$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Active firewall system and methodology 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
출원번호 US-0328177 (1999-06-08)
발명자 / 주소
  • Villa, Emilio
  • Zidaritz, Adrian
  • Varga, Michael David
  • Eschelbeck, Gerhard
  • Jones, Michael Kevin
  • McArdle, Mark James
출원인 / 주소
  • Network Associates, Inc.
대리인 / 주소
    Inouye, Patrick J. S.Hamaty, Christopher J.
인용정보 피인용 횟수 : 355  인용 특허 : 4

초록

System and methodology providing automated or "proactive" network security ("active" firewall) are described. The system implements methodology for verifying or authenticating communications, especially between network security components thereby allowing those components to share information. In on

대표청구항

System and methodology providing automated or "proactive" network security ("active" firewall) are described. The system implements methodology for verifying or authenticating communications, especially between network security components thereby allowing those components to share information. In on

이 특허에 인용된 특허 (4)

  1. Smith Jeffrey C. ; Bandini Jean-Christophe, Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof.
  2. Holden James M. ; Levin Stephen E. ; Wrench ; Jr. Edwin H. ; Snow ; deceased David W., Mixed enclave operation in a computer network with multi-level network security.
  3. Holden James M. ; Levin Stephen E. ; Nickel James O. ; Wrench ; Jr. Edwin H., Stand alone device for providing security within computer networks.
  4. Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for network electronic authorization utilizing an authorization instrument.

이 특허를 인용한 특허 (355)

  1. Cantrell,Craig; Willebeek LeMair,Marc; Cox,Dennis; McHale,John; Smith,Brian; Kolbly,Donovan, Active network defense system and method.
  2. Cantrell,Craig; Willebeek Lemair,Marc; Cox,Dennis; McHale,John; Smith,Brian; Kolbly,Donovan, Active network defense system and method.
  3. Cantrell,Craig; Willebeek Lemair,Marc; Cox,Dennis; McHale,John; Smith,Brian; Kolbly,Donovan, Active network defense system and method.
  4. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  5. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  6. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  7. Haq, Thoufique; Zhai, Jinjian; Pidathala, Vinay K., Advanced persistent threat (APT) detection center.
  8. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  9. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  10. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  11. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  12. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  13. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  14. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  15. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Frederic; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for compact internetworked wireless integrated network sensors (WINS).
  16. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for compact internetworked wireless integrated network sensors (WINS).
  17. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for internetworked wireless integrated network sensors (WINS).
  18. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep; Merrill, William M., Apparatus for internetworked wireless integrated network sensors (WINS).
  19. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep; Merrill, William M., Apparatus for internetworked wireless integrated network sensors (WINS).
  20. Watkins, Craig R.; Barrett, Jeremey; Cain, Adam; Lichtenwalter, Brian; Myers, Daniel; Schall, Steven, Apparatus, and method for implementing remote client integrity verification.
  21. Sima, Caleb, Automated user interaction in application assessment.
  22. Islam, Ali; Bu, Zheng, Classifying sets of malicious indicators for detecting command and control communications associated with malware.
  23. Nalliah, Selvaraj; Moss, Andrew S.; Limont, David P.; Bolles, Gregory A.; Atwood, John Allen; Ciccotosto, Massimiliano, Client authentication using multiple user certificates.
  24. Anderson, Jordan; Takahashi, Richard J.; Little, Sean; Noehring, Lee, Client(s) to cloud or remote server secure data or file object encryption gateway.
  25. Takemori, Keisuke; Miyake, Yutaka; Tanaka, Toshiaki; Isohara, Takamasa; Sasase, Iwao, Communication system and security assurance device.
  26. Thioux, Emmanuel; Vashisht, Sai; Vincent, Michael, Computer exploit detection using heap spray pattern matching.
  27. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  28. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  29. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  30. Aziz, Ashar, Computer worm defense system and method.
  31. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Correlation and consolidation of analytic data for holistic view of a malware attack.
