$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Computer security 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0070698 (1998-04-30)
발명자 / 주소
  • Shostack Adam
  • Allouch David,ILX
출원인 / 주소
  • Netect, Ltd., ILX
대리인 / 주소
    Kress
인용정보 피인용 횟수 : 457  인용 특허 : 14

초록

In one aspect, the invention relates to automatically providing enhancements to computer security software whenever the enhancement becomes available. In another aspect, the invention relates to an integrated system for assessing security vulnerabilities of a computer and/or a computer network.

대표청구항

[ What is claimed is:] [1.]1. An integrated system for assessing vulnerabilities, comprising:a database of security vulnerabilities;a first module for accessing the database and for assessing security vulnerabilities of an operating system of a computer;a second module for accessing the database and

이 특허에 인용된 특허 (14)

  1. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  2. Levesque Roger H. ; Kraemer Jeffrey A. ; Nadkarni Ashok P., Key management for network communication.
  3. Smaha Stephen E. (Austin TX) Snapp Steven R. (Austin TX), Method and system for detecting intrusion into and misuse of a data processing system.
  4. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  5. Carter Stephen R. ; LaVange ; Jr. Donald H. ; Jensen Delos C., Network license authentication.
  6. Kondo Mariko (Yokohama JPX) Mori Yumiko (Yokohama JPX) Tsutsumi Toshiyuki (Yokohama JPX), Network management system for detecting and displaying a security hole.
  7. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  8. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for access field verification.
  9. Tajalli Homayoon (Ellicott City MD) Badger Mark L. (Rockville MD) Dalva David I. (Rockville MD) Walker Stephen T. (Glenwood MD), System and method for controlling the use of a computer.
  10. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  11. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
  12. Haigh J. Thomas ; Jensen Andrew W., System and method for securing compiled program code.
  13. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  14. Kirby Alan J. ; Kraemer Jeffrey A. ; Nadkarni Ashok P., Transferring encrypted packets over a public network.

이 특허를 인용한 특허 (457)

  1. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  2. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  3. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  4. Haq, Thoufique; Zhai, Jinjian; Pidathala, Vinay K., Advanced persistent threat (APT) detection center.
  5. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  6. van der Made, Peter A. J., Analytical virtual machine.
  7. van der Made,Peter A. J., Analytical virtual machine.
  8. Kouznetsov,Victor, Anti-intrusion software updating system and method.
  9. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  10. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  11. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  12. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  13. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  14. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  15. Keeney,Richard A.; Lodwick,Philip A.; Schoenzeit,Loren; Steinberg,John; Tenenbaum,Ofer, Apparatus and methods for printing a print job over a network.
  16. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Frederic; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for compact internetworked wireless integrated network sensors (WINS).
  17. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for compact internetworked wireless integrated network sensors (WINS).
  18. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for internetworked wireless integrated network sensors (WINS).
  19. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep; Merrill, William M., Apparatus for internetworked wireless integrated network sensors (WINS).
  20. Palliyil,Sudarshan; Venkateshamurthy,Shivakumara; Aswathanarayana,Tejasvi, Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network.
  21. Palliyil,Sudarshan; Venkateshamurthy,Shivakumara; Aswathanarayana,Tejasvi, Apparatus, methods and computer programs for identifying or managing vulnerabilities within a data processing network.
  22. Kummu, Ville; Aukia, Petri; Holkkola, Juha, Applianced domain name server.
  23. Ben-Itzhak, Yuval, Application layer security method and system.
  24. Markham,Thomas R.; Bogle,Jessica J.; Payne, Jr.,Charles N., Associative policy model.
  25. Piesco,Albert L.; Walsh,Julia H., Attack impact prediction system.
  26. Luo,Chenghui; Zhao,Jian, Authenticating executable code and executions thereof.
  27. Caceres,Maximiliano Gerardo; Richarte,Gerardo Gabriel; Friedman,Agustin Azubel; Quesada,Ricardo; Notarfrancesco,Luciano; Friederichs,Oliver; Burroni,Javier; Ajzenman,Gustavo; Becedillas,Gabriel; Leid, Automated computer system security compromise.
  28. Banzhof,Carl E., Automated computer vulnerability resolution system.
  29. Banzhof,Carl E., Automated computer vulnerability resolution system.
  30. Howard,Robert James, Buffer overflow protection and prevention.
  31. Islam, Ali; Bu, Zheng, Classifying sets of malicious indicators for detecting command and control communications associated with malware.
  32. Gordon, Bryson P.; Schneider, Ryan L., Combined multiple-application alert system and method.
  33. Cosquer, Francois J. N.; Marquet, Bertrand; MacIntosh, Robert W.; Leclerc, Yvon; D'Souza, Scott David, Communication network security risk exposure management systems and methods.
  34. Thioux, Emmanuel; Vashisht, Sai; Vincent, Michael, Computer exploit detection using heap spray pattern matching.
  35. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  36. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  37. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  38. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  39. Palliyil, Sudarshan; Venkateshamurthy, Shivakumara; Aswathanarayana, Tejasvi, Computer program product and computer system for controlling performance of operations within a data processing system or networks.
  40. Aziz, Ashar, Computer worm defense system and method.
  41. Agbabian,Paul M.; Hertel,David R., Configuration system and methods including configuration inheritance and revisioning.
  42. Amarasinghe, Saman P.; Chandramohan, Bharath; Renert, Charles; Bruening, Derek L.; Kiriansky, Vladimir; Garnett, Timothy; Wilbourn, Sandy; Wu, Warren, Constraint injection system for immunizing software programs against vulnerabilities and attacks.
