US7389351B2
(en)
|
2001-03-15 |
2008-06-17 |
Microsoft Corporation |
System and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts
|
US7565692B1
(en)
|
2000-05-30 |
2009-07-21 |
At&T Wireless Services, Inc. |
Floating intrusion detection platforms
|
ATE344573T1
(en)
|
2000-11-30 |
2006-11-15 |
Lancope Inc |
FLOW-BASED NETWORK INTRUSION DETECTION
|
US20030028803A1
(en)
*
|
2001-05-18 |
2003-02-06 |
Bunker Nelson Waldo |
Network vulnerability assessment system and method
|
US7325252B2
(en)
|
2001-05-18 |
2008-01-29 |
Achilles Guard Inc. |
Network security testing
|
US20090138342A1
(en)
|
2001-11-14 |
2009-05-28 |
Retaildna, Llc |
Method and system for providing an employee award using artificial intelligence
|
US7512980B2
(en)
|
2001-11-30 |
2009-03-31 |
Lancope, Inc. |
Packet sampling flow-based detection of network intrusions
|
US7225343B1
(en)
|
2002-01-25 |
2007-05-29 |
The Trustees Of Columbia University In The City Of New York |
System and methods for adaptive model generation for detecting intrusions in computer systems
|
US8132250B2
(en)
|
2002-03-08 |
2012-03-06 |
Mcafee, Inc. |
Message profiling systems and methods
|
EP1349081A1
(en)
|
2002-03-28 |
2003-10-01 |
LION Bioscience AG |
Method and apparatus for querying relational databases
|
US7496628B2
(en)
|
2003-02-25 |
2009-02-24 |
Susquehanna International Group, Llp |
Electronic message filter
|
US20040193918A1
(en)
|
2003-03-28 |
2004-09-30 |
Kenneth Green |
Apparatus and method for network vulnerability detection and compliance assessment
|
US20040221171A1
(en)
|
2003-05-02 |
2004-11-04 |
Ahmed Ahmed Awad E. |
Intrusion detector based on mouse dynamics analysis
|
US7926113B1
(en)
*
|
2003-06-09 |
2011-04-12 |
Tenable Network Security, Inc. |
System and method for managing network vulnerability analysis systems
|
US8839417B1
(en)
|
2003-11-17 |
2014-09-16 |
Mcafee, Inc. |
Device, system and method for defending a computer network
|
US8990928B1
(en)
|
2003-12-11 |
2015-03-24 |
Radix Holdings, Llc |
URL salience
|
US7392278B2
(en)
|
2004-01-23 |
2008-06-24 |
Microsoft Corporation |
Building and using subwebs for focused search
|
US20050193429A1
(en)
|
2004-01-23 |
2005-09-01 |
The Barrier Group |
Integrated data traffic monitoring system
|
US8528086B1
(en)
|
2004-04-01 |
2013-09-03 |
Fireeye, Inc. |
System and method of detecting computer worms
|
US8561177B1
(en)
|
2004-04-01 |
2013-10-15 |
Fireeye, Inc. |
Systems and methods for detecting communication channels of bots
|
US8539582B1
(en)
|
2004-04-01 |
2013-09-17 |
Fireeye, Inc. |
Malware containment and security analysis on connection
|
US7953814B1
(en)
|
2005-02-28 |
2011-05-31 |
Mcafee, Inc. |
Stopping and remediating outbound messaging abuse
|
WO2006032028A2
(en)
|
2004-09-13 |
2006-03-23 |
Reactivity, Inc. |
Metric-based monitoring and control of a limited resource
|
US7540025B2
(en)
|
2004-11-18 |
2009-05-26 |
Cisco Technology, Inc. |
Mitigating network attacks using automatic signature generation
|
US20060253582A1
(en)
|
2005-05-03 |
2006-11-09 |
Dixon Christopher J |
Indicating website reputations within search results
|
CA2607005C
(en)
|
2005-05-05 |
2012-02-07 |
Ironport Systems, Inc. |
Identifying threats in electronic messages
|
US7609625B2
(en)
|
2005-07-06 |
2009-10-27 |
Fortinet, Inc. |
Systems and methods for detecting and preventing flooding attacks in a network environment
|
US7730040B2
(en)
|
2005-07-27 |
2010-06-01 |
Microsoft Corporation |
Feedback-driven malware detector
|
US7707284B2
(en)
|
2005-08-03 |
2010-04-27 |
Novell, Inc. |
System and method of searching for classifying user activity performed on a computer system
|
KR20070049514A
(en)
|
2005-11-08 |
2007-05-11 |
한국정보보호진흥원 |
Malignant code monitor system and monitoring method using thereof
|
US8650080B2
(en)
|
2006-04-10 |
2014-02-11 |
International Business Machines Corporation |
User-browser interaction-based fraud detection system
|
CA2648997A1
(en)
|
2006-04-13 |
2007-10-25 |
Art Of Defence Gmbh |
Method for providing web application security