  32. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Correlation and consolidation of analytic data for holistic view of malware attack.
  33. Goringe, Christopher M.; Minhazuddin, Muneyb; Schreuder, James D.; Krumm Heller, Alex M.; Rankine, Alastair J.; Smith, Melanie L., Credential management and network querying.
  34. Mehra, Divyesh; Singh, Abhishek, Cyber attack early warning system.
  35. Patton, Douglas; Boutoussov, Dmitri; Walinski, Christopher J.; Jackson, Richard, Dental laser interface system and method.
  36. Vincent, Michael M.; Singh, Abhishek; Amin, Muhammad; Bu, Zheng, Detecting bootkits resident on compromised computers.
  37. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  38. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  39. Aziz, Ashar; Staniford, Stuart Gresley; Amin, Muhammad; Uyeno, Henry; Yie, Samuel, Detecting malicious network content.
  40. Ismael, Osman Abdoul; Yie, Samuel; Manni, Jayaraman; Amin, Muhammad; Mahbod, Bahman, Detecting malicious network content using virtual environment components.
  41. Jain, Varun; Singh, Abhishek, Detecting malware based on reflection.
  42. Gomez, Joshua Lewis; Singh, Abhishek, Detection and classification of exploit kits.
  43. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  44. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  45. Bardzil,Timothy J.; Rankine,Alastair J.; Hill,Bruce W., Detection of load balanced links in internet protocol netwoks.
  46. Himberger, Kevin; Jeffries, Clark D., Determining blocking measures for processing communication traffic anomalies.
  47. Mushtaq, Atif; Rosenberry, Todd; Aziz, Ashar; Islam, Ali, Distributed systems and methods for automatically detecting unknown bots and botnets.
  48. Mushtaq, Atif; Rosenberry, Todd; Aziz, Ashar; Islam, Ali, Distributed systems and methods for automatically detecting unknown bots and botnets.
  49. Paithane, Sushant; Vashisht, Sai, Dynamic content activation for automated analysis of embedded objects.
  50. Goradia, Harnish, Dynamic guest image creation and rollback.
  51. Aziz, Ashar; Radhakrishnan, Ramesh; Lai, Wei-Lung; Manni, Jayaraman, Dynamic signature creation and enforcement.
  52. Vincent, Michael; Mesdaq, Ali; Thioux, Emmanuel; Singh, Abhishek; Vashisht, Sai, Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses.
  53. Vincent, Michael; Thioux, Emmanuel; Vashisht, Sai; Kindlund, Darien, Dynamically remote tuning of a malware content detection system.
  54. Banda, Seenu; Prakash, Ankur, Efficient implementation of security applications in a networked environment.
  55. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Electronic device for aggregation, correlation and consolidation of analysis attributes.
  56. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Amin, Muhammad; Staniford, Stuart, Electronic message analysis for malware detection.
  57. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  58. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  59. Ransom,Douglas S.; Blackett,Andrew W.; Forth,J. Bradford, Energy management device and architecture with multiple security levels.
  60. Ginter, Andrew; Hutchinson, Tom; Lopes, Rui Manuel Martins; McMillan, Brad; Jensen, Brett, Event monitoring and management.
  61. Rathor, Hirendra; Dalal, Kaushal, Exploit detection of malware and malware families.
  62. Rathor, Hirendra; Dalal, Kaushal, Exploit detection of malware and malware families.
  63. Singh, Japneet; Ramchetty, Harinath; Gupta, Anil, Exploit detection system.
  64. Thioux, Emmanuel; Amin, Muhammad; Ismael, Osman, File extraction from memory dump for malicious content analysis.
  65. Christie, IV,Samuel H., Firewall control for secure private networks with public VoIP access.
  66. Abzarian, David; Yariv, Eran; Paleologu, Emanuel; Diaz Cuellar, Gerardo; Carbaugh, Ian, Firewall installer.
  67. Singh, Abhishek; Mesdaq, Ali; Das, Anirban; Jain, Varun, Framework for classifying an object as malicious with machine learning for deploying updated predictive models.
