US6321338B1
(en)
*
|
1998-11-09 |
2001-11-20 |
Sri International |
Network surveillance
|
EP1149339A1
(en)
|
1998-12-09 |
2001-10-31 |
Network Ice Corporation |
A method and apparatus for providing network and computer system security
|
JP4336413B2
(en)
*
|
1999-04-09 |
2009-09-30 |
キヤノン株式会社 |
Display processing method, data processing apparatus, and computer-readable storage medium
|
GB2349962B
(en)
*
|
1999-05-10 |
2001-07-11 |
3Com Corp |
Supervising a network
|
US7346929B1
(en)
*
|
1999-07-29 |
2008-03-18 |
International Business Machines Corporation |
Method and apparatus for auditing network security
|
DE19942315A1
(en)
*
|
1999-09-04 |
2001-05-17 |
Gfs Systemtechnik Gmbh & Co Kg |
Process for the configuration and parameterization of a computer program for the operation of a plant for process data processing
|
US8006243B2
(en)
*
|
1999-12-07 |
2011-08-23 |
International Business Machines Corporation |
Method and apparatus for remote installation of network drivers and software
|
US7062782B1
(en)
*
|
1999-12-22 |
2006-06-13 |
Uunet Technologies, Inc. |
Overlay network for tracking denial-of-service floods in unreliable datagram delivery networks
|
US6857014B1
(en)
*
|
1999-12-22 |
2005-02-15 |
Nortel Network Limited |
Method and system for designing a network
|
IL134047A
(en)
*
|
2000-01-14 |
2004-02-08 |
Lightscape Networks Ltd |
Method for selecting the type of communication channels in a multi-layered network and system using same
|
US7315801B1
(en)
|
2000-01-14 |
2008-01-01 |
Secure Computing Corporation |
Network security modeling system and method
|
US6799207B1
(en)
*
|
2000-04-10 |
2004-09-28 |
International Business Machines Corporation |
Method and system for downloading software managed trees in a network processing system
|
US7921459B2
(en)
|
2000-04-28 |
2011-04-05 |
International Business Machines Corporation |
System and method for managing security events on a network
|
IL152502A0
(en)
*
|
2000-04-28 |
2003-05-29 |
Internet Security Systems Inc |
Method and system for managing computer security information
|
US7162649B1
(en)
*
|
2000-06-30 |
2007-01-09 |
Internet Security Systems, Inc. |
Method and apparatus for network assessment and authentication
|
US6901346B2
(en)
|
2000-08-09 |
2005-05-31 |
Telos Corporation |
System, method and medium for certifying and accrediting requirements compliance
|
US6993448B2
(en)
|
2000-08-09 |
2006-01-31 |
Telos Corporation |
System, method and medium for certifying and accrediting requirements compliance
|
US7380270B2
(en)
|
2000-08-09 |
2008-05-27 |
Telos Corporation |
Enhanced system, method and medium for certifying and accrediting requirements compliance
|
US7917393B2
(en)
*
|
2000-09-01 |
2011-03-29 |
Sri International, Inc. |
Probabilistic alert correlation
|
US7512894B1
(en)
*
|
2000-09-11 |
2009-03-31 |
International Business Machines Corporation |
Pictorial-based user interface management of computer hardware components
|
US9027121B2
(en)
|
2000-10-10 |
2015-05-05 |
International Business Machines Corporation |
Method and system for creating a record for one or more computer security incidents
|
US20020138643A1
(en)
*
|
2000-10-19 |
2002-09-26 |
Shin Kang G. |
Method and system for controlling network traffic to a network computer
|
US7146305B2
(en)
*
|
2000-10-24 |
2006-12-05 |
Vcis, Inc. |
Analytical virtual machine
|
US20020107954A1
(en)
*
|
2000-10-31 |
2002-08-08 |
Glen Ferguson |
Data model for automated server configuration
|
US8250570B2
(en)
|
2000-10-31 |
2012-08-21 |
Hewlett-Packard Development Company, L.P. |
Automated provisioning framework for internet site servers
|
US7130466B2
(en)
*
|
2000-12-21 |
2006-10-31 |
Cobion Ag |
System and method for compiling images from a database and comparing the compiled images with known images
|
US20050207444A1
(en)
*
|
2001-01-12 |
2005-09-22 |
Eci Telecom Ltd. |
Hybrid network element for a multi-protocol layered transmissions network and a graphical representation of the network
|
WO2002062049A2
(en)
*
|
2001-01-31 |
2002-08-08 |
Timothy David Dodd |