  43. Diamond, Michael B.; White, Jonathan B., Content keys for authorizing access to content.
  44. Diamond, Michael B.; White, Jonathan B., Content server and method of providing content therefrom.
  45. Diamond, Michael B.; White, Jonathan B., Content server and method of storing content.
  46. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Correlation and consolidation of analytic data for holistic view of a malware attack.
  47. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Correlation and consolidation of analytic data for holistic view of malware attack.
  48. Mehra, Divyesh; Singh, Abhishek, Cyber attack early warning system.
  49. Muttik, Igor; Wolff, Daniel Joseph; Tarbotton, Lee Codel Lawson, Data scanning for updatable predefined properties.
  50. Vincent, Michael M.; Singh, Abhishek; Amin, Muhammad; Bu, Zheng, Detecting bootkits resident on compromised computers.
  51. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  52. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  53. Aziz, Ashar; Staniford, Stuart Gresley; Amin, Muhammad; Uyeno, Henry; Yie, Samuel, Detecting malicious network content.
  54. Ismael, Osman Abdoul; Yie, Samuel; Manni, Jayaraman; Amin, Muhammad; Mahbod, Bahman, Detecting malicious network content using virtual environment components.
  55. Jain, Varun; Singh, Abhishek, Detecting malware based on reflection.
  56. Satish, Sourabh; Hernacki, Brian, Detecting new or modified portions of code.
  57. Gomez, Joshua Lewis; Singh, Abhishek, Detection and classification of exploit kits.
  58. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  59. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  60. Martin, Hamish D S; Brown, Ronald; Pearce, Mark A, Detection of an attack such as a pre-attack on a computer network.
  61. Wilkinson,Mark L.; Miller,Ronald J.; McDaniels,Michael J., Deterring network incursion.
  62. Caceres,Maximiliano Gabriel; Burroni,Javier; Ajzenman,Gustavo; Quesada,Ricardo; Richarte,Gerardo Gabriel; Notarfrancesco,Luciano; Leidl,Bruce Robert; Friedman,Agustin Azubel; Becedillas Ruiz,Gabriel Martin, Distributed computing using syscall proxying.
  63. Markham, Thomas R., Distributed firewall system and method.
  64. Mushtaq, Atif; Rosenberry, Todd; Aziz, Ashar; Islam, Ali, Distributed systems and methods for automatically detecting unknown bots and botnets.
  65. Mushtaq, Atif; Rosenberry, Todd; Aziz, Ashar; Islam, Ali, Distributed systems and methods for automatically detecting unknown bots and botnets.
  66. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  67. Paithane, Sushant; Vashisht, Sai, Dynamic content activation for automated analysis of embedded objects.
  68. Goradia, Harnish, Dynamic guest image creation and rollback.
  69. Bahl, Pradeep, Dynamic risk management.
  70. Bahl, Pradeep, Dynamic risk management.
  71. Aziz, Ashar; Radhakrishnan, Ramesh; Lai, Wei-Lung; Manni, Jayaraman, Dynamic signature creation and enforcement.
  72. Vincent, Michael; Mesdaq, Ali; Thioux, Emmanuel; Singh, Abhishek; Vashisht, Sai, Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses.
  73. Vincent, Michael; Thioux, Emmanuel; Vashisht, Sai; Kindlund, Darien, Dynamically remote tuning of a malware content detection system.
  74. Brown, Scott T.; Wanser, Kelly A., E-mail messaging system and method for enhanced rich media delivery.
  75. Brown, Scott T.; Wanser, Kelly A., E-mail messaging system and method for enhanced rich media delivery.
  76. Brown, Scott T.; Wanser, Kelly A., E-mail messaging system and method for enhanced rich media delivery.
  77. Brown, Scott T.; Wanser, Kelly A., E-mail messaging system and method for enhanced rich media delivery.
  78. Satish, Sourabh, Educating computer users concerning security threats.
  79. Satish, Sourabh, Educating computer users concerning social engineering security threats.
  80. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Electronic device for aggregation, correlation and consolidation of analysis attributes.
  81. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Amin, Muhammad; Staniford, Stuart, Electronic message analysis for malware detection.
  82. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  83. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  84. Tracy,Richard P.; Barrett,Hugh; Berman,Lon J.; Catlin,Gary M.; Dimtsios,Thomas G., Enhanced system, method and medium for certifying and accrediting requirements compliance.
  85. Tracy, Richard P.; Barrett, Hugh; Catlin, Gary M., Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment.
  86. Tracy,Richard P.; Barrett,Hugh; Catlin,Gary M., Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model.
  87. Rathor, Hirendra; Dalal, Kaushal, Exploit detection of malware and malware families.
  88. Rathor, Hirendra; Dalal, Kaushal, Exploit detection of malware and malware families.
  89. Singh, Japneet; Ramchetty, Harinath; Gupta, Anil, Exploit detection system.
  90. Thioux, Emmanuel; Amin, Muhammad; Ismael, Osman, File extraction from memory dump for malicious content analysis.
  91. Singh, Abhishek; Mesdaq, Ali; Das, Anirban; Jain, Varun, Framework for classifying an object as malicious with machine learning for deploying updated predictive models.
  92. Ismael, Osman Abdoul; Song, Dawn; Ha, Phung-Te; Gilbert, Peter J.; Xue, Hui, Framework for computer application analysis of sensitive information tracking.