  68. Ismael, Osman Abdoul; Song, Dawn; Ha, Phung-Te; Gilbert, Peter J.; Xue, Hui, Framework for computer application analysis of sensitive information tracking.
  69. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prashanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  70. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prshanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  71. Ismael, Osman Abdoul; Song, Dawn, Framework for efficient security coverage of mobile software applications installed on mobile devices.
  72. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mettler, Adrian Matthew, Framework for efficient security coverage of mobile software applications that is usable to harden in the field code.
  73. Ismael, Osman Abdoul; Song, Dawn; Ha, Phung-Te; Gilbert, Peter J.; Xue, Hui, Framework for efficient security coverage of mobile software applications using machine learning.
  74. Ismael, Osman Abdoul; Song, Dawn; Xue, Hui, Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application.
  75. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar, Framework for iterative analysis of mobile software applications.
  76. Ismael, Osman Abdoul; Aziz, Ashar, Framework for multi-phase analysis of mobile applications.
  77. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  78. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  79. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  80. Loveland,Shawn Domenic, Granular authorization for network user sessions.
  81. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  82. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  83. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  84. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  85. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Heuristic based capture with replay to virtual machine.
  86. Sima, Caleb; Millar, Steve; Kelly, Raymond; Sullivan, Bryan; Sullivan, Gerald; Tillery, David, Integrated crawling and auditing of web applications and web content.
  87. Khalid, Yasir; Paithane, Sushant; Vashisht, Sai, Intelligent context aware user interaction for malware detection.
  88. Dark,Susan Pittman, Intelligent feedback loop process control system.
  89. Rathor, Hirendra; Dalal, Kaushal; Gupta, Anil, Interactive infection visualization for improved exploit detection and signature generation for malware and malware families.
  90. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  91. Eyada, Hatem, Intrusion prevention and remedy system.
  92. Oliver, Robert Ian; Frank, Alexander, Leveraging active firewalls for network intrusion detection and retardation of attack.
  93. Abbasi, Fahim H.; Salam, Abdul; Shahzad, Farrukh, Leveraging behavior-based rules for malware family classification.
  94. Thioux, Emmanuel; Amin, Muhammad; Kindlund, Darien; Pilipenko, Alex; Vincent, Michael, Malicious content analysis using simulated user interaction without user involvement.
  95. Thioux, Emmanuel; Amin, Muhammad; Kindlund, Darien; Pilipenko, Alex; Vincent, Michael, Malicious content analysis using simulated user interaction without user involvement.
  96. Khalid, Yasir; Amin, Muhammad; Jing, Emily; Rizwan, Muhammad, Malicious content analysis with multi-version application support within single operating environment.
  97. Khalid, Yasir; Amin, Muhammad; Jing, Emily; Rizwan, Muhammad, Malicious content analysis with multi-version application support within single operating environment.
  98. Singh, Abhishek, Malicious message analysis system.
  99. Vincent, Michael; Mesdaq, Ali; Thioux, Emmanuel; Singh, Abhishek; Vashisht, Sal, Malware analysis in accordance with an analysis plan.
  100. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Malware containment and security analysis on connection.
  101. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Malware containment on connection.
  102. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  103. Nord, Joseph H.; Hoy, David Randal, Method and a system for responding locally to requests for file metadata associated with files stored remotely.
  104. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
  105. Simmons, Timothy, Method and apparatus for associating tickets in a ticket hierarchy.
  106. Schwartz, Elliot, Method and apparatus for firewall traversal.
  107. Schwartz, Elliot, Method and apparatus for firewall traversal.
  108. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  109. Laborczfalvi, Lee; Roychoudhry, Anil; Borzycki, Andrew; Muir, Jeffrey; Chin, Huai; Mazzaferri, Richard; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  110. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James, Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers.
  111. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  112. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Chin, Huai Chiun; Mazzaferri, Richard James; Semaan, Pierre, Method and apparatus for providing file-type associations to multiple applications.
