US2021021629A1
|
|
Attack Path and Graph Creation Based on User and System Profiling
|
US2020329067A1
|
|
Domain-specific language simulant for simulating a threat-actor and adversarial tactics, techniques, and procedures
|
US2020329055A1
|
|
Asset Remediation Trend Map Generation and Utilization for Threat Mitigation
|
US2020329070A1
|
|
Domain specific language for threat-actor deception
|
US2020327224A1
|
|
Attack Kill Chain Generation and Utilization for Threat Analysis
|
US2020329071A1
|
|
Domain specific language for defending against a threat-actor and adversarial tactics, techniques, and procedures
|
US10104101B1
|
|
Method and Apparatus for Intelligent Aggregation of Threat Behavior for the Detection of Malware
|
US2016241595A1
|
|
Advanced asset tracking and correlation
|
US2016234238A1
|
|
System and method for web-based log analysis
|
US2016234237A1
|
|
System and method for detecting vulnerability state deltas
|
US2014268245A1
|
|
Client device state collection and network-based processing solution
|
US2014137228A1
|
|
Web application vulnerability scanning
|
WO2012051360A2
|
|
Dynamic hierarchical tagging system and method
|
WO2010068824A1
|
|
Systems and methods for performing remote configuration compliance assessment of a networked computer device
|
WO2010045596A1
|
|
Systems and methods for assessing the compliance of a computer across a network
|
WO2010019918A1
|
|
System and method for performing remote security assessment of firewalled computer
|