Method and system for calculating risk in association with a security audit of a computer network
|
EP1364286B1
(en)
*
|
2001-02-20 |
2009-08-19 |
Siemens Aktiengesellschaft |
Method and device for determining a full error description for at least one part of a technical system, computer program element and computer-readable storage medium
|
US7590745B2
(en)
*
|
2001-03-02 |
2009-09-15 |
International Business Machines Corporation |
System and method for analyzing a router in a shared network system
|
US6900822B2
(en)
*
|
2001-03-14 |
2005-05-31 |
Bmc Software, Inc. |
Performance and flow analysis method for communication networks
|
US7028228B1
(en)
|
2001-03-28 |
2006-04-11 |
The Shoregroup, Inc. |
Method and apparatus for identifying problems in computer networks
|
US7296194B1
(en)
|
2002-03-28 |
2007-11-13 |
Shoregroup Inc. |
Method and apparatus for maintaining the status of objects in computer networks using virtual state machines
|
US7197561B1
(en)
*
|
2001-03-28 |
2007-03-27 |
Shoregroup, Inc. |
Method and apparatus for maintaining the status of objects in computer networks using virtual state machines
|
WO2002079907A2
(en)
*
|
2001-03-29 |
2002-10-10 |
Accenture Llp |
Overall risk in a system
|
US7743147B2
(en)
*
|
2001-04-20 |
2010-06-22 |
Hewlett-Packard Development Company, L.P. |
Automated provisioning of computing networks using a network database data model
|
GB2375277B
(en)
*
|
2001-05-03 |
2005-04-06 |
Ibm |
A method and apparatus for display of access control in a graphical user interface
|
US7657419B2
(en)
*
|
2001-06-19 |
2010-02-02 |
International Business Machines Corporation |
Analytical virtual machine
|
US7096503B1
(en)
*
|
2001-06-29 |
2006-08-22 |
Mcafee, Inc. |
Network-based risk-assessment tool for remotely detecting local computer vulnerabilities
|
US20030048292A1
(en)
*
|
2001-09-13 |
2003-03-13 |
Branson Michael John |
Method and apparatus for displaying information
|
US7379993B2
(en)
*
|
2001-09-13 |
2008-05-27 |
Sri International |
Prioritizing Bayes network alerts
|
US7109998B2
(en)
*
|
2001-10-03 |
2006-09-19 |
Sun Microsystems, Inc. |
Stationary semantic zooming
|
EP1461927B1
(en)
|
2001-10-25 |
2006-04-12 |
General Dynamics Government Systems Corporation |
A method and system for modelling, analysis, and display of network security events
|
US7174029B2
(en)
*
|
2001-11-02 |
2007-02-06 |
Agostinelli John A |
Method and apparatus for automatic selection and presentation of information
|
JP2003141055A
(en)
*
|
2001-11-07 |
2003-05-16 |
Hitachi Ltd |
Connection setting method for computer system
|
US7281020B2
(en)
*
|
2001-12-12 |
2007-10-09 |
Naomi Fine |
Proprietary information identification, management and protection
|
WO2003058451A1
(en)
*
|
2002-01-04 |
2003-07-17 |
Internet Security Systems, Inc. |
System and method for the managed security control of processes on a computer system
|
JP4190765B2
(en)
*
|
2002-01-18 |
2008-12-03 |
株式会社コムスクエア |
Security level information providing method and system
|
US20030158927A1
(en)
*
|
2002-02-21 |
2003-08-21 |
Gateway, Inc. |
Connected home network console
|
US7299504B1
(en)
|
2002-03-08 |
2007-11-20 |
Lucent Technologies Inc. |
System and method for implementing security management using a database-modeled security policy
|
US7167983B1
(en)
|
2002-03-08 |
2007-01-23 |
Lucent Technologies Inc. |
System and method for security project management
|
US7360158B1
(en)
*
|
2002-03-28 |
2008-04-15 |
At&T Mobility Ii Llc |
Interactive education tool
|
US7613795B2
(en)
*
|
2002-05-09 |
2009-11-03 |
Qwest Communications International, Inc. |
Systems and methods for archiving network planning processes
|
US7519709B2
(en)
|
2002-05-09 |
2009-04-14 |
Qwest Communications International Inc. |
Systems and methods for creating network architecture planning tools
|
US8335839B2
(en)
*
|
2002-05-09 |
2012-12-18 |
Qwest Communications International Inc. |
Systems and methods for using network architecture planning tools
|
US7370360B2
(en)
*
|
2002-05-13 |
2008-05-06 |
International Business Machines Corporation |
Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