  113. Braddy, Ricky Gene; Simmons, Timothy Ernest; Calvin, Phillip N., Method and apparatus for providing policy-based document control.
  114. Braddy, Ricky Gene; Simmons, Timothy Ernest, Method and apparatus for reducing disclosure of proprietary data in a networked environment.
  115. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Chin, Huai Chiun; Mazzaferri, Richard James, Method and apparatus for virtualizing window information.
  116. Ginter,Andrew; Kawano,Kegan; Hutchinson,Tom; Lopes,Rui Manuel Martins; Hope,Erik P.; McMillan,Brad; Muegge,Adam; Mah,Andy G.; Jensen,Brett, Method and computer program product for monitoring an industrial network.
  117. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K. R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  118. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K.R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  119. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Method and device for performing integrated caching in a data communication network.
  120. Pedersen, Bradley J.; Nord, Joseph H.; Hoy, David Randal, Method and system for accessing a remote file in a directory structure associated with an application program executing locally.
  121. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  122. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  123. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  124. Gusler,Carl Phillip; Hamilton, II,Rick Allen, Method and system for building dynamic firewall rules, based on content of downloaded documents.
  125. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  126. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  127. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  128. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  129. Rive, Russell S.; Rive, Peter Joshua, Method and system for communicating with a managed system located behind a firewall.
  130. Bhattacharya,Partha; Liao,Yu, Method and system for determining intra-session event correlation across network address translation devices.
  131. Bhattacharya, Partha; Lee, Imin T.; Joseph, Aji; Stevens, Eli; Naramreddy, Diwakar, Method and system for displaying network security incidents.
  132. Bhattacharya, Partha; Lee, Imin; Joseph, Aji; Stevens, Eli; Naramreddy, Diwakar, Method and system for displaying network security incidents.
  133. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  134. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  135. Bhattacharya, Partha; Wang, Yuewei; Stevens, Eli Nathaniel; Sasu, Gheorghe Mircea, Method and system for inline top N query computation.
  136. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method and system for locating and accessing resources.
  137. Glania, Sebastian, Method and system for network intrusion prevention.
  138. Donatelli, Alex; Lerro, Marco, Method and system for transmitting information across a firewall.
  139. Donatelli,Alex; Lerro,Marco, Method and system for transmitting information across a firewall.
  140. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  141. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  142. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana, Method and systems for efficient delivery of previously stored content.
  143. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana, Method and systems for efficient delivery of previously stored content.
  144. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  145. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  146. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  147. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  148. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method for accessing, by application programs, resources residing inside an application isolation scope.
  149. Gelvin,David C.; Girod,Lewis D.; Kaiser,William J.; Merrill,William M.; Newberg,Fredric; Pottie,Gregory J.; Sipos,Anton I.; Vardhan,Sandeep, Method for collecting and processing data using internetworked wireless integrated network sensors (WINS).
  150. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Frederic; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method for internetworked hybrid wireless integrated network sensors (WINS).
  151. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method for internetworked hybrid wireless integrated network sensors (WINS).
  152. O'Rourke, Chris; Shah, Gaurang K.; Menditto, Louis F.; Albert, Mark; Sutton, Michael S.; Tiwari, Pranav K.; Batz, Robert M.; Gray, Richard; Hull, Sean W.; Tsang, Tzu-Ming, Method for protecting a firewall load balancer from a denial of service attack.
  153. O'Rourke,Chris; Shah,Gaurang K; Menditto,Louis F; Albert,Mark; Sutton,Michael S; Tiwari,Pranav K; Batz,Robert M; Gray,Richard; Hull,Sean W; Tsang,Tzu Ming, Method for protecting a firewall load balancer from a denial of service attack.
  154. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J., Method for vehicle internetworks.
  155. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J., Method for vehicle internetworks.
  156. Bhattacharya, Partha; Liao, Yu, Method of determining intra-session event correlation across network address translation devices.
