-07 | ABB Research Ltd. | Dynamic configuration of an industrial control system |
| US9032520B2 (en)* | 2012-02-22 | 2015-05-12 | iScanOnline, Inc. | Remote security self-assessment framework |
| EP2640110B1 (en) | 2012-03-12 | 2017-05-03 | Securitas Direct AB | Method and apparatus for controlling a home wireless system |
| US8726393B2 (en) | 2012-04-23 | 2014-05-13 | Abb Technology Ag | Cyber security analyzer |
| US10290221B2 (en)* | 2012-04-27 | 2019-05-14 | Aptima, Inc. | Systems and methods to customize student instruction |
| US10552764B1 (en) | 2012-04-27 | 2020-02-04 | Aptima, Inc. | Machine learning system for a training model of an adaptive trainer |
| US8972526B2 (en)* | 2012-10-17 | 2015-03-03 | Wal-Mart Stores, Inc. | HTTP parallel processing router |
| CN104813622B (en) | 2012-11-22 | 2016-10-19 | 三菱电机株式会社 | Data Collection-Forwarding Device |
| US10572665B2 (en) | 2012-12-28 | 2020-02-25 | Fireeye, Inc. | System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events |
| US9177139B2 (en)* | 2012-12-30 | 2015-11-03 | Honeywell International Inc. | Control system cyber security |
| US9176843B1 (en) | 2013-02-23 | 2015-11-03 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications |
| US9367681B1 (en) | 2013-02-23 | 2016-06-14 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application |
| US9195829B1 (en) | 2013-02-23 | 2015-11-24 | Fireeye, Inc. | User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications |
| US10438156B2 (en) | 2013-03-13 | 2019-10-08 | Aptima, Inc. | Systems and methods to provide training guidance |
| US9355247B1 (en) | 2013-03-13 | 2016-05-31 | Fireeye, Inc. | File extraction from memory dump for malicious content analysis |
| US9626509B1 (en) | 2013-03-13 | 2017-04-18 | Fireeye, Inc. | Malicious content analysis with multi-version application support within single operating environment |
| US9104867B1 (en) | 2013-03-13 | 2015-08-11 | Fireeye, Inc. | Malicious content analysis using simulated user interaction without user involvement |
| US9430646B1 (en) | 2013-03-14 | 2016-08-30 | Fireeye, Inc. | Distributed systems and methods for automatically detecting unknown bots and botnets |
| US9311479B1 (en) | 2013-03-14 | 2016-04-12 | Fireeye, Inc. | Correlation and consolidation of analytic data for holistic view of a malware attack |
| US20140277612A1 (en)* | 2013-03-14 | 2014-09-18 | General Electric Company | Automatic generation of a dynamic pre-start checklist |
| US10713358B2 (en) | 2013-03-15 | 2020-07-14 | Fireeye, Inc. | System and method to extract and utilize disassembly features to classify software intent |
| US9413781B2 (en) | 2013-03-15 | 2016-08-09 | Fireeye, Inc. | System and method employing structured intelligence to verify and contain threats at endpoints |
| US11102091B2 (en) | 2013-03-31 | 2021-08-24 | Schneider Electric USA, Inc. | Analyzing SCADA systems |
| EP2981893B1 (en)* | 2013-03-31 | 2023-06-07 | Schneider Electric USA, Inc. | Analyzing scada systems |
| US9495180B2 (en) | 2013-05-10 | 2016-11-15 | Fireeye, Inc. | Optimized resource allocation for virtual machines within a malware content detection system |
| US9635039B1 (en) | 2013-05-13 | 2017-04-25 | Fireeye, Inc. | Classifying sets of malicious indicators for detecting command and control communications associated with malware |
| US10133863B2 (en) | 2013-06-24 | 2018-11-20 | Fireeye, Inc. | Zero-day discovery system |
| US9300686B2 (en) | 2013-06-28 | 2016-03-29 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
| US9992230B1 (en)* | 2013-09-27 | 2018-06-05 | Tripwire, Inc. | Assessing security control quality and state in an information technology infrastructure |