|
US7930256B2
(en)
|
2006-05-23 |
2011-04-19 |
Charles River Analytics, Inc. |
Security system for and method of detecting and responding to cyber attacks on large network systems
|
US8533819B2
(en)
|
2006-09-29 |
2013-09-10 |
At&T Intellectual Property Ii, L.P. |
Method and apparatus for detecting compromised host computers
|
US7984500B1
(en)
|
2006-10-05 |
2011-07-19 |
Amazon Technologies, Inc. |
Detecting fraudulent activity by analysis of information requests
|
US8176178B2
(en)
|
2007-01-29 |
2012-05-08 |
Threatmetrix Pty Ltd |
Method for tracking machines on a network using multivariable fingerprinting of passively available information
|
US20080295173A1
(en)
*
|
2007-05-21 |
2008-11-27 |
Tsvetomir Iliev Tsvetanov |
Pattern-based network defense mechanism
|
US7865953B1
(en)
|
2007-05-31 |
2011-01-04 |
Trend Micro Inc. |
Methods and arrangement for active malicious web pages discovery
|
JP2011517859A
(en)
|
2007-08-06 |
2011-06-16 |
モンセーヌ,ベルナール ドゥ |
Systems and methods for authentication, data transfer and phishing protection
|
US8238669B2
(en)
|
2007-08-22 |
2012-08-07 |
Google Inc. |
Detection and classification of matches between time-based media
|
US7958555B1
(en)
|
2007-09-28 |
2011-06-07 |
Trend Micro Incorporated |
Protecting computer users from online frauds
|
US9779403B2
(en)
|
2007-12-07 |
2017-10-03 |
Jpmorgan Chase Bank, N.A. |
Mobile fraud prevention system and method
|
US8949990B1
(en)
*
|
2007-12-21 |
2015-02-03 |
Trend Micro Inc. |
Script-based XSS vulnerability detection
|
WO2009106998A1
(en)
|
2008-02-28 |
2009-09-03 |
Ipharro Media Gmbh |
Frame sequence comparison in multimedia streams
|
US8082187B2
(en)
|
2008-05-07 |
2011-12-20 |
AcademixDirect, Inc. |
Method of generating a referral website URL using website listings in a cookie
|
US8856937B1
(en)
|
2008-06-27 |
2014-10-07 |
Symantec Corporation |
Methods and systems for identifying fraudulent websites
|
US20140250145A1
(en)
|
2008-07-10 |
2014-09-04 |
Chacha Search, Inc |
Method and system of providing verified content
|
US10027688B2
(en)
|
2008-08-11 |
2018-07-17 |
Damballa, Inc. |
Method and system for detecting malicious and/or botnet-related domain names
|
US8621635B2
(en)
|
2008-08-18 |
2013-12-31 |
Microsoft Corporation |
Web page privacy risk detection
|
US8086480B2
(en)
|
2008-09-25 |
2011-12-27 |
Ebay Inc. |
Methods and systems for activity-based recommendations
|
US9177144B2
(en)
|
2008-10-30 |
2015-11-03 |
Mcafee, Inc. |
Structural recognition of malicious code patterns
|
US8850571B2
(en)
|
2008-11-03 |
2014-09-30 |
Fireeye, Inc. |
Systems and methods for detecting malicious network content
|
US8578491B2
(en)
|
2008-12-11 |
2013-11-05 |
Alcatel Lucent |
Network based malware detection and reporting
|
US8285830B1
(en)
|
2009-01-06 |
2012-10-09 |
Citizenhawk, Inc. |
System and method for combating cybersquatting
|
US8448245B2
(en)
|
2009-01-17 |
2013-05-21 |
Stopthehacker.com, Jaal LLC |
Automated identification of phishing, phony and malicious web sites
|
US8695091B2
(en)
|
2009-02-11 |
2014-04-08 |
Sophos Limited |
Systems and methods for enforcing policies for proxy website detection using advertising account ID
|
US8090729B2
(en)
|
2009-03-03 |
2012-01-03 |
Microsoft Corporation |
Large graph measurement
|
US8429751B2
(en)
|
2009-03-13 |
2013-04-23 |
Trustwave Holdings, Inc. |
Method and apparatus for phishing and leeching vulnerability detection
|
US8229219B1
(en)
|
2009-08-06 |
2012-07-24 |
Google Inc. |
Full-length video fingerprinting
|
US8600993B1
(en)
|
2009-08-26 |
2013-12-03 |
Google Inc. |
Determining resource attributes from site address attributes
|
US8396857B2
(en)
|
2009-08-31 |
2013-03-12 |
Accenture Global Services Limited |
System to modify websites for organic search optimization
|
GB2474545B
(en)
|
2009-09-24 |
2015-06-24 |
Fisher Rosemount Systems Inc |
Integrated unified threat management for a process control system
|
US8572740B2
(en)
|
2009-10-01 |
2013-10-29 |
Kaspersky Lab, Zao |
