US9521162B1
|
|
Application-level DDoS detection using service profiling
|
US9686173B1
|
|
Unsupervised methodology to unveil content delivery network structures
|
US10078743B1
|
|
Cross identification of users in cyber space and physical world
|
US10263868B1
|
|
User-specific policy enforcement based on network traffic fingerprinting
|
US9853876B1
|
|
Mobile application identification in network traffic via a search engine approach
|
US9769038B1
|
|
Attributing network address translation device processed traffic to individual hosts
|
US9213855B1
|
|
Trusted user circles
|
US9210090B1
|
|
Efficient storage and flexible retrieval of full packets captured from network traffic
|
US9577898B1
|
|
Identifying IP traffic from multiple hosts behind a network address translation device
|
US9088598B1
|
|
Systematic mining of associated server herds for uncovering malware and attack campaigns
|
US9245121B1
|
|
Detecting suspicious network behaviors based on domain name service failures
|
US8959643B1
|
|
Detecting malware infestations in large-scale networks
|
US9100326B1
|
|
Automatic parsing of text-based application protocols using network traffic data
|
US9473380B1
|
|
Automatic parsing of binary-based application protocols using network traffic
|
US10419351B1
|
|
System and method for extracting signatures from controlled execution of applications and application codes retrieved from an application source
|
US9311386B1
|
|
Categorizing network resources and extracting user interests from network activity
|
US9251401B1
|
|
Facial recognition to positively identify a live person subject
|
US8813236B1
|
|
Detecting malicious endpoints using network connectivity and flow information
|
US9531736B1
|
|
Detecting malicious HTTP redirections using user browsing activity trees
|
US9479405B1
|
|
Transaction based network application signatures for text based protocols
|