| US9690936B1 (en) | 2013-09-30 | 2017-06-27 | Fireeye, Inc. | Multistage system and method for analyzing obfuscated content for malware |
| US9294501B2 (en) | 2013-09-30 | 2016-03-22 | Fireeye, Inc. | Fuzzy hash of behavioral results |
| US10515214B1 (en) | 2013-09-30 | 2019-12-24 | Fireeye, Inc. | System and method for classifying malware within content created during analysis of a specimen |
| US9171160B2 (en) | 2013-09-30 | 2015-10-27 | Fireeye, Inc. | Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses |
| US9736179B2 (en) | 2013-09-30 | 2017-08-15 | Fireeye, Inc. | System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection |
| US9628507B2 (en) | 2013-09-30 | 2017-04-18 | Fireeye, Inc. | Advanced persistent threat (APT) detection center |
| US9774448B2 (en) | 2013-10-30 | 2017-09-26 | Duo Security, Inc. | System and methods for opportunistic cryptographic key management on an electronic device |
| US9921978B1 (en) | 2013-11-08 | 2018-03-20 | Fireeye, Inc. | System and method for enhanced security of storage devices |
| US9747446B1 (en) | 2013-12-26 | 2017-08-29 | Fireeye, Inc. | System and method for run-time object classification |
| US9756074B2 (en) | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
| US9740857B2 (en) | 2014-01-16 | 2017-08-22 | Fireeye, Inc. | Threat-aware microvisor |
| WO2015117052A1 (en) | 2014-01-31 | 2015-08-06 | Putman Matthew C | Apparatus and method for manipulating objects with gesture controls |
| US9262635B2 (en) | 2014-02-05 | 2016-02-16 | Fireeye, Inc. | Detection efficacy of virtual machine-based analysis with application specific events |
| US9369478B2 (en)* | 2014-02-06 | 2016-06-14 | Nicira, Inc. | OWL-based intelligent security audit |
| US9241010B1 (en) | 2014-03-20 | 2016-01-19 | Fireeye, Inc. | System and method for network behavior detection |
| US10242185B1 (en) | 2014-03-21 | 2019-03-26 | Fireeye, Inc. | Dynamic guest image creation and rollback |
| US20150281008A1 (en)* | 2014-03-25 | 2015-10-01 | Emulex Corporation | Automatic derivation of system performance metric thresholds |
| US9591015B1 (en) | 2014-03-28 | 2017-03-07 | Fireeye, Inc. | System and method for offloading packet processing and static analysis operations |
| US9432389B1 (en) | 2014-03-31 | 2016-08-30 | Fireeye, Inc. | System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object |
| US9223972B1 (en) | 2014-03-31 | 2015-12-29 | Fireeye, Inc. | Dynamically remote tuning of a malware content detection system |
| US9594912B1 (en) | 2014-06-06 | 2017-03-14 | Fireeye, Inc. | Return-oriented programming detection |
| US9438623B1 (en) | 2014-06-06 | 2016-09-06 | Fireeye, Inc. | Computer exploit detection using heap spray pattern matching |
| US9973531B1 (en) | 2014-06-06 | 2018-05-15 | Fireeye, Inc. | Shellcode detection |
| US10084813B2 (en) | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
| US9398028B1 (en) | 2014-06-26 | 2016-07-19 | Fireeye, Inc. | System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers |
| US10805340B1 (en) | 2014-06-26 | 2020-10-13 | Fireeye, Inc. | Infection vector and malware tracking with an interactive user display |
| KR20160002058A (en)* | 2014-06-30 | 2016-01-07 | 한국전자통신연구원 | Modbus Communication Pattern Learning Based Abnormal Traffic Detection Apparatus and Method |
| US10002252B2 (en) | 2014-07-01 | 2018-06-19 | Fireeye, Inc. | Verification of trusted threat-aware microvisor |
| US9363280B1 (en) | 2014-08-22 | 2016-06-07 | Fireeye, Inc. | System and method of detecting delivery of malware using cross-customer data |
