US2020329062A1
|
|
Privileged account breach detections based on behavioral access patterns
|
US2019149560A1
|
|
Malicious relay and jump-system detection using behavioral indicators of actors
|
US2018219895A1
|
|
Method and system for learning representations of network flow traffic
|
US2018115570A1
|
|
System and method for categorizing malware
|
EP3293937A1
|
|
Method and system for detecting malicious payloads
|
EP3293938A1
|
|
Method and system for detecting suspicious administrative activity
|
US10404730B1
|
|
High-volume network threat trace engine
|
US2016191551A1
|
|
Method and system for detecting threats using metadata vectors
|
WO2016081516A2
|
|
Method and system for detecting threats using passive cluster mapping
|
WO2016073383A1
|
|
A system for implementing threat detection using threat and risk assessment of asset-actor interactions
|
EP3215944A4
|
|
A system for implementing threat detection using daily network traffic community outliers
|
US2016191563A1
|
|
System for detecting threats using scenario-based tracking of internal and external network traffic
|
WO2015138513A1
|
|
Detecting network intrusions using layered host scoring
|
US2015264078A1
|
|
Detecting network reconnaissance by tracking intranet dark-net communications
|
US2015264070A1
|
|
Method and system for detecting algorithm-generated domains
|
US2015312211A1
|
|
Method and system for generating durable host identifiers using network artifacts
|
US2015264083A1
|
|
Malicious relay detection on networks
|
US2015264069A1
|
|
Method and system for detecting external control of compromised hosts
|
US2015082433A1
|
|
Systems and methods for capturing, replaying, or analyzing time-series data
|