  93. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prashanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  94. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prshanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  95. Ismael, Osman Abdoul; Song, Dawn, Framework for efficient security coverage of mobile software applications installed on mobile devices.
  96. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mettler, Adrian Matthew, Framework for efficient security coverage of mobile software applications that is usable to harden in the field code.
  97. Ismael, Osman Abdoul; Song, Dawn; Ha, Phung-Te; Gilbert, Peter J.; Xue, Hui, Framework for efficient security coverage of mobile software applications using machine learning.
  98. Ismael, Osman Abdoul; Song, Dawn; Xue, Hui, Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application.
  99. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar, Framework for iterative analysis of mobile software applications.
  100. Ismael, Osman Abdoul; Aziz, Ashar, Framework for multi-phase analysis of mobile applications.
  101. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  102. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  103. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  104. Lippmann, Richard P.; Ingols, Kyle W.; Piwowarski, Keith J., Generating a multiple-prerequisite attack graph.
  105. Lippmann, Richard P.; Ingols, Kyle W.; Piwowarski, Keith J., Generating a multiple-prerequisite attack graph.
  106. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  107. Palliyil, Sudarshan; Venkateshamurthy, Shivakumara; Vijayaraghavan, Srinivas Belur; Aswathanarayana, Tejasvi, Hash-based access to resources in a data processing network.
  108. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  109. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  110. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  111. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Heuristic based capture with replay to virtual machine.
  112. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  113. Thrower, Woodrow A.; Oates, Jared S., Incident prioritization and adaptive response recommendations.
  114. Wiemer, Douglas; Gustave, Christophe; Chow, Stanley TaiHai; McFarlane, Bradley Kenneth, Information system service-level security risk analysis.
  115. Sima, Caleb; Millar, Steve; Kelly, Raymond; Sullivan, Bryan; Sullivan, Gerald; Tillery, David, Integrated crawling and auditing of web applications and web content.
  116. Khalid, Yasir; Paithane, Sushant; Vashisht, Sai, Intelligent context aware user interaction for malware detection.
  117. Dark,Susan Pittman, Intelligent feedback loop process control system.
  118. Rathor, Hirendra; Dalal, Kaushal; Gupta, Anil, Interactive infection visualization for improved exploit detection and signature generation for malware and malware families.
  119. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  120. Boren, Dale W., Internet security dynamics assessment system, program product, and related methods.
  121. Flowers, John S.; Stracener, Thomas C., Interoperability of vulnerability and intrusion detection systems.
  122. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  123. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  124. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E., Intrusion detection and vulnerability assessment system, method and computer program product.
  125. Magdych,James S.; Rahmanovic,Tarik; McDonald,John R.; Tellier,Brock E., Intrusion detection and vulnerability assessment system, method and computer program product.
  126. Daniel M. Teal, Intrusion detection system and method having dynamically loaded signatures.
  127. Teal, Daniel M., Intrusion detection system and method having dynamically loaded signatures.
  128. Eyada, Hatem, Intrusion prevention and remedy system.
  129. Abbasi, Fahim H.; Salam, Abdul; Shahzad, Farrukh, Leveraging behavior-based rules for malware family classification.
  130. Wilkinson, Mark L.; Miller, Ronald J.; McDaniels, Michael J., Logical / physical address state lifecycle management.
  131. Wilkinson, Mark L.; Miller, Ronald J.; McDaniels, Michael J., Logical / physical address state lifecycle management.
  132. Thioux, Emmanuel; Amin, Muhammad; Kindlund, Darien; Pilipenko, Alex; Vincent, Michael, Malicious content analysis using simulated user interaction without user involvement.
  133. Thioux, Emmanuel; Amin, Muhammad; Kindlund, Darien; Pilipenko, Alex; Vincent, Michael, Malicious content analysis using simulated user interaction without user involvement.
  134. Khalid, Yasir; Amin, Muhammad; Jing, Emily; Rizwan, Muhammad, Malicious content analysis with multi-version application support within single operating environment.
  135. Khalid, Yasir; Amin, Muhammad; Jing, Emily; Rizwan, Muhammad, Malicious content analysis with multi-version application support within single operating environment.
  136. Singh, Abhishek, Malicious message analysis system.
  137. Vincent, Michael; Mesdaq, Ali; Thioux, Emmanuel; Singh, Abhishek; Vashisht, Sal, Malware analysis in accordance with an analysis plan.
  138. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Malware containment and security analysis on connection.
  139. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Malware containment on connection.
  140. Feeney, Bryan; Poulson, Steven; Edwards, John, Malware detection.
  141. Kouznetsov, Victor; Libenzi, Davide; Fallenstedt, Martin; Palmer, David W.; Pak, Michael C., Malware scanning wireless service agent system and method.
  142. Liu, Sharon S.; Luehe, Jan, Mechanism for determining restrictions to impose on an implementation of a service.
  143. Liu,Sharon S.; Luehe,Jan, Mechanism for dynamically constructing customized implementations to enforce restrictions.
  144. Liu, Sharon S.; Luehe, Jan, Mechanism for merging multiple policies.
  145. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  146. Mayer,Alain; Wool,Avishai; Ziskind,Elisha, Method and apparatus for analyzing one or more firewalls.
  147. Hammond, Nicolas J., Method and apparatus for auditing network security.
  148. Hammond,Nicolas J., Method and apparatus for auditing network security.
  149. Keeney, Richard A.; Lodwick, Philip A.; Nourbakhsh, Farhad; Schoenzeit, Loren, Method and apparatus for controlling a document output device with a control request stored at a server.