| US10671726B1 (en) | 2014-09-22 | 2020-06-02 | Fireeye Inc. | System and method for malware analysis using thread-level event monitoring |
| US10027689B1 (en) | 2014-09-29 | 2018-07-17 | Fireeye, Inc. | Interactive infection visualization for improved exploit detection and signature generation for malware and malware families |
| US9773112B1 (en) | 2014-09-29 | 2017-09-26 | Fireeye, Inc. | Exploit detection of malware and malware families |
| US9787572B2 (en)* | 2014-10-07 | 2017-10-10 | Cisco Technology, Inc. | Conflict avoidant traffic routing in a network environment |
| US10373409B2 (en) | 2014-10-31 | 2019-08-06 | Intellicheck, Inc. | Identification scan in compliance with jurisdictional or other rules |
| US9690933B1 (en) | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
| US10075455B2 (en) | 2014-12-26 | 2018-09-11 | Fireeye, Inc. | Zero-day rotating guest image profile |
| US9934376B1 (en) | 2014-12-29 | 2018-04-03 | Fireeye, Inc. | Malware detection appliance architecture |
| US9838417B1 (en) | 2014-12-30 | 2017-12-05 | Fireeye, Inc. | Intelligent context aware user interaction for malware detection |
| US9913201B1 (en) | 2015-01-29 | 2018-03-06 | Symantec Corporation | Systems and methods for detecting potentially illegitimate wireless access points |
| US10075475B2 (en)* | 2015-02-06 | 2018-09-11 | Honeywell International Inc. | Apparatus and method for dynamic customization of cyber-security risk item rules |
| US10148688B1 (en) | 2015-02-09 | 2018-12-04 | Symantec Corporation | Systems and methods for detecting illegitimate devices on wireless networks |
| US9730075B1 (en) | 2015-02-09 | 2017-08-08 | Symantec Corporation | Systems and methods for detecting illegitimate devices on wireless networks |
| US9781604B1 (en)* | 2015-02-09 | 2017-10-03 | Symantec Corporation | Systems and methods for detecting illegitimate devices on wireless networks |
| US10944764B2 (en)* | 2015-02-13 | 2021-03-09 | Fisher-Rosemount Systems, Inc. | Security event detection through virtual machine introspection |
| US9882931B1 (en) | 2015-02-18 | 2018-01-30 | Symantec Corporation | Systems and methods for detecting potentially illegitimate wireless access points |
| US9690606B1 (en) | 2015-03-25 | 2017-06-27 | Fireeye, Inc. | Selective system call monitoring |
| US10148693B2 (en) | 2015-03-25 | 2018-12-04 | Fireeye, Inc. | Exploit detection system |
| US9438613B1 (en) | 2015-03-30 | 2016-09-06 | Fireeye, Inc. | Dynamic content activation for automated analysis of embedded objects |
| US9641341B2 (en) | 2015-03-31 | 2017-05-02 | Duo Security, Inc. | Method for distributed trust authentication |
| US10417031B2 (en) | 2015-03-31 | 2019-09-17 | Fireeye, Inc. | Selective virtualization for security threat detection |
| US10474813B1 (en) | 2015-03-31 | 2019-11-12 | Fireeye, Inc. | Code injection technique for remediation at an endpoint of a network |
| US9483644B1 (en) | 2015-03-31 | 2016-11-01 | Fireeye, Inc. | Methods for detecting file altering malware in VM based analysis |
| US9654485B1 (en) | 2015-04-13 | 2017-05-16 | Fireeye, Inc. | Analytics-based security monitoring system and method |
| US9594904B1 (en) | 2015-04-23 | 2017-03-14 | Fireeye, Inc. | Detecting malware based on reflection |
| US9781601B1 (en) | 2015-06-08 | 2017-10-03 | Symantec Corporation | Systems and methods for detecting potentially illegitimate wireless access points |
| US10630649B2 (en) | 2015-06-30 | 2020-04-21 | K4Connect Inc. | Home automation system including encrypted device connection based upon publicly accessible connection file and related methods |