|
US7340770B2
(en)
*
|
2002-05-15 |
2008-03-04 |
Check Point Software Technologies, Inc. |
System and methodology for providing community-based security policies
|
US7509675B2
(en)
*
|
2002-05-29 |
2009-03-24 |
At&T Intellectual Property I, L.P. |
Non-invasive monitoring of the effectiveness of electronic security services
|
US8549114B2
(en)
|
2002-06-12 |
2013-10-01 |
Bladelogic, Inc. |
Method and system for model-based heterogeneous server configuration management
|
WO2003107211A1
(en)
*
|
2002-06-18 |
2003-12-24 |
Esecurityonline |
Methods and systems for managing enterprise assets
|
US20040001084A1
(en)
*
|
2002-06-28 |
2004-01-01 |
Nandini Shrinidhi |
N x M network graphical user interface and method of use
|
US7930753B2
(en)
*
|
2002-07-01 |
2011-04-19 |
First Data Corporation |
Methods and systems for performing security risk assessments of internet merchant entities
|
US20040006704A1
(en)
*
|
2002-07-02 |
2004-01-08 |
Dahlstrom Dale A. |
System and method for determining security vulnerabilities
|
US7454423B2
(en)
|
2002-09-06 |
2008-11-18 |
Oracle International Corporation |
Enterprise link for a software database
|
US7941542B2
(en)
*
|
2002-09-06 |
2011-05-10 |
Oracle International Corporation |
Methods and apparatus for maintaining application execution over an intermittent network connection
|
US7899879B2
(en)
*
|
2002-09-06 |
2011-03-01 |
Oracle International Corporation |
Method and apparatus for a report cache in a near real-time business intelligence system
|
US7412481B2
(en)
|
2002-09-16 |
2008-08-12 |
Oracle International Corporation |
Method and apparatus for distributed rule evaluation in a near real-time business intelligence system
|
US7912899B2
(en)
*
|
2002-09-06 |
2011-03-22 |
Oracle International Corporation |
Method for selectively sending a notification to an instant messaging device
|
US8165993B2
(en)
*
|
2002-09-06 |
2012-04-24 |
Oracle International Corporation |
Business intelligence system with interface that provides for immediate user action
|
US7945846B2
(en)
|
2002-09-06 |
2011-05-17 |
Oracle International Corporation |
Application-specific personalization for data display
|
US8255454B2
(en)
*
|
2002-09-06 |
2012-08-28 |
Oracle International Corporation |
Method and apparatus for a multiplexed active data window in a near real-time business intelligence system
|
US20040049698A1
(en)
*
|
2002-09-06 |
2004-03-11 |
Ott Allen Eugene |
Computer network security system utilizing dynamic mobile sensor agents
|
US7401158B2
(en)
*
|
2002-09-16 |
2008-07-15 |
Oracle International Corporation |
Apparatus and method for instant messaging collaboration
|
US7426059B2
(en)
|
2002-09-16 |
2008-09-16 |
Oracle International Corporation |
Data presentation methods and apparatus to facilitate printing and reviewing
|
US7668917B2
(en)
|
2002-09-16 |
2010-02-23 |
Oracle International Corporation |
Method and apparatus for ensuring accountability in the examination of a set of data elements by a user
|
JP3831696B2
(en)
*
|
2002-09-20 |
2006-10-11 |
株式会社日立製作所 |
Network management apparatus and network management method
|
US7472421B2
(en)
*
|
2002-09-30 |
2008-12-30 |
Electronic Data Systems Corporation |
Computer model of security risks
|
US8407798B1
(en)
|
2002-10-01 |
2013-03-26 |
Skybox Secutiry Inc. |
Method for simulation aided security event management
|
US8359650B2
(en)
*
|
2002-10-01 |
2013-01-22 |
Skybox Secutiry Inc. |
System, method and computer readable medium for evaluating potential attacks of worms
|
FR2847360B1
(en)
*
|
2002-11-14 |
2005-02-04 |
Eads Defence & Security Ntwk |
METHOD AND DEVICE FOR ANALYZING THE SECURITY OF AN INFORMATION SYSTEM
|
US6983221B2
(en)
|
2002-11-27 |
2006-01-03 |
Telos Corporation |
Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model
|
US6980927B2
(en)
|
2002-11-27 |
2005-12-27 |
Telos Corporation |
Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment
|
US20040111643A1
(en)
*
|
2002-12-02 |
2004-06-10 |
Farmer Daniel G. |
System and method for providing an enterprise-based computer security policy