  150. Yadav,Satyendra, Method and apparatus for enforcing network security policies.
  151. Schwartz, Elliot, Method and apparatus for firewall traversal.
  152. Branigan,Steven; Burch,Hal Joseph; Cheswick,William R., Method and apparatus for host probing.
  153. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  154. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  155. Cohen, Fred, Method and apparatus for network deception/emulation.
  156. Cohen,Fred, Method and apparatus for network deception/emulation.
  157. Mayer, Alain Jules, Method and apparatus for network wide policy-based analysis of configurations of devices.
  158. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  159. Liu,Sharon S.; Luehe,Jan, Method and apparatus for verifying the legitimacy of an untrusted mechanism.
  160. Vasireddy, S. Rao; Chandrashekhar, Uma; Sabnis, Suhasini; McGee, Andrew R.; Solari, Carlos, Method and apparatus to measure the security of a system, network, or application.
  161. Palliyil, Sudarshan; Venkateshamurthy, Shivakumara; Aswathanarayana, Tejasvi, Method and computer program product for identifying or managing vulnerabilities within a data processing network.
  162. Kotler, Hilik; Suchowski, Ron Shay, Method and device for questioning a plurality of computerized devices.
  163. Suchowski, Ron Shay; Kotler, Hilik, Method and device for questioning a plurality of computerized devices.
  164. Suchowski, Ron Shay; Kotler, Hilik, Method and device for scanning a plurality of computerized devices connected to a network.
  165. Diamond, Michael B.; White, Jonathan B., Method and system for accessing content on demand.
  166. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  167. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  168. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  169. Flowers,John S.; Stracener,Thomas C., Method and system for detecting a vulnerability in a network.
  170. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  171. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  172. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  173. Diamond, Michael B.; White, Jonathan B., Method and system for registering and activating content.
  174. Vogel, Jr., Gary Dennis; Butaney, Vikas, Method and system for transferring audio content to a telephone-switching system.
  175. Kouznetsov, Victor, Method and system for updating anti-intrusion software.
  176. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Frederic; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method for internetworked hybrid wireless integrated network sensors (WINS).
  177. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method for internetworked hybrid wireless integrated network sensors (WINS).
  178. Lotem, Amnon; Cohen, Gideon; Ben Naon, Lior, Method for simulation aided security event management.
  179. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  180. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J., Method for vehicle internetworks.
  181. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J., Method for vehicle internetworks.
  182. Malik, Amit; Pande, Reghav; Jain, Aakash, Method to detect application execution hijacking using memory protection.
  183. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  184. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  185. Alagna,Michael Tony; Obrecht,Mark; Payne,Andy; Norwood,Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  186. Baggett, Jr., Charlie C.; Adams, John J., Method, system and computer program product for assessing information security.
  187. Alagna,Michael Anthony; Obrecht,Mark Eric; Payne,Charles Andrew; Norwood,Peter, Method, system and computer program product for security in a global computer network transaction.
  188. Baggett, Jr., Charlie C.; Adams, John J., Method, system, and computer program product for assessing information security.
  189. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  190. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  191. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  192. Bishop, Fred Alan; Glazer, Elliot Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  193. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  194. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  195. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  196. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  197. Gecht, Guy; Bakshi, Chirag; Kamble, Sanjay, Methods and apparatus for providing universal print services and asynchronous message services.
  198. Keeney, Richard A.; Lodwick, Philip A.; Nourbakhsh, Farhad; Schoenzeit, Loren; Tenenbaum, Ofer, Methods and apparatus for requesting and receiving a print job at a printer.
  199. Keeney,Richard A.; Lodwick,Philip A.; Nourbakhsh,Farhad; Schoenzeit,Loren; Tenenbaum,Ofer, Methods and apparatus for requesting and receiving a print job via a polling device associated with a printer.
  200. Keeney, Richard A.; Lodwick, Philip A.; Nourbakhsh, Farhad; Schoenzeit, Loren; Tenenbaum, Ofer, Methods and apparatus for requesting and receiving a print job via a printer polling device associated with a printer.
  201. Keeney,Richard A.; Lodwick,Philip A.; Nourbakhsh,Farhad; Schoenzeit,Loren; Tenenbaum,Ofer, Methods and apparatus for securely requesting and receiving a print job via a printer polling device associated with a printer.
  202. Nicodemus, Blair Gaver; Stephens, Billy Edison, Methods and systems for controlling access to computing resources based on known security vulnerabilities.
  203. Nicodemus, Blair; Stephens, Billy Edison, Methods and systems for controlling access to computing resources based on known security vulnerabilities.
  204. Nicodemus, Blair; Stephens, Billy Edison, Methods and systems for controlling access to computing resources based on known security vulnerabilities.
  205. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  206. Hutchinson, Robin; Giubileo, John; O'Brien, Darci, Methods and systems for managing enterprise assets.
  207. Tenenbaum, Ofer, Methods and systems for the provision of printing services.
  208. Gecht, Guy; Lodwick, Philip A.; Schoenzeit, Loren; Steinberg, John D.; Tenenbaum, Ofer, Methods and systems for the provision of remote printing services over a network.
  209. Paithane, Sushant; Vashisht, Sai; Yang, Raymond; Khalid, Yasir, Methods for detecting file altering malware in VM based analysis.