Method and system for detection of previously unknown malware
|
EP2323046A1
(en)
|
2009-10-16 |
2011-05-18 |
Telefónica, S.A. |
Method for detecting audio and video copy in multimedia streams
|
US8625033B1
(en)
|
2010-02-01 |
2014-01-07 |
Google Inc. |
Large-scale matching of audio and video
|
US9501644B2
(en)
|
2010-03-15 |
2016-11-22 |
F-Secure Oyj |
Malware protection
|
US8612463B2
(en)
|
2010-06-03 |
2013-12-17 |
Palo Alto Research Center Incorporated |
Identifying activities using a hybrid user-activity model
|
US8260914B1
(en)
|
2010-06-22 |
2012-09-04 |
Narus, Inc. |
Detecting DNS fast-flux anomalies
|
US8839441B2
(en)
*
|
2010-06-28 |
2014-09-16 |
Infosys Limited |
Method and system for adaptive vulnerability scanning of an application
|
US9246932B2
(en)
|
2010-07-19 |
2016-01-26 |
Sitelock, Llc |
Selective website vulnerability and infection testing
|
RU2446459C1
(en)
|
2010-07-23 |
2012-03-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method for checking web resources for presence of malicious components
|
CA2806699A1
(en)
|
2010-07-26 |
2012-02-02 |
Ki Yong Kim |
Hacker virus security-integrated control device
|
US8924488B2
(en)
|
2010-07-27 |
2014-12-30 |
At&T Intellectual Property I, L.P. |
Employing report ratios for intelligent mobile messaging classification and anti-spam defense
|
EP2609538B1
(en)
|
2010-08-25 |
2016-10-19 |
Lookout Inc. |
System and method for server-coupled malware prevention
|
AU2011293160B2
(en)
|
2010-08-26 |
2015-04-09 |
Verisign, Inc. |
Method and system for automatic detection and analysis of malware
|
US8837769B2
(en)
|
2010-10-06 |
2014-09-16 |
Futurewei Technologies, Inc. |
Video signature based on image hashing and shot detection
|
US9626677B2
(en)
|
2010-11-29 |
2017-04-18 |
Biocatch Ltd. |
Identification of computerized bots, and identification of automated cyber-attack modules
|
US8521667B2
(en)
|
2010-12-15 |
2013-08-27 |
Microsoft Corporation |
Detection and categorization of malicious URLs
|
CN102082792A
(en)
|
2010-12-31 |
2011-06-01 |
成都市华为赛门铁克科技有限公司 |
Phishing webpage detection method and device
|
US8972412B1
(en)
|
2011-01-31 |
2015-03-03 |
Go Daddy Operating Company, LLC |
Predicting improvement in website search engine rankings based upon website linking relationships
|
US8726376B2
(en)
|
2011-03-11 |
2014-05-13 |
Openet Telecom Ltd. |
Methods, systems and devices for the detection and prevention of malware within a network
|
US8402543B1
(en)
|
2011-03-25 |
2013-03-19 |
Narus, Inc. |
Machine learning based botnet detection with dynamic adaptation
|
RU107616U1
(en)
|
2011-03-28 |
2011-08-20 |
Закрытое акционерное общество "Лаборатория Касперского" |
SYSTEM OF QUICK ANALYSIS OF DATA STREAM ON THE AVAILABILITY OF MALICIOUS OBJECTS
|
US9363278B2
(en)
|
2011-05-11 |
2016-06-07 |
At&T Mobility Ii Llc |
Dynamic and selective response to cyber attack for telecommunications carrier networks
|
US8151341B1
(en)
|
2011-05-23 |
2012-04-03 |
Kaspersky Lab Zao |
System and method for reducing false positives during detection of network attacks
|
US8555388B1
(en)
|
2011-05-24 |
2013-10-08 |
Palo Alto Networks, Inc. |
Heuristic botnet detection
|
WO2013009713A2
(en)
|
2011-07-08 |
2013-01-17 |
Uab Research Foundation |
Syntactical fingerprinting
|
WO2013008778A1
(en)
|
2011-07-11 |
2013-01-17 |
Mizunuma Takeshi |
Identifier management method and system
|
GB2493514B
(en)
|
2011-08-02 |
2015-04-08 |
Qatar Foundation |
Copy detection
|
US8677472B1
(en)
|
2011-09-27 |
2014-03-18 |
Emc Corporation |
Multi-point collection of behavioral data relating to a virtualized browsing session with a secure server
|
US8645355B2
(en)
|
2011-10-21 |
2014-02-04 |
Google Inc. |
Mapping Uniform Resource Locators of different indexes
|
US8584235B2
(en)
|
2011-11-02 |
2013-11-12 |
Bitdefender IPR Management Ltd. |
Fuzzy whitelisting anti-malware systems and methods
|
US9519781B2
(en)
|
2011-11-03 |
2016-12-13 |
Cyphort Inc. |
Systems and methods for virtualization and emulation assisted malware detection
|
RU2487406C1