| US11113086B1 (en) | 2015-06-30 | 2021-09-07 | Fireeye, Inc. | Virtual system and method for securing external network connectivity |
| US10454950B1 (en) | 2015-06-30 | 2019-10-22 | Fireeye, Inc. | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
| US10642753B1 (en) | 2015-06-30 | 2020-05-05 | Fireeye, Inc. | System and method for protecting a software component running in virtual machine using a virtualization layer |
| WO2017004200A1 (en)* | 2015-06-30 | 2017-01-05 | K4Connect Inc. | Home automation system including security controller for terminating communication with abnormally operating addressable devices and related methods |
| US10726127B1 (en) | 2015-06-30 | 2020-07-28 | Fireeye, Inc. | System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer |
| US10715542B1 (en) | 2015-08-14 | 2020-07-14 | Fireeye, Inc. | Mobile application risk analysis |
| US10019572B1 (en) | 2015-08-27 | 2018-07-10 | Amazon Technologies, Inc. | Detecting malicious activities by imported software packages |
| US10032031B1 (en) | 2015-08-27 | 2018-07-24 | Amazon Technologies, Inc. | Detecting unknown software vulnerabilities and system compromises |
| US10176321B2 (en) | 2015-09-22 | 2019-01-08 | Fireeye, Inc. | Leveraging behavior-based rules for malware family classification |
| US10033747B1 (en) | 2015-09-29 | 2018-07-24 | Fireeye, Inc. | System and method for detecting interpreter-based exploit attacks |
| US10601865B1 (en) | 2015-09-30 | 2020-03-24 | Fireeye, Inc. | Detection of credential spearphishing attacks using email analysis |
| US9825976B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Detection and classification of exploit kits |
| US10706149B1 (en) | 2015-09-30 | 2020-07-07 | Fireeye, Inc. | Detecting delayed activation malware using a primary controller and plural time controllers |
| US10817606B1 (en) | 2015-09-30 | 2020-10-27 | Fireeye, Inc. | Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic |
| US9825989B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Cyber attack early warning system |
| US10210329B1 (en) | 2015-09-30 | 2019-02-19 | Fireeye, Inc. | Method to detect application execution hijacking using memory protection |
| US10284575B2 (en) | 2015-11-10 | 2019-05-07 | Fireeye, Inc. | Launcher for setting analysis environment variations for malware detection |
| US10645167B2 (en)* | 2015-11-23 | 2020-05-05 | Cybirical, LLC | Distributed setting of network security devices from power system IED settings files |
| US9918224B1 (en) | 2015-11-24 | 2018-03-13 | Symantec Corporation | Systems and methods for preventing computing devices from sending wireless probe packets |
| US10846117B1 (en) | 2015-12-10 | 2020-11-24 | Fireeye, Inc. | Technique for establishing secure communication between host and guest processes of a virtualization architecture |
| US10447728B1 (en) | 2015-12-10 | 2019-10-15 | Fireeye, Inc. | Technique for protecting guest processes using a layered virtualization architecture |
| US10108446B1 (en) | 2015-12-11 | 2018-10-23 | Fireeye, Inc. | Late load technique for deploying a virtualization layer underneath a running operating system |
| US10511481B1 (en) | 2015-12-15 | 2019-12-17 | Amazon Technologies, Inc. | Optimizing application configurations in a provider network |
| US9652962B1 (en)* | 2015-12-21 | 2017-05-16 | General Electric Company | Systems and methods for safety and proximity sensing in industrial environments |
| US10050998B1 (en) | 2015-12-30 | 2018-08-14 | Fireeye, Inc. | Malicious message analysis system |