|
US7941854B2
(en)
*
|
2002-12-05 |
2011-05-10 |
International Business Machines Corporation |
Method and system for responding to a computer intrusion
|
US8122498B1
(en)
*
|
2002-12-12 |
2012-02-21 |
Mcafee, Inc. |
Combined multiple-application alert system and method
|
US8312535B1
(en)
|
2002-12-12 |
2012-11-13 |
Mcafee, Inc. |
System, method, and computer program product for interfacing a plurality of related applications
|
US8990723B1
(en)
|
2002-12-13 |
2015-03-24 |
Mcafee, Inc. |
System, method, and computer program product for managing a plurality of applications via a single interface
|
US8239941B1
(en)
|
2002-12-13 |
2012-08-07 |
Mcafee, Inc. |
Push alert system, method, and computer program product
|
US7913303B1
(en)
|
2003-01-21 |
2011-03-22 |
International Business Machines Corporation |
Method and system for dynamically protecting a computer system from attack
|
US7330889B2
(en)
*
|
2003-03-06 |
2008-02-12 |
Actional Corporation |
Network interaction analysis arrangement
|
US20040193918A1
(en)
*
|
2003-03-28 |
2004-09-30 |
Kenneth Green |
Apparatus and method for network vulnerability detection and compliance assessment
|
US8201256B2
(en)
*
|
2003-03-28 |
2012-06-12 |
Trustwave Holdings, Inc. |
Methods and systems for assessing and advising on electronic compliance
|
US8984644B2
(en)
|
2003-07-01 |
2015-03-17 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118710B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
System, method, and computer program product for reporting an occurrence in different manners
|
US9118711B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9350752B2
(en)
|
2003-07-01 |
2016-05-24 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118709B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Anti-vulnerability system, method, and computer program product
|
US9118708B2
(en)
|
2003-07-01 |
2015-08-25 |
Securityprofiling, Llc |
Multi-path remediation
|
US20070113272A2
(en)
|
2003-07-01 |
2007-05-17 |
Securityprofiling, Inc. |
Real-time vulnerability monitoring
|
US9100431B2
(en)
|
2003-07-01 |
2015-08-04 |
Securityprofiling, Llc |
Computer program product and apparatus for multi-path remediation
|
US7099797B1
(en)
|
2003-07-08 |
2006-08-29 |
Avanza Technologies, Inc. |
System and method of testing software and hardware in a reconfigurable instrumented network
|
US7765319B1
(en)
|
2003-07-30 |
2010-07-27 |
Gorman Sean P |
System and method for analyzing the structure of logical networks
|
US8042187B2
(en)
*
|
2003-08-25 |
2011-10-18 |
Hewlett-Packard Development Company, L.P. |
Security indication spanning tree system and method
|
US7519996B2
(en)
*
|
2003-08-25 |
2009-04-14 |
Hewlett-Packard Development Company, L.P. |
Security intrusion mitigation system and method
|
US7644365B2
(en)
*
|
2003-09-12 |
2010-01-05 |
Cisco Technology, Inc. |
Method and system for displaying network security incidents
|
US7657938B2
(en)
*
|
2003-10-28 |
2010-02-02 |
International Business Machines Corporation |
Method and system for protecting computer networks by altering unwanted network data traffic
|
KR100576720B1
(en)
*
|
2003-12-24 |
2006-05-03 |
한국전자통신연구원 |
Apparatus for managing security of IP based network
|
EP1716471B1
(en)
*
|
2004-02-11 |
2018-11-21 |
Entit Software LLC |
System and method for testing web applications with recursive discovery and analysis
|
US7765597B2
(en)
*
|
2004-02-11 |
2010-07-27 |
Hewlett-Packard Development Company, L.P. |
Integrated crawling and auditing of web applications and web content
|
US20060282494A1
(en)
*
|
2004-02-11 |
2006-12-14 |
Caleb Sima |
Interactive web crawling
|
US20050198058A1
(en)
*
|
2004-03-04 |
2005-09-08 |
International Business Machines Corporation |
Services offering delivery method
|
US7571181B2
(en)
*
|
2004-04-05 |
2009-08-04 |
Hewlett-Packard Development Company, L.P. |
Network usage analysis system and method for detecting network congestion
|
US20050234920A1
(en)
*
|
2004-04-05 |
2005-10-20 |
Lee Rhodes |
System, computer-usable medium and method for monitoring network activity
|
CN100401678C