  210. Palliyil, Sudarshan; Venkateshamurthy, Shivakumara; Vijayaraghavan, Srinivas Belur; Aswathanarayana, Tejasvi, Methods, apparatus and computer programs for enhanced access to resources within a network.
  211. Kling, John Howard; Brubaker, Mark Earl; Quon, Cora Yan; Bierner, Rachel Yun Kim; Moloian, Armen; Kuhlmeier, Ronald James, Model framework and system for cyber security services.
  212. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  213. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  214. Dec, Wojciech; Mammoliti, Vincent J.; Pruss, Richard M.; Chiba, Murtaza, Monitoring network service affecting events, taking action, and automating subscriber notification.
  215. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  216. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  217. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  218. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  219. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  220. Baker, Stephen M., Multilayered intrusion detection system and method.
  221. Oliphant, Brett M., Multiple-path remediation.
  222. Malik, Amit; Deshpande, Shivani; Singh, Abhishek; Zheng, Wei, Multistage system and method for analyzing obfuscated content for malware.
  223. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste, Network audit and policy assurance system.
  224. Newton, Chris, Network intelligence system.
  225. Hall, Aron, Network security apparatus and method.
  226. Dowd,Alan; Markham,Thomas R.; Foote Lennox,Tomo; Apostal,David; Lu,Raymond, Network security modeling system and method.
  227. Nair, Bini Krishnan Ananthakrishnan, Network security scanner for enterprise protection.
  228. Jahn,Alfred, Network security software.
  229. Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  230. Keanini,Timothy D.; Quiroga,Martin A.; Buchanan,Brian W.; Flowers,John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  231. Bunker, V,Nelson Waldo; Laizerovich,David; Bunker,Eva Elizabeth; Van Schuyver,Joey Don, Network security testing.
  232. Porras, Phillip Andrew; Valdes, Alfonso De Jesus, Network surveillance.
  233. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance using long-term and short-term statistical profiles to determine suspicious network activity.
  234. Porras, Phillip Andrew; Fong, Martin Wayne, Network-based alert management system.
  235. Manni, Jayaraman; Aziz, Ashar; Gong, Fengmin; Loganathan, Upendran; Amin, Muhammad, Network-based binary file extraction and analysis for malware detection.
  236. Manni, Jayaraman; Aziz, Ashar; Gong, Fengmin; Loganathan, Upendran; Amin, Muhammad, Network-based binary file extraction and analysis for malware detection.
  237. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, Network-based malware detection.
  238. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Network-based risk-assessment tool for remotely detecting local computer vulnerabilities.
  239. Magdych,James S.; Rahmanovic,Tarik; McDonald,John R.; Tellier,Brock E.; Osborne,Anthony C.; Herath,Nishad P., Network-based risk-assessment tool for remotely detecting local computer vulnerabilities.
  240. Novack, Brian M.; Andrews, Stephanie; Arora, Aditya; Jeffrey, Emlyn C.; Smith, Gary, Networked device access control.
  241. Novack, Brian M.; Andrews, Stephanie; Arora, Aditya; Jeffrey, Emlyn C.; Smith, Gary, Networked device access control.
  242. Aaron,Jeffrey A., Non-invasive monitoring of the effectiveness of electronic security services.
  243. Ismael, Osman Abdoul, Optimized resource allocation for virtual machines within a malware content detection system.
  244. Heinrich, Nicolas, Overall risk in a system.
  245. Heinrich, Nicolas, Overall risk in a system.
  246. Ha, Phung-Te; Tonkonoh, Seva; Ismael, Osman Abdoul, Page replacement code injection.
  247. Keanini, Timothy D.; Molitor, Andrew; Gurney, John-Mark; Cooper, Jeremy; Buchanan, Brian, Persistent host determination.
  248. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Policy based capture with replay to virtual machine.
  249. Jeschke, KoniKaye; Jorlett, Devon; Cunningham, James R., Predictive assessment of network risks.
  250. Lodwick, Philip A., Print driver apparatus and methods for forwarding a print job over a network.
  251. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  252. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  253. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  254. Khuti, Bharat; Coleman, Clayton; Rath, David; Rakaczky, Ernest; Leslie, Jim; Peralta, Juan; Simpson, George, Process control methods and apparatus for intrusion detection, protection and network hardening.
  255. Khuti, Bharat; Coleman, Clayton; Rath, David; Rakaczky, Ernest; Leslie, Jim; Peralta, Juan; Simpson, George, Process control methods and apparatus for intrusion detection, protection and network hardening.
  256. Aziz, Ashar, Prospective client identification using malware attack detection.
  257. Lingafelt, Charles Steven; Yell, Nigel Birkbeck, Protecting a data processing system from attack by a vandal who uses a vulnerability scanner.
  258. Lingafelt,Charles Steven; Yell,Nigel Birkbeck, Protecting a data processing system from attack by a vandal who uses a vulnerability scanner.
  259. Lymer, Brent J.; Karchapalayam, Babu; Kingsbury, Brad, Push alert system, method, and computer program product.
  260. Lymer, Brent J.; Katchapalayam, Babu; Kingsbury, Brad, Push alert system, method, and computer program product.
  261. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  262. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  263. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  264. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  265. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  266. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  267. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  268. Thioux, Emmanuel; Lin, Yichong, Return-oriented programming detection.
  269. Rogers, Justin; Lawrence, Eric M.; Bridge, Henry F., Runtime security and exception handler protection.
  270. Sng, Swee Huat; Yang, Joseph, Sandboxed daemon process invocation through HTTP.
  271. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive digital rights management system and method.