| US10621338B1 (en) | 2015-12-30 | 2020-04-14 | Fireeye, Inc. | Method to detect forgery and exploits using last branch recording registers |
| US10133866B1 (en) | 2015-12-30 | 2018-11-20 | Fireeye, Inc. | System and method for triggering analysis of an object for malware in response to modification of that object |
| US10565378B1 (en) | 2015-12-30 | 2020-02-18 | Fireeye, Inc. | Exploit of privilege detection framework |
| US9824216B1 (en) | 2015-12-31 | 2017-11-21 | Fireeye, Inc. | Susceptible environment detection system |
| US11552986B1 (en) | 2015-12-31 | 2023-01-10 | Fireeye Security Holdings Us Llc | Cyber-security framework for application of virtual features |
| US10581874B1 (en) | 2015-12-31 | 2020-03-03 | Fireeye, Inc. | Malware detection system with contextual analysis |
| US10601863B1 (en) | 2016-03-25 | 2020-03-24 | Fireeye, Inc. | System and method for managing sensor enrollment |
| US10785255B1 (en) | 2016-03-25 | 2020-09-22 | Fireeye, Inc. | Cluster configuration within a scalable malware detection system |
| US10671721B1 (en) | 2016-03-25 | 2020-06-02 | Fireeye, Inc. | Timeout management services |
| US10616266B1 (en) | 2016-03-25 | 2020-04-07 | Fireeye, Inc. | Distributed malware detection system and submission workflow thereof |
| US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
| US10826933B1 (en) | 2016-03-31 | 2020-11-03 | Fireeye, Inc. | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
| US10447540B2 (en)* | 2016-04-08 | 2019-10-15 | Cisco Technology, Inc. | Deriving a network policy for an industrial automation network |
| US9935852B2 (en)* | 2016-06-06 | 2018-04-03 | General Electric Company | Methods and systems for network monitoring |
| EP3258661B1 (en)* | 2016-06-16 | 2020-11-18 | ABB Schweiz AG | Detection of abnormal configuration changes |
| US10169585B1 (en) | 2016-06-22 | 2019-01-01 | Fireeye, Inc. | System and methods for advanced malware detection through placement of transition events |
| US10348755B1 (en) | 2016-06-30 | 2019-07-09 | Symantec Corporation | Systems and methods for detecting network security deficiencies on endpoint devices |
| US10462173B1 (en) | 2016-06-30 | 2019-10-29 | Fireeye, Inc. | Malware detection verification and enhancement by coordinating endpoint and malware detection systems |
| US11042506B2 (en)* | 2016-07-20 | 2021-06-22 | Microsoft Technology Licensing, Llc | Compliance violation detection |
| US10592678B1 (en) | 2016-09-09 | 2020-03-17 | Fireeye, Inc. | Secure communications between peers using a verified virtual trusted platform module |
| US10491627B1 (en) | 2016-09-29 | 2019-11-26 | Fireeye, Inc. | Advanced malware detection using similarity analysis |
| GB201617620D0 (en)* | 2016-10-18 | 2016-11-30 | Cybernetica As | Composite digital signatures |
| US10795991B1 (en) | 2016-11-08 | 2020-10-06 | Fireeye, Inc. | Enterprise search |
| DE102016222741A1 (en)* | 2016-11-18 | 2018-05-24 | Continental Automotive Gmbh | Method for a communication network and electronic control unit |
| US10587647B1 (en) | 2016-11-22 | 2020-03-10 | Fireeye, Inc. | Technique for malware detection capability comparison of network security devices |
| US10552610B1 (en) | 2016-12-22 | 2020-02-04 | Fireeye, Inc. | Adaptive virtual machine snapshot update framework for malware behavioral analysis |
| US10581879B1 (en) | 2016-12-22 | 2020-03-03 | Fireeye, Inc. | Enhanced malware detection for generated objects |
| US10523609B1 (en) | 2016-12-27 | 2019-12-31 | Fireeye, Inc. | Multi-vector malware detection and analysis |
| US10268170B2 (en) | 2017-01-03 | 2019-04-23 | General Electric Company | Validation of control command in substantially real time for industrial asset control system threat detection |