(en)
|
2011-11-24 |
2013-07-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of detecting malicious entities distributed over peer-to-peer networks
|
US8635700B2
(en)
|
2011-12-06 |
2014-01-21 |
Raytheon Company |
Detecting malware using stored patterns
|
US8660296B1
(en)
|
2012-01-10 |
2014-02-25 |
Google Inc. |
Systems and methods for facilitating video fingerprinting using local descriptors
|
US9111090B2
(en)
|
2012-04-02 |
2015-08-18 |
Trusteer, Ltd. |
Detection of phishing attempts
|
RU2523114C2
(en)
|
2012-04-06 |
2014-07-20 |
Закрытое акционерное общество "Лаборатория Касперского" |
Method of analysing malicious activity on internet, detecting malicious network nodes and neighbouring intermediate nodes
|
US10304036B2
(en)
|
2012-05-07 |
2019-05-28 |
Nasdaq, Inc. |
Social media profiling for one or more authors using one or more social media platforms
|
RU2488880C1
(en)
|
2012-05-11 |
2013-07-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of adaptive optimisation of inspection of data flow sent in network for availability of threats
|
US9497212B2
(en)
|
2012-05-21 |
2016-11-15 |
Fortinet, Inc. |
Detecting malicious resources in a network based upon active client reputation monitoring
|
US20150200962A1
(en)
|
2012-06-04 |
2015-07-16 |
The Board Of Regents Of The University Of Texas System |
Method and system for resilient and adaptive detection of malicious websites
|
US9154517B2
(en)
|
2012-06-19 |
2015-10-06 |
AO Kaspersky Lab |
System and method for preventing spread of malware in peer-to-peer network
|
US9043920B2
(en)
|
2012-06-27 |
2015-05-26 |
Tenable Network Security, Inc. |
System and method for identifying exploitable weak points in a network
|
EP2877956B1
(en)
|
2012-07-24 |
2019-07-17 |
Webroot Inc. |
System and method to provide automatic classification of phishing sites
|
RU2495486C1
(en)
|
2012-08-10 |
2013-10-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
Method of analysing and detecting malicious intermediate nodes in network
|
US10110601B1
(en)
|
2012-08-16 |
2018-10-23 |
Paypal, Inc. |
Systems and methods for protecting users from malicious content
|
CN103685174B
(en)
|
2012-09-07 |
2016-12-21 |
中国科学院计算机网络信息中心 |
A kind of detection method for phishing site of independent of sample
|
US9386030B2
(en)
|
2012-09-18 |
2016-07-05 |
Vencore Labs, Inc. |
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
|
US9215239B1
(en)
|
2012-09-28 |
2015-12-15 |
Palo Alto Networks, Inc. |
Malware detection based on traffic analysis
|
US10965775B2
(en)
|
2012-11-20 |
2021-03-30 |
Airbnb, Inc. |
Discovering signature of electronic social networks
|
RU2522019C1
(en)
|
2012-12-25 |
2014-07-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of detecting threat in code executed by virtual machine
|
RU2536664C2
(en)
|
2012-12-25 |
2014-12-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method for automatic modification of antivirus database
|
RU2530210C2
(en)
|
2012-12-25 |
2014-10-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method for detecting malware preventing standard user interaction with operating system interface
|
RU129279U1
(en)
*
|
2013-01-09 |
2013-06-20 |
ОБЩЕСТВО С ОГРАНИЧЕННОЙ ОТВЕТСТВЕННОСТЬЮ "МФИ Софт" |
DEVICE FOR DETECTION AND PROTECTION AGAINST ANOMALOUS ACTIVITY ON DATA TRANSMISSION NETWORKS
|
US20160127402A1
(en)
|
2014-11-04 |
2016-05-05 |
Patternex, Inc. |
Method and apparatus for identifying and detecting threats to an enterprise or e-commerce system
|
US10425429B2
(en)
|
2013-04-10 |
2019-09-24 |
Gabriel Bassett |
System and method for cyber security analysis and human behavior prediction
|
GB201306628D0
(en)
|
2013-04-11 |
2013-05-29 |
F Secure Oyj |
Detecting and marking client devices
|
US20160055490A1
(en)
|
2013-04-11 |
2016-02-25 |
Brandshield Ltd. |
Device, system, and method of protecting brand names and domain names
|
GB2513168B
(en)
|
2013-04-18 |
2017-12-27 |
F Secure Corp |
Detecting unauthorised changes to website content
|
WO2014184711A2
(en)
|