  272. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive system and method.
  273. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Secure gateway with firewall and intrusion detection capabilities.
  274. Whitmer,Ray; Dhurvasula,Harish, Securing resources from untrusted scripts behind firewalls.
  275. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mettler, Adrian Matthew, Security cloud service framework for hardening in the field code of mobile software applications.
  276. Newman, Gary H.; DeFuria, Richard M., Security control verification and monitoring subsystem for use in a computer information database system.
  277. Agbabian,Paul M., Security management system including feedback and control.
  278. Banzhof,Carl E.; Davies,John, Security risk analysis system and method.
  279. Hrabik, Michael; Guilfoyle, Jeffrey J.; Beaver, Edward Mac, Security system for a computer network having a security subsystem and a master system which monitors the integrity of a security subsystem.
  280. Hrabik, Michael; Guilfoyle, Jeffrey J.; Beaver, Edward “Mac”, Security system for a computer network having a security subsystem and a master system which monitors the integrity of a security subsystem.
  281. Gustave, Christophe; Chow, Stanley TaiHai; Wiemer, Douglas, Security vulnerability information aggregation.
  282. Ha, Phung-Te; Xu, Wei, Selective system call monitoring.
  283. Little, Mark Cameron, Self identifying services in distributed computing.
  284. Thioux, Emmanuel, Shellcode detection.
  285. Roskind,James, Simple secure login with multiple-authentication providers.
  286. Roskind, James, Simple, secure login with multiple authentication providers.
  287. Roskind, James, Simple, secure login with multiple authentication providers.
  288. Keeney,Richard A.; Lodwick,Philip A.; Schoenzeit,Loren; Steinberg,John D.; Tenenbaum,Ofer, Spooling server apparatus and methods for receiving, storing, and forwarding a print job over a network.
  289. Aziz, Ashar, Subscriber based protection system.
  290. Vaidya, Vimal, Surround security system.
  291. Khalid, Yasir; Deshpande, Shivani, Susceptible environment detection system.
  292. Weiss,Golan, System and a method for person's identity authentication.
  293. Aziz, Ashar; Amin, Muhammad; Ismael, Osman Abdoul; Bu, Zheng, System and method for IPS and VM-based detection of suspicious objects.
  294. Thioux, Emmanuel; Amin, Muhammad; Ismael, Osman Abdoul, System and method for analysis of a memory dump associated with a potentially malicious content suspect.
  295. Haugen, James B., System and method for analyzing a router in a shared network system.
  296. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing packets.
  297. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing suspicious network data.
  298. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Ritter, Stephen J.; Nakawatase, Ryan Tadashi; Pelly, John; Rutherford, M. Celeste, System and method for applying a machine-processable policy rule to information gathered about a network.
  299. Fox,Kevin L.; Henning,Ronda R.; Farrell,John T.; Miller,Clifford C., System and method for assessing the security posture of a network.
  300. Fox, Kevin L.; Henning, Ronda R.; Farrell, John T.; Miller, Clifford C., System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules.
  301. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  302. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  303. Nath, Badri; Kushwaha, Rakesh; Edwards, Mark, System and method for automatically altering device functionality.
  304. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for bot detection.
  305. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  306. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  307. Mayer, Yaron; Dechovich, Zak, System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages.
  308. Huitema,Christian; Sanders,Henry L.; Kaniyar,Sanjay N., System and method for defeating SYN attacks.
  309. Schmid,Matthew N.; Bloch,John Thomas; Hill,Frank F.; Ghosh,Anup K., System and method for defending against malicious software.
  310. Sharp, Clifford F.; Dark, Susan P., System and method for detecting and eliminating IP spoofing in a data transmission network.
  311. Sharp,Clifford F.; Dark,Susan Pittman, System and method for detecting and eliminating IP spoofing in a data transmission network.
  312. Aziz, Ashar, System and method for detecting anomalous behaviors using a virtual machine environment.
  313. Kindlund, Darien; Wolf, Julia; Bennett, James, System and method for detecting exfiltration content.
  314. Paithane, Sushant; Vashist, Sai; Yang, Raymond; Khalid, Yasir, System and method for detecting file altering behaviors pertaining to a malicious attack.
  315. Paithane, Sushant; Vashisht, Sai Omkar, System and method for detecting interpreter-based exploit attacks.
  316. Islam, Ali; Bu, Zheng, System and method for detecting malicious activity and classifying a network communication based on different indicator types.
  317. Kindlund, Darien; Wolf, Julia; Bennett, James, System and method for detecting malicious activity based on at least one environmental property.
  318. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  319. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  320. Aziz, Ashar, System and method for detecting malicious traffic using a virtual machine configured with a select software environment.
  321. Amin, Muhammad; Samuelraj, Mohan; Uyeno, Henry, System and method for detecting phishing using password prediction.
  322. Paithane, Sushant; Vincent, Michael; Vashisht, Sai; Kindlund, Darien, System and method for detecting time-bomb malware.
  323. Paithane, Sushant; Vincent, Michael; Vashisht, Sai; Kindlund, Darien, System and method for detecting time-bomb malware.
  324. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method for determining a threat based on correlation of indicators of compromise from other sources.
  325. Chan, Eric; Ismael, Osman Abdoul; Snyder, Gregory J., System and method for enhanced security of storage devices.
  326. Hugard, IV, James M.; Leroux, Alexander Lawrence; Mallabarapu, Charles; Muniz, Jorge Armando; Russell, Braden C.; Wu, Zengjue, System and method for grouping computer vulnerabilities.