| DE102017202002A1 (en) | 2017-02-08 | 2018-08-09 | Siemens Aktiengesellschaft | Method and computer for cryptographically protecting control communication in and / or service access to IT systems, in particular in connection with the diagnosis and configuration in an automation, control or monitoring system |
| EP3373544A1 (en)* | 2017-03-07 | 2018-09-12 | ABB Schweiz AG | Automatic communication network system hardening |
| US10904286B1 (en) | 2017-03-24 | 2021-01-26 | Fireeye, Inc. | Detection of phishing attacks using similarity analysis |
| US10554507B1 (en) | 2017-03-30 | 2020-02-04 | Fireeye, Inc. | Multi-level control for enhanced resource and object evaluation management of malware detection system |
| US10791138B1 (en) | 2017-03-30 | 2020-09-29 | Fireeye, Inc. | Subscription-based malware detection |
| US10902119B1 (en) | 2017-03-30 | 2021-01-26 | Fireeye, Inc. | Data extraction system for malware analysis |
| US10798112B2 (en) | 2017-03-30 | 2020-10-06 | Fireeye, Inc. | Attribute-controlled malware detection |
| US10432647B2 (en)* | 2017-06-27 | 2019-10-01 | Honeywell International Inc. | Malicious industrial internet of things node activity detection for connected plants |
| US10855700B1 (en) | 2017-06-29 | 2020-12-01 | Fireeye, Inc. | Post-intrusion detection of cyber-attacks during lateral movement within networks |
| US10503904B1 (en) | 2017-06-29 | 2019-12-10 | Fireeye, Inc. | Ransomware detection and mitigation |
| US10601848B1 (en) | 2017-06-29 | 2020-03-24 | Fireeye, Inc. | Cyber-security system and method for weak indicator detection and correlation to generate strong indicators |
| US10893068B1 (en) | 2017-06-30 | 2021-01-12 | Fireeye, Inc. | Ransomware file modification prevention technique |
| EP3457286B1 (en)* | 2017-09-14 | 2022-07-13 | ABB Schweiz AG | Method and computing device for commissioning an industrial automation control system |
| US10948883B2 (en)* | 2017-09-20 | 2021-03-16 | Rockwell Automation Technologies, Inc. | Machine logic characterization, modeling, and code generation |
| US10747872B1 (en) | 2017-09-27 | 2020-08-18 | Fireeye, Inc. | System and method for preventing malware evasion |
| US10805346B2 (en) | 2017-10-01 | 2020-10-13 | Fireeye, Inc. | Phishing attack detection |
| EP3474509B1 (en)* | 2017-10-18 | 2021-10-06 | ABB Schweiz AG | Methods for controlling a device and control system |
| US11108809B2 (en) | 2017-10-27 | 2021-08-31 | Fireeye, Inc. | System and method for analyzing binary code for malware classification using artificial neural network techniques |
| US10416661B2 (en)* | 2017-11-30 | 2019-09-17 | Abb Schweiz Ag | Apparatuses, systems and methods of secure cloud-based monitoring of industrial plants |
| US10645121B1 (en)* | 2017-12-11 | 2020-05-05 | Juniper Networks, Inc. | Network traffic management based on network entity attributes |
| US11005860B1 (en) | 2017-12-28 | 2021-05-11 | Fireeye, Inc. | Method and system for efficient cybersecurity analysis of endpoint events |
| US11271955B2 (en) | 2017-12-28 | 2022-03-08 | Fireeye Security Holdings Us Llc | Platform and method for retroactive reclassification employing a cybersecurity-based global data store |
| US11240275B1 (en) | 2017-12-28 | 2022-02-01 | Fireeye Security Holdings Us Llc | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture |
| US10908940B1 (en) | 2018-02-26 | 2021-02-02 | Amazon Technologies, Inc. | Dynamically managed virtual server system |