  157. Chen, Liangshen; Zheng, Xiaojing; Du, Fan; Hu, Chen, Method of managing digital rights.
  158. Berthaud, Jean-Marc; Chauffour, Pascal; Dispensa, Jean-Claude; Mahe, Valerie, Method of synchronizing firewalls in a communication system based upon a server farm.
  159. Malik, Amit; Pande, Reghav; Jain, Aakash, Method to detect application execution hijacking using memory protection.
  160. Sullivan, Darin; Muklashy, Shadi, Methods and interfaces for displaying performance data related to a current remote access session.
  161. Sullivan, Darin; Muklashy, Shadi, Methods and interfaces for displaying performance data related to a current remote access session.
  162. Mazzaferri, Richard James; Parry-Barwick, Stephen; Low, Anthony Edward, Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment.
  163. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Methods and systems for accessing, by application programs, resources provided by an operating system.
  164. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for executing, by a virtual machine, an application program requested by a client machine.
  165. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  166. Wookey, Michael; Low, Anthony Edward; Parry-Barwick, Stephen, Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session.
  167. Chinta, Madhav; Raj, Sam Arun, Methods and systems for launching applications into existing isolation environments.
  168. Chinta, Madhav; Raj, SamArun, Methods and systems for launching applications into existing isolation environments.
  169. Mazzaferri, Richard James; Robinson, David Neil, Methods and systems for providing access to a computing environment.
  170. Low, Anthony Edward; Croft, Richard Jason; Mazzaferri, Richard James; Ryman, Paul Adam; Bissett, Nicholas Alexander; Wookey, Michael; Hackett, Donovan Ross, Methods and systems for providing access to a computing environment provided by a virtual machine executing in a hypervisor executing in a terminal services session.
  171. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Robinson, David Neil; Pedersen, Bradley J., Methods and systems for providing remote access to a computing environment provided by a virtual machine.
  172. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for selecting a method for execution, by a virtual machine, of an application program.
  173. Paithane, Sushant; Vashisht, Sai; Yang, Raymond; Khalid, Yasir, Methods for detecting file altering malware in VM based analysis.
  174. von Eicken, Thorsten; Winterstein, Florian, Methods for providing performance improvement recommendations.
  175. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  176. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  177. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  178. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  179. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  180. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  181. Takahashi, Richard J., Multi-level independent security architecture.
  182. Takahashi, Richard J., Multi-level independent security architecture.
  183. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  184. Takahashi, Richard J., Multi-tenancy architecture.
  185. Takahashi, Richard J., Multi-tenancy architecture.
  186. Terzis, Andreas; Murgia, Marco A.; Baskaran, Ashwin, Multilayer access control security system.
  187. Malik, Amit; Deshpande, Shivani; Singh, Abhishek; Zheng, Wei, Multistage system and method for analyzing obfuscated content for malware.
  188. Bhattacharya,Partha; Lawrence,Jan Christian, Network security monitoring system.
  189. Willebeek LeMair,Marc; Cantrell,Craig; Cox,Dennis; McHale,John; Smith,Brian, Network security system integration.
  190. Manni, Jayaraman; Aziz, Ashar; Gong, Fengmin; Loganathan, Upendran; Amin, Muhammad, Network-based binary file extraction and analysis for malware detection.
  191. Manni, Jayaraman; Aziz, Ashar; Gong, Fengmin; Loganathan, Upendran; Amin, Muhammad, Network-based binary file extraction and analysis for malware detection.
  192. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, Network-based malware detection.
  193. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Network-based risk-assessment tool for remotely detecting local computer vulnerabilities.
  194. Boulanger, Alan; Himberger, Kevin; Jeffries, Clark D.; Ziraldo, John, Operating a communication network through use of blocking measures for responding to communication traffic anomalies.
  195. Ismael, Osman Abdoul, Optimized resource allocation for virtual machines within a malware content detection system.
  196. Ha, Phung-Te; Tonkonoh, Seva; Ismael, Osman Abdoul, Page replacement code injection.
  197. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  198. Frank, Joachim H.; Karn, Holger, Passport-controlled firewall.