2013-05-13 |
2014-11-20 |
Yandex Europe Ag |
Method of and system for providing a client device with an automatic update of an ip address associated with a domain name
|
US9357469B2
(en)
|
2013-05-29 |
2016-05-31 |
Rivada Networks, Llc |
Methods and system for dynamic spectrum arbitrage with mobility management
|
US20140380480A1
(en)
|
2013-06-25 |
2014-12-25 |
Tencent Technology (Shenzhen) Company Limited |
Method, device and system for identifying harmful websites
|
US9443075B2
(en)
|
2013-06-27 |
2016-09-13 |
The Mitre Corporation |
Interception and policy application for malicious communications
|
CN103368958A
(en)
|
2013-07-05 |
2013-10-23 |
腾讯科技(深圳)有限公司 |
Method, device and system for detecting webpage
|
RU2538292C1
(en)
|
2013-07-24 |
2015-01-10 |
Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" |
Method of detecting computer attacks to networked computer system
|
KR102120823B1
(en)
|
2013-08-14 |
2020-06-09 |
삼성전자주식회사 |
Method of controlling read sequence of nov-volatile memory device and memory system performing the same
|
CN103491205B
(en)
|
2013-09-30 |
2016-08-17 |
北京奇虎科技有限公司 |
The method for pushing of a kind of correlated resources address based on video search and device
|
US9330258B1
(en)
|
2013-09-30 |
2016-05-03 |
Symantec Corporation |
Systems and methods for identifying uniform resource locators that link to potentially malicious resources
|
BR112016007145A8
(en)
|
2013-10-21 |
2020-03-03 |
Microsoft Technology Licensing Llc |
method for searching layered audio-video, method for building a layered audio-video index, system, computer-readable medium, mobile device and computing device
|
GB2520987B
(en)
|
2013-12-06 |
2016-06-01 |
Cyberlytic Ltd |
Using fuzzy logic to assign a risk level profile to a potential cyber threat
|
IN2013CH05744A
(en)
|
2013-12-12 |
2015-06-19 |
Infosys Ltd |
|
US20150363791A1
(en)
|
2014-01-10 |
2015-12-17 |
Hybrid Application Security Ltd. |
Business action based fraud detection system and method
|
US9262635B2
(en)
|
2014-02-05 |
2016-02-16 |
Fireeye, Inc. |
Detection efficacy of virtual machine-based analysis with application specific events
|
US9060018B1
(en)
|
2014-02-05 |
2015-06-16 |
Pivotal Software, Inc. |
Finding command and control center computers by communication link tracking
|
KR101514984B1
(en)
|
2014-03-03 |
2015-04-24 |
(주)엠씨알시스템 |
Detecting system for detecting Homepage spreading Virus and Detecting method thereof
|
US9338181B1
(en)
|
2014-03-05 |
2016-05-10 |
Netflix, Inc. |
Network security system with remediation based on value of attacked assets
|
US9292691B1
(en)
|
2014-03-12 |
2016-03-22 |
Symantec Corporation |
Systems and methods for protecting users from website security risks using templates
|
RU2543564C1
(en)
|
2014-03-20 |
2015-03-10 |
Закрытое акционерное общество "Научно-производственное предприятие "Информационные технологии в бизнесе" |
System of detection and prevention of intrusions based on control of access to resources
|
CN104980309B
(en)
*
|
2014-04-11 |
2018-04-20 |
北京奇安信科技有限公司 |
website security detection method and device
|
US9853997B2
(en)
|
2014-04-14 |
2017-12-26 |
Drexel University |
Multi-channel change-point malware detection
|
US9332022B1
(en)
|
2014-07-07 |
2016-05-03 |
Symantec Corporation |
Systems and methods for detecting suspicious internet addresses
|
US9800592B2
(en)
|
2014-08-04 |
2017-10-24 |
Microsoft Technology Licensing, Llc |
Data center architecture that supports attack detection and mitigation
|
US20160036837A1
(en)
|
2014-08-04 |
2016-02-04 |
Microsoft Corporation |
Detecting attacks on data centers
|
US9942250B2
(en)
|
2014-08-06 |
2018-04-10 |
Norse Networks, Inc. |
Network appliance for dynamic protection from risky network activities
|
KR101587161B1
(en)
|
2014-09-03 |
2016-01-20 |
한국전자통신연구원 |
Apparatus and method for real-time network antivirus
|
US9026841B1
(en)
|
2014-09-09 |
2015-05-05 |
Belkin International, Inc. |
Coordinated and device-distributed detection of abnormal network device operation
|
RU2589310C2