| EP3544262A1 (en)* | 2018-03-22 | 2019-09-25 | Mitsubishi Electric R&D Centre Europe B.V. | Method of improving security in a factory automation network |
| US10826931B1 (en) | 2018-03-29 | 2020-11-03 | Fireeye, Inc. | System and method for predicting and mitigating cybersecurity system misconfigurations |
| US10956477B1 (en) | 2018-03-30 | 2021-03-23 | Fireeye, Inc. | System and method for detecting malicious scripts through natural language processing modeling |
| US11003773B1 (en) | 2018-03-30 | 2021-05-11 | Fireeye, Inc. | System and method for automatically generating malware detection rule recommendations |
| US11558401B1 (en) | 2018-03-30 | 2023-01-17 | Fireeye Security Holdings Us Llc | Multi-vector malware detection data sharing system for improved detection |
| US11084225B2 (en) | 2018-04-02 | 2021-08-10 | Nanotronics Imaging, Inc. | Systems, methods, and media for artificial intelligence process control in additive manufacturing |
| CN108521423A (en)* | 2018-04-10 | 2018-09-11 | 江苏亨通工控安全研究院有限公司 | HWIL simulation industry control network target range system |
| US10867044B2 (en)* | 2018-05-30 | 2020-12-15 | AppOmni, Inc. | Automatic computer system change monitoring and security gap detection system |
| US11314859B1 (en) | 2018-06-27 | 2022-04-26 | FireEye Security Holdings, Inc. | Cyber-security system and method for detecting escalation of privileges within an access token |
| US11075930B1 (en) | 2018-06-27 | 2021-07-27 | Fireeye, Inc. | System and method for detecting repetitive cybersecurity attacks constituting an email campaign |
| US11228491B1 (en) | 2018-06-28 | 2022-01-18 | Fireeye Security Holdings Us Llc | System and method for distributed cluster configuration monitoring and management |
| US11316900B1 (en) | 2018-06-29 | 2022-04-26 | FireEye Security Holdings Inc. | System and method for automatically prioritizing rules for cyber-threat detection and mitigation |
| US11182473B1 (en) | 2018-09-13 | 2021-11-23 | Fireeye Security Holdings Us Llc | System and method for mitigating cyberattacks against processor operability by a guest process |
| US11763004B1 (en) | 2018-09-27 | 2023-09-19 | Fireeye Security Holdings Us Llc | System and method for bootkit detection |
| US11153152B2 (en) | 2018-11-21 | 2021-10-19 | Cisco Technology, Inc. | System and methods to validate issue detection and classification in a network assurance system |
| US11252046B2 (en)* | 2018-12-14 | 2022-02-15 | Juniper Networks, Inc. | System for identifying and assisting in the creation and implementation of a network service configuration using Hidden Markov Models (HMMs) |
| US11176251B1 (en) | 2018-12-21 | 2021-11-16 | Fireeye, Inc. | Determining malware via symbolic function hash analysis |
| US11743290B2 (en) | 2018-12-21 | 2023-08-29 | Fireeye Security Holdings Us Llc | System and method for detecting cyberattacks impersonating legitimate sources |
| US12074887B1 (en) | 2018-12-21 | 2024-08-27 | Musarubra Us Llc | System and method for selectively processing content after identification and removal of malicious content |
| US11368475B1 (en) | 2018-12-21 | 2022-06-21 | Fireeye Security Holdings Us Llc | System and method for scanning remote services to locate stored objects with malware |
| US11601444B1 (en) | 2018-12-31 | 2023-03-07 | Fireeye Security Holdings Us Llc | Automated system for triage of customer issues |
| US11968240B2 (en)* | 2019-03-04 | 2024-04-23 | Cisco Technology, Inc. | Network posture based suggestion of applications and services |
| US11310238B1 (en) | 2019-03-26 | 2022-04-19 | FireEye Security Holdings, Inc. | System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources |
