US2015213730A1
|
|
Automated execution and evaluation of network-based training exercises
|
US9191391B1
|
|
Cross-domain object models for securely sharing information between network security domains
|
US2015143355A1
|
|
Service oriented architecture version and dependency control
|
US2014337558A1
|
|
Mediating communication of a universal serial bus device
|
US8874719B1
|
|
Context-aware network and situation management for crypto-partitioned networks
|
US2015146603A1
|
|
Adaptive multicast network communications
|
US2014310810A1
|
|
Fight-through nodes for survivable computer network
|
US2015149764A1
|
|
Method for network communication past encryption devices
|
US2013325889A1
|
|
Local storage of information pedigrees
|
US2013174256A1
|
|
Network defense system and framework for detecting and geolocating botnet cyber attacks
|
US2014108414A1
|
|
Scalable distributed processing of RDF data
|
US2010299430A1
|
|
Automated acquisition of volatile forensic evidence from network devices
|
US2010039937A1
|
|
Reliable transport protocol providing receiver-based congestion control
|
US2009165142A1
|
|
Extensible software tool for investigating peer-to-peer usage on a target device
|
US2008120281A1
|
|
Dynamic assembly of information pedigrees
|
US2008047010A1
|
|
Empirical privilege profiler (EPP) for software programs
|
US2006259542A1
|
|
Integrated testing approach for publish/subscribe network systems
|
US2006018466A1
|
|
Attack correlation using marked information
|
US2005240591A1
|
|
Secure peer-to-peer object storage system
|
US2008271163A1
|
|
Active verification of boot firmware
|