(en)
|
2014-09-30 |
2016-07-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of calculating interval of repeated determination of categories of network resource
|
WO2016064919A1
(en)
|
2014-10-21 |
2016-04-28 |
Abramowitz Marc Lauren |
Dynamic security rating for cyber insurance products
|
US10338191B2
(en)
|
2014-10-30 |
2019-07-02 |
Bastille Networks, Inc. |
Sensor mesh and signal transmission architectures for electromagnetic signature analysis
|
US20160142429A1
(en)
|
2014-11-19 |
2016-05-19 |
Royce Renteria |
Preventing access to malicious content
|
GB2532475B
(en)
*
|
2014-11-20 |
2017-03-08 |
F Secure Corp |
Integrity check of DNS server setting
|
JP6916112B2
(en)
|
2014-11-21 |
2021-08-11 |
ブルヴェクター, インコーポレーテッドBluvector, Inc. |
Network data characterization system and method
|
US10574675B2
(en)
|
2014-12-05 |
2020-02-25 |
T-Mobile Usa, Inc. |
Similarity search for discovering multiple vector attacks
|
US9367872B1
(en)
|
2014-12-22 |
2016-06-14 |
Palantir Technologies Inc. |
Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
|
US9934376B1
(en)
|
2014-12-29 |
2018-04-03 |
Fireeye, Inc. |
Malware detection appliance architecture
|
US10230526B2
(en)
|
2014-12-31 |
2019-03-12 |
William Manning |
Out-of-band validation of domain name system records
|
US9712549B2
(en)
|
2015-01-08 |
2017-07-18 |
Imam Abdulrahman Bin Faisal University |
System, apparatus, and method for detecting home anomalies
|
CN104504307B
(en)
|
2015-01-08 |
2017-09-29 |
北京大学 |
Audio frequency and video copy detection method and device based on copy cell
|
KR20160095856A
(en)
|
2015-02-04 |
2016-08-12 |
한국전자통신연구원 |
System and method for detecting intrusion intelligently based on automatic detection of new attack type and update of attack type
|
US11328307B2
(en)
|
2015-02-24 |
2022-05-10 |
OpSec Online, Ltd. |
Brand abuse monitoring system with infringement detection engine and graphical user interface
|
EP3065076A1
(en)
|
2015-03-04 |
2016-09-07 |
Secure-Nok AS |
System and method for responding to a cyber-attack-related incident against an industrial control system
|
US9253208B1
(en)
|
2015-03-05 |
2016-02-02 |
AO Kaspersky Lab |
System and method for automated phishing detection rule evolution
|
US9769201B2
(en)
|
2015-03-06 |
2017-09-19 |
Radware, Ltd. |
System and method thereof for multi-tiered mitigation of cyber-attacks
|
US9712553B2
(en)
|
2015-03-27 |
2017-07-18 |
The Boeing Company |
System and method for developing a cyber-attack scenario
|
US20160308898A1
(en)
|
2015-04-20 |
2016-10-20 |
Phirelight Security Solutions Inc. |
Systems and methods for tracking, analyzing and mitigating security threats in networks via a network traffic analysis platform
|
US10284595B2
(en)
|
2015-05-08 |
2019-05-07 |
Citrix Systems, Inc. |
Combining internet routing information with access logs to assess risk of user exposure
|
US10129239B2
(en)
|
2015-05-08 |
2018-11-13 |
Citrix Systems, Inc. |
Systems and methods for performing targeted scanning of a target range of IP addresses to verify security certificates
|
US10536357B2
(en)
|
2015-06-05 |
2020-01-14 |
Cisco Technology, Inc. |
Late data detection in data center
|
US10382484B2
(en)
|
2015-06-08 |
2019-08-13 |
Illusive Networks Ltd. |
Detecting attackers who target containerized clusters
|
US9917852B1
(en)
|
2015-06-29 |
2018-03-13 |
Palo Alto Networks, Inc. |
DGA behavior detection
|
RU164629U1
(en)
|
2015-06-30 |
2016-09-10 |
Акционерное общество "Институт точной механики и вычислительной техники имени С.А. Лебедева Российской академии наук" |
ELECTRONIC MODULE OF PROTECTION AGAINST NETWORK ATTACKS ON THE BASIS OF THE NETWORK PROCESSOR NP-5
|
EP3125147B1
(en)
|
2015-07-27 |
2020-06-03 |
Swisscom AG |
System and method for identifying a phishing website
|
US9456000B1
(en)
|
2015-08-06 |
2016-09-27 |
Palantir Technologies Inc. |
Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
|
CN106506435B
(en)
|
2015-09-08 |
2019-08-06 |
中国电信股份有限公司 |
For detecting the method and firewall system of network attack