  199. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Policy based capture with replay to virtual machine.
  200. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  201. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  202. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  203. Aziz, Ashar, Prospective client identification using malware attack detection.
  204. Lingafelt, Charles Steven; Yell, Nigel Birkbeck, Protecting a data processing system from attack by a vandal who uses a vulnerability scanner.
  205. Lingafelt,Charles Steven; Yell,Nigel Birkbeck, Protecting a data processing system from attack by a vandal who uses a vulnerability scanner.
  206. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  207. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  208. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  209. Pfeffer, Howard; Leddy, John, Reduction of network server loading.
  210. Takeshima, Yoshiteru; Ogawa, Takahiro, Relay method of encryption communication, gateway server, and program and program memory medium of encryption communication.
  211. Takahashi, Richard J., Replaceable or removable physical interface input/output module.
  212. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  213. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  214. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  215. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  216. Thioux, Emmanuel; Lin, Yichong, Return-oriented programming detection.
  217. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Nanduri, Priya, Rule generalization for web application entry point modeling.
  218. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Nanduri, Priya, Rule generalization for web application entry point modeling.
  219. Takahashi, Richard J., Secure end-to-end communication system.
  220. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Secure gateway with firewall and intrusion detection capabilities.
  221. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mettler, Adrian Matthew, Security cloud service framework for hardening in the field code of mobile software applications.
  222. Takahashi, Richard J., Security device with programmable systolic-matrix cryptographic module and programmable input/output interface.
  223. Takahashi, Richard J., Security device with programmable systolic-matrix cryptographic module and programmable input/output interface.
  224. Ha, Phung-Te; Xu, Wei, Selective system call monitoring.
  225. Fisher, Mark; Philips, Andrew B., Self-service provisioning of digital certificates.
  226. Thioux, Emmanuel, Shellcode detection.
  227. Aziz, Ashar, Subscriber based protection system.
  228. Khalid, Yasir; Deshpande, Shivani, Susceptible environment detection system.
  229. Aziz, Ashar; Amin, Muhammad; Ismael, Osman Abdoul; Bu, Zheng, System and method for IPS and VM-based detection of suspicious objects.
  230. Thioux, Emmanuel; Amin, Muhammad; Ismael, Osman Abdoul, System and method for analysis of a memory dump associated with a potentially malicious content suspect.
  231. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing packets.
  232. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing suspicious network data.
  233. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for bot detection.
  234. Gage,Timothy M.; Retana,Alvaro E., System and method for communicating packets in a network environment.
  235. Zheng, Danyang Raymond; Cham, Jack C., System and method for controlling and tracking network content flow.
  236. Sharp, Clifford F.; Dark, Susan P., System and method for detecting and eliminating IP spoofing in a data transmission network.
  237. Sharp,Clifford F.; Dark,Susan Pittman, System and method for detecting and eliminating IP spoofing in a data transmission network.
  238. Aziz, Ashar, System and method for detecting anomalous behaviors using a virtual machine environment.
  239. Kindlund, Darien; Wolf, Julia; Bennett, James, System and method for detecting exfiltration content.
  240. Paithane, Sushant; Vashist, Sai; Yang, Raymond; Khalid, Yasir, System and method for detecting file altering behaviors pertaining to a malicious attack.
  241. Paithane, Sushant; Vashisht, Sai Omkar, System and method for detecting interpreter-based exploit attacks.
  242. Islam, Ali; Bu, Zheng, System and method for detecting malicious activity and classifying a network communication based on different indicator types.
  243. Kindlund, Darien; Wolf, Julia; Bennett, James, System and method for detecting malicious activity based on at least one environmental property.
  244. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  245. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  246. Aziz, Ashar, System and method for detecting malicious traffic using a virtual machine configured with a select software environment.