| US11677786B1 (en) | 2019-03-29 | 2023-06-13 | Fireeye Security Holdings Us Llc | System and method for detecting and protecting against cybersecurity attacks on servers |
| US11636198B1 (en) | 2019-03-30 | 2023-04-25 | Fireeye Security Holdings Us Llc | System and method for cybersecurity analyzer update and concurrent management system |
| EP3731203B1 (en) | 2019-04-24 | 2023-05-31 | Carrier Corporation | Alarm system |
| US11005822B2 (en)* | 2019-05-03 | 2021-05-11 | Cisco Technology, Inc. | Securing substation communications using security groups based on substation configurations |
| US11083919B2 (en) | 2019-05-29 | 2021-08-10 | Honeywell International Inc. | Operating a fire control system |
| US11258806B1 (en) | 2019-06-24 | 2022-02-22 | Mandiant, Inc. | System and method for automatically associating cybersecurity intelligence to cyberthreat actors |
| US11556640B1 (en) | 2019-06-27 | 2023-01-17 | Mandiant, Inc. | Systems and methods for automated cybersecurity analysis of extracted binary string sets |
| US11392700B1 (en) | 2019-06-28 | 2022-07-19 | Fireeye Security Holdings Us Llc | System and method for supporting cross-platform data verification |
| US12425453B2 (en) | 2019-07-24 | 2025-09-23 | International Business Machines Corporation | Security layer for configuring blockchain |
| US12200013B2 (en) | 2019-08-07 | 2025-01-14 | Musarubra Us Llc | System and method for detecting cyberattacks impersonating legitimate sources |
| EP4028228A4 (en) | 2019-09-10 | 2023-09-27 | Nanotronics Imaging, Inc. | Systems, methods, and media for manufacturing processes |
| US11886585B1 (en) | 2019-09-27 | 2024-01-30 | Musarubra Us Llc | System and method for identifying and mitigating cyberattacks through malicious position-independent code execution |
| US11637862B1 (en) | 2019-09-30 | 2023-04-25 | Mandiant, Inc. | System and method for surfacing cyber-security threats with a self-learning recommendation engine |
| US11218360B2 (en) | 2019-12-09 | 2022-01-04 | Quest Automated Services, LLC | Automation system with edge computing |
| US11522884B1 (en) | 2019-12-24 | 2022-12-06 | Fireeye Security Holdings Us Llc | Subscription and key management system |
| US11838300B1 (en) | 2019-12-24 | 2023-12-05 | Musarubra Us Llc | Run-time configurable cybersecurity system |
| US11436327B1 (en) | 2019-12-24 | 2022-09-06 | Fireeye Security Holdings Us Llc | System and method for circumventing evasive code for cyberthreat detection |
| DE102020111450A1 (en)* | 2020-04-27 | 2021-10-28 | Bayerische Motoren Werke Aktiengesellschaft | Detecting errors in a computer network |
| KR102807321B1 (en) | 2020-10-20 | 2025-05-15 | 삼성전자주식회사 | Electronic apparatus and method for controlling thereof |
| EP4047898A1 (en)* | 2021-02-17 | 2022-08-24 | ABB Schweiz AG | Defending industrial automation systems against attack |
| CN113098892B (en)* | 2021-04-19 | 2023-04-18 | 恒安嘉新(北京)科技股份公司 | Data leakage prevention system and method based on industrial Internet |
| CN113673966B (en)* | 2021-09-03 | 2024-03-08 | 卡奥斯数字科技(青岛)有限公司 | Information security construction scheme generation method and device, electronic equipment and storage medium |
| CN115081396A (en)* | 2022-05-12 | 2022-09-20 | 中国南方电网有限责任公司 | Method and device for intelligently editing operation files |
| CN116760716B (en)* | 2023-08-18 | 2023-11-03 | 南京天谷电气科技有限公司 | Intelligent network topology management system and method for new energy station |
| CN119668346B (en)* | 2025-02-20 | 2025-05-13 | 北京瑞利恒安科技有限责任公司 | Control method and device for three-proofing system of airtight space based on multiple sensors |