|
US9654492B2
(en)
|
2015-09-15 |
2017-05-16 |
Mimecast North America, Inc. |
Malware detection system based on stored data
|
WO2017049045A1
(en)
|
2015-09-16 |
2017-03-23 |
RiskIQ, Inc. |
Using hash signatures of dom objects to identify website similarity
|
US9825989B1
(en)
|
2015-09-30 |
2017-11-21 |
Fireeye, Inc. |
Cyber attack early warning system
|
KR101703446B1
(en)
|
2015-10-15 |
2017-02-06 |
숭실대학교산학협력단 |
Network capable of detection DoS attacks and Method for controlling thereof, Gateway and Managing server comprising the network
|
CN105429955B
(en)
|
2015-10-30 |
2018-12-11 |
西安四叶草信息技术有限公司 |
A kind of detection method of long-range loophole
|
CN105429956B
(en)
|
2015-11-02 |
2018-09-25 |
重庆大学 |
Malware detection system based on P2P dynamic clouds and method
|
US10200382B2
(en)
|
2015-11-05 |
2019-02-05 |
Radware, Ltd. |
System and method for detecting abnormal traffic behavior using infinite decaying clusters
|
RU2622870C2
(en)
|
2015-11-17 |
2017-06-20 |
Общество с ограниченной ответственностью "САЙТСЕКЬЮР" |
System and method for evaluating malicious websites
|
US9894036B2
(en)
|
2015-11-17 |
2018-02-13 |
Cyber Adapt, Inc. |
Cyber threat attenuation using multi-source threat data analysis
|
CN106709777A
(en)
|
2015-11-18 |
2017-05-24 |
阿里巴巴集团控股有限公司 |
Order clustering method and apparatus thereof, and anti-malicious information method and apparatus thereof
|
US10594710B2
(en)
|
2015-11-20 |
2020-03-17 |
Webroot Inc. |
Statistical analysis of network behavior using event vectors to identify behavioral anomalies using a composite score
|
RU2613535C1
(en)
|
2015-11-20 |
2017-03-16 |
Илья Самуилович Рабинович |
Method for detecting malicious software and elements
|
US10212175B2
(en)
|
2015-11-30 |
2019-02-19 |
International Business Machines Corporation |
Attracting and analyzing spam postings
|
JP6239215B2
(en)
|
2015-12-14 |
2017-11-29 |
三菱電機株式会社 |
Information processing apparatus, information processing method, and information processing program
|
US9723344B1
(en)
|
2015-12-29 |
2017-08-01 |
Google Inc. |
Early detection of policy violating media
|
US11069370B2
(en)
|
2016-01-11 |
2021-07-20 |
University Of Tennessee Research Foundation |
Tampering detection and location identification of digital audio recordings
|
US10440050B1
(en)
|
2016-01-27 |
2019-10-08 |
United Services Automobile Association (Usaa) |
Identifying sensitive data on computer networks
|
RU2628192C2
(en)
|
2016-01-27 |
2017-08-15 |
Акционерное общество "Творческо-производственное объединение "Центральная киностудия детских и юношеских фильмов им. М. Горького" |
Device for semantic classification and search in archives of digitized film materials
|
US9900338B2
(en)
|
2016-02-09 |
2018-02-20 |
International Business Machines Corporation |
Forecasting and classifying cyber-attacks using neural embeddings based on pattern of life data
|
CA3015697C
(en)
|
2016-02-29 |
2022-11-22 |
Securekey Technologies Inc. |
Systems and methods for distributed identity verification
|
US10482242B2
(en)
|
2016-03-08 |
2019-11-19 |
Tanium Inc. |
System and method for performing event inquiries in a network
|
US10063572B2
(en)
|
2016-03-28 |
2018-08-28 |
Accenture Global Solutions Limited |
Antivirus signature distribution with distributed ledger
|
US10313382B2
(en)
|
2016-03-29 |
2019-06-04 |
The Mitre Corporation |
System and method for visualizing and analyzing cyber-attacks using a graph model
|
US9838407B1
(en)
|
2016-03-30 |
2017-12-05 |
EMC IP Holding Company LLC |
Detection of malicious web activity in enterprise computer networks
|
US10212145B2
(en)
|
2016-04-06 |
2019-02-19 |
Avaya Inc. |
Methods and systems for creating and exchanging a device specific blockchain for device authentication
|
US10178107B2
(en)
|
2016-04-06 |
2019-01-08 |
Cisco Technology, Inc. |
Detection of malicious domains using recurring patterns in domain names
|
CN105897714B
(en)
|
2016-04-11 |
2018-11-09 |
天津大学 |
Botnet detection method based on DNS traffic characteristics
|
RU2625050C1