  247. Amin, Muhammad; Samuelraj, Mohan; Uyeno, Henry, System and method for detecting phishing using password prediction.
  248. Paithane, Sushant; Vincent, Michael; Vashisht, Sai; Kindlund, Darien, System and method for detecting time-bomb malware.
  249. Paithane, Sushant; Vincent, Michael; Vashisht, Sai; Kindlund, Darien, System and method for detecting time-bomb malware.
  250. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method for determining a threat based on correlation of indicators of compromise from other sources.
  251. Chan, Eric; Ismael, Osman Abdoul; Snyder, Gregory J., System and method for enhanced security of storage devices.
  252. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  253. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  254. Ye,Feng; Zhang,Kui; Claise,Benoit, System and method for generating a traffic matrix in a network environment.
  255. Cheriton,David, System and method for generating filters based on analyzed flow data.
  256. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  257. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  258. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  259. Bennett, James; Bu, Zheng, System and method for network behavior detection.
  260. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  261. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  262. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  263. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; K.R., Bharat Bhushan; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  264. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bushan K. R., Bharath; Kumar, Anil, System and method for performing flash crowd caching of dynamically generated objects in a data communication network.
  265. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing granular invalidation of cached dynamically generated objects in a data communication network.
  266. Thai, Hien T.; Shatzkamer, Kevin D.; Gasson, Andrew G.; Andriantsiferana, Laurent; Hamel, Eric; Iyer, Jayaraman R., System and method for providing security in a network environment using accounting information.
  267. Pidathala, Vinay K.; Bu, Zheng; Aziz, Ashar, System and method for run-time object classification.
  268. Aziz, Ashar, System and method for signature generation.
  269. Sima, Caleb, System and method for testing web applications with recursive discovery and analysis.
  270. Kumar, Vineet; Otvagin, Alexander; Borodulin, Nikita, System and method for triggering analysis of an object for malware in response to modification of that object.
  271. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for virtual analysis of network data.
  272. Melman, Yael, System and method including a communication interface for transferring information between at least two processes.
  273. Aziz, Ashar, System and method of containing computer worms.
  274. Aziz, Ashar, System and method of detecting computer worms.
  275. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method of detecting delivery of malware based on indicators of compromise from different sources.
  276. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method of detecting delivery of malware using cross-customer data.
  277. Aziz, Ashar, System and method of detecting malicious content.
  278. Aziz, Ashar, System and method of detecting malicious traffic while reducing false positives.
  279. Aziz, Ashar, System and method of detecting time-delayed malicious traffic.
  280. Pilipenko, Alex; Ha, Phung-Te, System and methods for advanced malware detection through placement of transition events.
  281. Rigstad, Peter M.; Yoon, John Y.; Farahar, Mark; Subbiah, Barani; Thomsen, Brant D.; Richmond, David E.; Semel, Vered Maor; Bryner, Earl, System for providing firewall capabilities to a communication device.
  282. Neumann,William C.; Corby,Thomas E.; Epps,Gerald Allen, System for secure computing using defense-in-depth architecture.
  283. Freund,Gregor; Haycock,Keith; Hermann,Conrad, System methodology for automatic local network discovery and firewall reconfiguration for mobile computing devices.
  284. Aziz, Ashar; Amin, Muhammad; Ismael, Osman Abdoul; Bu, Zheng, System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits.
  285. Singh, Abhishek; Lin, Yichong; Mukherjee, Angshuman; Bu, Zheng, System, apparatus and method for classifying a file as malicious using static scanning.
  286. Islam, Ali, System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection.
  287. Islam, Ali, System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection.
  288. Khalid, Yasir; Deshpande, Shivani; Amin, Muhammad, System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object.
  289. Ismael, Osman Abdoul, System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection.
  290. Ismael, Osman Abdoul, System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection.
  291. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers.
  292. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, System, device and method for detecting a malicious attack based on direct communications between remotely hosted virtual machines and malicious web servers.