  327. Hugard, IV, James M.; Leroux, Alexander Lawrence; Mallabarapu, Charles; Muniz, Jorge Armando; Russell, Braden C.; Wu, Zengjue, System and method for grouping computer vulnerabilities.
  328. Smith, Benjamin Hewitt; Smith, Fred Hewitt, System and method for installing an auditable secure network.
  329. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpoie, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  330. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  331. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  332. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  333. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  334. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  335. Grabowski, Joseph D.; Patel, Dhaval; Sturgeon, Thomas A., System and method for management of end user computing devices.
  336. Mukerji, Arindum; Rothstein, Jesse A., System and method for managing network communications.
  337. Wilkinson, Mark L.; Miller, Ronald J.; McDaniels, Michael J., System and method for managing network communications.
  338. Bennett, James; Bu, Zheng, System and method for network behavior detection.
  339. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  340. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  341. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  342. Cole,David M.; Hanzlik,Dennis J.; Caso,Erik, System and method for network vulnerability detection and reporting.
  343. Keir, Robin M.; Ecker, Stephen A., System and method for network vulnerability detection and reporting.
  344. Keir,Robin M.; Ecker,Stephen A., System and method for network vulnerability detection and reporting.
  345. Kurtz, George R.; Cole, David M.; Caso, Erik; Kuykendall, Dan, System and method for network vulnerability detection and reporting.
  346. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  347. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  348. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  349. McClure,Stuart C.; Kurtz,George; Keir,Robin; Beddoe,Marshall A.; Morton,Michael J.; Prosise,Christopher M.; Cole,David M.; Abad,Christopher, System and method for network vulnerability detection and reporting.
  350. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  351. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  352. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  353. Wu,Handong; Cook,Jeff, System and method for protecting internet protocol addresses.
  354. O'Brien, Darci; Giubileo, John; Rankin, David C., System and method for providing remediation management.
  355. Cohen, Gideon; Meiseles, Moshe; Reshef, Eran, System and method for risk detection and analysis in a computer network.
  356. Cohen, Gideon; Meiseles, Moshe; Reshef, Eran, System and method for risk detection and analysis in a computer network.
  357. Pidathala, Vinay K.; Bu, Zheng; Aziz, Ashar, System and method for run-time object classification.
  358. Kouznetsov, Victor; Vigue, Charles L.; Fallenstedt, Martin; Melchione, Daniel, System and method for secure and verified sharing of resources in a peer-to-peer network environment.
  359. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Pelly, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul, System and method for security information normalization.
  360. Aziz, Ashar, System and method for signature generation.
  361. Sima, Caleb, System and method for testing web applications with recursive discovery and analysis.
  362. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  363. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  364. Beavers,John B., System and method for tracking and filtering alerts in an enterprise and generating alert indications for analysis.
  365. Sharp, Clifford F.; Dark, Susan Pittman, System and method for traffic management control in a data transmission network.
  366. Kumar, Vineet; Otvagin, Alexander; Borodulin, Nikita, System and method for triggering analysis of an object for malware in response to modification of that object.
  367. Jain, Anuj, System and method for verifying intended contents of an electronic message.
  368. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for virtual analysis of network data.
  369. Aziz, Ashar, System and method of containing computer worms.
  370. Aziz, Ashar, System and method of detecting computer worms.
  371. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method of detecting delivery of malware based on indicators of compromise from different sources.
  372. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method of detecting delivery of malware using cross-customer data.
  373. Aziz, Ashar, System and method of detecting malicious content.
  374. Aziz, Ashar, System and method of detecting malicious traffic while reducing false positives.
  375. Aziz, Ashar, System and method of detecting time-delayed malicious traffic.
  376. Andres, Steven G.; Cole, David M.; Cummings, Thomas Gregory; Garcia, Roberto Ramon; Kenyon, Brian Michael; Kurtz, George R.; McClure, Stuart Cartier; Moore, Christopher William; O'Dea, Michael J.; Saruwatari, Ken D., System and method of managing network security risks.
  377. Beddoe, Marshall; Keir, Robin, System and method of operating system identification.
  378. Brandt, David D.; Hall, Kenwood; Anderson, Mark Burton; Anderson, Craig D.; Collins, George Bradford, System and methodology providing automation security analysis and network intrusion protection in an industrial environment.
  379. Brandt, David D.; Hall, Kenwood; Anderson, Mark Burton; Anderson, Craig D.; Collins, George Bradford, System and methodology providing automation security analysis and network intrusion protection in an industrial environment.
  380. Brandt, David D.; Hall, Kenwood; Anderson, Mark Burton; Anderson, Craig D.; Collins, George Bradford, System and methodology providing automation security analysis, validation, and learning in an industrial controller environment.
  381. Pilipenko, Alex; Ha, Phung-Te, System and methods for advanced malware detection through placement of transition events.
  382. Reshef, Eran; El-Hanany, Yuval; Raanan, Gil; Tsarfati, Tom, System for determining web application vulnerabilities.
  383. Reshef,Eran; El Hanany,Yuval; Raanan,Gil; Tsarfati,Tom, System for determining web application vulnerabilities.
  384. Yu, Sounil; Sloane, Brandon Matthew, System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources.
  385. Benjamin, Paul, System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning.
  386. Yu, Sounil; Sloane, Brandon Matthew, System for resource-centric threat modeling and identifying controls for securing technology resources.