(en)
|
2016-04-25 |
2017-07-11 |
Акционерное общество "Лаборатория Касперского" |
System and method of transactions trusted declaration
|
US11223598B2
(en)
|
2016-05-03 |
2022-01-11 |
Nokia Of America Corporation |
Internet security
|
RU2634211C1
(en)
|
2016-07-06 |
2017-10-24 |
Общество с ограниченной ответственностью "Траст" |
Method and system of protocols analysis of harmful programs interaction with control centers and detection of computer attacks
|
RU2636702C1
(en)
|
2016-07-07 |
2017-11-27 |
Общество С Ограниченной Ответственностью "Яндекс" |
Method and device for selecting network resource as source of content in recommendations system
|
US20180012144A1
(en)
|
2016-07-11 |
2018-01-11 |
Qualcomm Innovation Center, Inc. |
Incremental and speculative analysis of javascripts based on a multi-instance model for web security
|
CN106131016B
(en)
|
2016-07-13 |
2019-05-03 |
北京知道创宇信息技术有限公司 |
Malice URL detects interference method, system and device
|
US10212133B2
(en)
|
2016-07-29 |
2019-02-19 |
ShieldX Networks, Inc. |
Accelerated pattern matching using pattern functions
|
WO2018025157A1
(en)
|
2016-07-31 |
2018-02-08 |
Cymmetria, Inc. |
Deploying deception campaigns using communication breadcrumbs
|
US10498761B2
(en)
|
2016-08-23 |
2019-12-03 |
Duo Security, Inc. |
Method for identifying phishing websites and hindering associated activity
|
RU2634209C1
(en)
|
2016-09-19 |
2017-10-24 |
Общество с ограниченной ответственностью "Группа АйБи ТДС" |
System and method of autogeneration of decision rules for intrusion detection systems with feedback
|
US10313352B2
(en)
|
2016-10-26 |
2019-06-04 |
International Business Machines Corporation |
Phishing detection with machine learning
|
WO2018095192A1
(en)
|
2016-11-23 |
2018-05-31 |
腾讯科技(深圳)有限公司 |
Method and system for website attack detection and prevention
|
US10715543B2
(en)
|
2016-11-30 |
2020-07-14 |
Agari Data, Inc. |
Detecting computer security risk based on previously observed communications
|
CN106713312A
(en)
|
2016-12-21 |
2017-05-24 |
深圳市深信服电子科技有限公司 |
Method and device for detecting illegal domain name
|
US10721262B2
(en)
|
2016-12-28 |
2020-07-21 |
Palantir Technologies Inc. |
Resource-centric network cyber attack warning system
|
CN108574742B
(en)
*
|
2017-03-10 |
2021-04-16 |
腾讯科技(深圳)有限公司 |
Domain name information collection method and domain name information collection device
|
US10462169B2
(en)
|
2017-04-29 |
2019-10-29 |
Splunk Inc. |
Lateral movement detection through graph-based candidate selection
|
JP2020531936A
(en)
*
|
2017-06-29 |
2020-11-05 |
Line株式会社 |
How and systems to detect application vulnerabilities
|
WO2019010182A1
(en)
|
2017-07-06 |
2019-01-10 |
Pixm |
Phishing detection method and system
|
CN107392456A
(en)
|
2017-07-14 |
2017-11-24 |
武汉理工大学 |
A kind of multi-angle rating business credit modeling method for merging internet information
|
RU2670906C9
(en)
|
2017-12-28 |
2018-12-12 |
Общество С Ограниченной Ответственностью "Центр Разработки И Внедрения Инновационных Технологий" |
Self-adjusting interactive system, method for message and/or call exchange between users of different web sites using client-server technology and computer readable medium
|
CN108282489B
(en)
*
|
2018-02-07 |
2020-01-31 |
网宿科技股份有限公司 |
vulnerability scanning method, server and system
|
RU2681699C1
(en)
|
2018-02-13 |
2019-03-12 |
Общество с ограниченной ответственностью "Траст" |
Method and server for searching related network resources
|
US10778701B2
(en)
|
2018-04-10 |
2020-09-15 |
Red Hat, Inc. |
Mitigating cyber-attacks by automatically coordinating responses from cyber-security tools
|
RU2722693C1
(en)
|
2020-01-27 |
2020-06-03 |
Общество с ограниченной ответственностью «Группа АйБи ТДС» |
Method and system for detecting the infrastructure of a malicious software or a cybercriminal
|
RU2738335C1
(en)
|
2020-05-12 |
2020-12-11 |
Общество С Ограниченной Ответственностью "Группа Айби" |
Method and system for classifying and filtering prohibited content in a network
|