  293. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  294. Pedersen, Bradley J.; Sinha, Rajiv; Sundarrajan, Prabakar; Treder, Terry, Systems and methods for accelerating delivery of a computing environment to a remote user.
  295. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  296. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  297. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  298. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for analyzing PDF documents.
  299. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for analyzing malicious PDF network content.
  300. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  301. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  302. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  303. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  304. Singh, Abhishek; Manni, Jayaraman, Systems and methods for automatically detecting backdoors.
  305. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  306. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  307. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for client-side application-aware prioritization of network communications.
  308. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  309. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  310. Aziz, Ashar, Systems and methods for computer worm defense.
  311. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for detecting communication channels of bots.
  312. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for detecting encrypted bot command and control communication channels.
  313. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  314. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  315. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious network content.
  316. Mullick, Amarnath; Venkatraman, Charu; Nanjundaswamy, Shashi; He, Junxiao; Soni, Ajay; Stavrakos, Nicholas; Koopmans, Chris, Systems and methods for enhanced client side policy.
  317. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana; Stavrakos, Nicholas; Monks, Jeff; Koopmans, Fred; Koopmans, Chris; Dakhane, Kapil, Systems and methods for enhanced delta compression.
  318. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  319. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for facilitating a peer to peer route via a gateway.
  320. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  321. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  322. Raja, Murali; Muthiah, Manikam; Kunal, Ranveer; Raghav, Somanahalli Narayana, Systems and methods for load balancing based on user selected metrics.
  323. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack detection and identification.
  324. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention.
  325. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention by intercepting flows of information.
  326. Aziz, Ashar, Systems and methods for malware defense.
  327. Judge, Paul, Systems and methods for message threat management.
  328. Judge, Paul, Systems and methods for message threat management.
  329. Judge, Paul, Systems and methods for message threat management.
  330. Judge, Paul, Systems and methods for message threat management.
  331. Judge,Paul, Systems and methods for message threat management.
  332. Judge,Paul, Systems and methods for message threat management.
  333. Pimentel, Plinio, Systems and methods for protecting sensitive files from unauthorized access.
  334. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  335. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP buffering.
  336. Sundarrajan, Prabakar; He, Junxiao; Nanjundaswamy, Shashi; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing.
  337. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Nanjundaswamy, Shashi, Systems and methods for providing client-side accelerated access to remote applications via TCP pooling.
  338. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Suganthi, Josephine, Systems and methods for providing client-side dynamic redirection to bypass an intermediary.
  339. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for scheduling analysis of network content for malware.
  340. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  341. Aziz, Ashar, Systems and methods for unauthorized activity defense.
  342. Aziz, Ashar, Systems and methods for unauthorized activity defense.
  343. Judge,Paul, Systems and methods for upstream threat pushback.
  344. He, Junxiao; Venkatraman, Charu; Soni, Ajay, Systems and methods for using an HTTP-aware client agent.
  345. He, Junxiao; Venkatraman, Charu; Soni, Ajay, Systems and methods for using an HTTP-aware client agent.
  346. Venkatraman, Charu; He, Junxiao; Soni, Ajay; Stavrakos, Nicholas; Monks, Jeff; Koopmans, Fred; Koopmans, Chris; Dakhane, Kapil, Systems and methods for using an HTTP-aware client agent.
  347. Goradia, Harnish; Ismael, Osman Abdoul; Johnson, Noah M.; Mettler, Adrian; Aziz, Ashar, User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications.
  348. Goradia, Harnish; Ismael, Osman Abdoul; Johnson, Noah M.; Mettler, Adrian; Aziz, Ashar, User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications.
  349. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince, Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways.
  350. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince, Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways.
  351. Chen, Jyshyang, VPN and firewall integrated system.
  352. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, Virtual machine with dynamic data flow analysis.
  353. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  354. Bu, Zheng; Lin, Yichong, Zero-day discovery system.
  355. Zafar, Asim; Qureshi, Eirij; Kindlund, Darien, Zero-day rotating guest image profile.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로