  387. Wheater,Stuart Mark, System for updating an information state received from another computer based upon validation rules that apply to the information state.
  388. Aziz, Ashar; Amin, Muhammad; Ismael, Osman Abdoul; Bu, Zheng, System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits.
  389. Singh, Abhishek; Lin, Yichong; Mukherjee, Angshuman; Bu, Zheng, System, apparatus and method for classifying a file as malicious using static scanning.
  390. Islam, Ali, System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection.
  391. Islam, Ali, System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection.
  392. Khalid, Yasir; Deshpande, Shivani; Amin, Muhammad, System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object.
  393. Ismael, Osman Abdoul, System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection.
  394. Ismael, Osman Abdoul, System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection.
  395. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers.
  396. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, System, device and method for detecting a malicious attack based on direct communications between remotely hosted virtual machines and malicious web servers.
  397. Magdych,James S.; Rahmanovic,Tarik; McDonald,John R.; Tellier,Brock E.; Osborne,Anthony C.; Herath,Nishad P., System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device.
  398. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E., System, method and computer program product for improving computer network intrusion detection by risk prioritization.
  399. Tracy, Richard P.; Smith, Peter A.; Berman, Lon J.; Catlin, Gary M.; Wilson, David J.; Barrett, Hugh; Hall, Jr., Larry L., System, method and medium for certifying and accrediting requirements compliance.
  400. Tracy,Richard P.; Barrett,Hugh; Berman,Lon J.; Catlin,Gary M., System, method and medium for certifying and accrediting requirements compliance.
  401. Lymer, Brent J.; Kingsbury, Brad; Ritter, Chris, System, method, and computer program product for conveying a status of a plurality of security applications.
  402. Lymer, Brent J.; Kingsbury, Brad; Ritter, Chris, System, method, and computer program product for conveying a status of a plurality of security applications.
  403. Gordon, Bryson P.; Schneider, Ryan L., System, method, and computer program product for interfacing a plurality of related applications.
  404. Gordon, Bryson P.; Schneider, Ryan L., System, method, and computer program product for interfacing a plurality of related applications.
  405. Lymer, Brent J.; Chatterjee, Atri, System, method, and computer program product for managing a plurality of applications via a single interface.
  406. Lymer, Brent J.; Chatterjee, Atri, System, method, and computer program product for managing a plurality of applications via a single interface.
  407. Lymer, Brent J.; Chatterjee, Atri, System, method, and computer program product for managing a plurality of applications via a single interface.
  408. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  409. Himberger,Kevin D.; Jeffries,Clark Debs; McMillen,David M.; Ziraldo,John Allan, System, method, and program product for managing an intrusion detection system.
  410. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  411. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  412. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  413. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for analyzing PDF documents.
  414. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for analyzing malicious PDF network content.
  415. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  416. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  417. Singh, Abhishek; Manni, Jayaraman, Systems and methods for automatically detecting backdoors.
  418. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  419. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  420. Aziz, Ashar, Systems and methods for computer worm defense.
  421. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for detecting communication channels of bots.
  422. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for detecting encrypted bot command and control communication channels.
  423. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  424. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  425. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious network content.
  426. Catanzano, M. Bernard, Systems and methods for determining anti-virus protection status.
  427. Catanzano,M. Bernard, Systems and methods for determining anti-virus protection status.
  428. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  429. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  430. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  431. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack detection and identification.
  432. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention.
  433. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention by intercepting flows of information.
  434. Aziz, Ashar, Systems and methods for malware defense.
  435. Judge, Paul, Systems and methods for message threat management.
  436. Judge, Paul, Systems and methods for message threat management.
  437. Judge, Paul, Systems and methods for message threat management.
  438. Judge, Paul, Systems and methods for message threat management.
  439. Judge,Paul, Systems and methods for message threat management.
  440. Judge,Paul, Systems and methods for message threat management.
  441. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for scheduling analysis of network content for malware.
  442. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  443. Aziz, Ashar, Systems and methods for unauthorized activity defense.
  444. Aziz, Ashar, Systems and methods for unauthorized activity defense.
  445. Judge,Paul, Systems and methods for upstream threat pushback.
  446. McFarlane, Bradley Kenneth; Wiemer, Douglas; McNamee, Kevin, Systems and methods of associating security vulnerabilities and assets.
  447. Gecht, Guy; Lodwick, Philip A.; Schoenzeit, Loren; Steinberg, John D.; Tenenbaum, Ofer, Systems for the provision of printing services.
  448. Wilkinson,Mark L.; Miller,Ronald J.; McDaniels,Michael J., Tracking communication for determining device states.
  449. Sakushima,Hiromi; Uranaka,Sachiko, User information control device.
  450. Goradia, Harnish; Ismael, Osman Abdoul; Johnson, Noah M.; Mettler, Adrian; Aziz, Ashar, User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications.
  451. Goradia, Harnish; Ismael, Osman Abdoul; Johnson, Noah M.; Mettler, Adrian; Aziz, Ashar, User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications.
  452. Chang,Kyusun; Mims,John Alan; Wilson,Allen Keith, VLAN router with firewall supporting multiple security layers.
  453. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, Virtual machine with dynamic data flow analysis.
  454. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  455. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  456. Bu, Zheng; Lin, Yichong, Zero-day discovery system.
  457. Zafar, Asim; Qureshi, Eirij; Kindlund, Darien, Zero-day rotating guest image profile.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로