(en)
*
|
2004-05-21 |
2008-07-09 |
华为技术有限公司 |
Network management method for VPN
|
JP4341517B2
(en)
*
|
2004-06-21 |
2009-10-07 |
日本電気株式会社 |
Security policy management system, security policy management method and program
|
US20060021046A1
(en)
*
|
2004-07-22 |
2006-01-26 |
Cook Chad L |
Techniques for determining network security
|
US7529195B2
(en)
|
2004-07-30 |
2009-05-05 |
Fortiusone, Inc. |
System and method of mapping and analyzing vulnerabilities in networks
|
US9436820B1
(en)
|
2004-08-02 |
2016-09-06 |
Cisco Technology, Inc. |
Controlling access to resources in a network
|
US7428754B2
(en)
*
|
2004-08-17 |
2008-09-23 |
The Mitre Corporation |
System for secure computing using defense-in-depth architecture
|
US20060075503A1
(en)
*
|
2004-09-13 |
2006-04-06 |
Achilles Guard, Inc. Dba Critical Watch |
Method and system for applying security vulnerability management process to an organization
|
US20060085852A1
(en)
*
|
2004-10-20 |
2006-04-20 |
Caleb Sima |
Enterprise assessment management
|
US9083748B2
(en)
*
|
2004-12-16 |
2015-07-14 |
Hewlett-Packard Development Company, L.P. |
Modelling network to assess security properties
|
US7607170B2
(en)
|
2004-12-22 |
2009-10-20 |
Radware Ltd. |
Stateful attack protection
|
US8850565B2
(en)
*
|
2005-01-10 |
2014-09-30 |
Hewlett-Packard Development Company, L.P. |
System and method for coordinating network incident response activities
|
US8590011B1
(en)
*
|
2005-02-24 |
2013-11-19 |
Versata Development Group, Inc. |
Variable domain resource data security for data processing systems
|
DE102005013286B3
(en)
*
|
2005-03-22 |
2006-09-14 |
Siemens Ag |
Method for detecting causes of faults and their transient effects on a technical system
|
WO2006102515A1
(en)
*
|
2005-03-23 |
2006-09-28 |
Belarc, Inc. |
Security control verification and monitoring subsystem for use in a computer information database system
|
US7574322B2
(en)
*
|
2005-05-10 |
2009-08-11 |
Microsoft Corporation |
Automated client device management
|
US7743421B2
(en)
|
2005-05-18 |
2010-06-22 |
Alcatel Lucent |
Communication network security risk exposure management systems and methods
|
US20070006315A1
(en)
*
|
2005-07-01 |
2007-01-04 |
Firas Bushnaq |
Network asset security risk surface assessment apparatus and method
|
US20070016960A1
(en)
*
|
2005-07-18 |
2007-01-18 |
Nt Objectives, Inc. |
NTO input validation technique
|
JP4890806B2
(en)
*
|
2005-07-27 |
2012-03-07 |
富士通株式会社 |
Prediction program and prediction device
|
US20070033276A1
(en)
*
|
2005-08-08 |
2007-02-08 |
Southern Company Services, Inc. |
Application portfolio and architecture research tool
|
CN100429890C
(en)
*
|
2005-09-05 |
2008-10-29 |
北京启明星辰信息技术有限公司 |
Visable positioning method and system for network safety event
|
US8095984B2
(en)
*
|
2005-09-22 |
2012-01-10 |
Alcatel Lucent |
Systems and methods of associating security vulnerabilities and assets
|
US8438643B2
(en)
*
|
2005-09-22 |
2013-05-07 |
Alcatel Lucent |
Information system service-level security risk analysis
|
US20070067845A1
(en)
*
|
2005-09-22 |
2007-03-22 |
Alcatel |
Application of cut-sets to network interdependency security risk assessment
|
US8544098B2
(en)
|
2005-09-22 |
2013-09-24 |
Alcatel Lucent |
Security vulnerability information aggregation
|
US8484250B2
(en)
*
|
2005-09-30 |
2013-07-09 |
Rockwell Automation Technologies, Inc. |
Data federation with industrial control systems
|
US7492716B1
(en)
*
|
2005-10-26 |
2009-02-17 |
Sanmina-Sci |
Method for efficiently retrieving topology-specific data for point-to-point networks
|
US7606420B1
(en)
*
|
2005-10-31 |
2009-10-20 |
Adobe Systems, Incorporated |
Method and apparatus for improving the speed of belief propagation
|
US20070143849A1
(en)
*
|
2005-12-19 |
2007-06-21 |
Eyal Adar |
Method and a software system for end-to-end security assessment for security and CIP professionals
|
US8392999B2
(en)
*
|
2005-12-19 |
2013-03-05 |
White Cyber Knight Ltd. |
Apparatus and methods for assessing and maintaining security of a computerized system under development
|
US7587675B2
(en)
*
|
2006-02-28 |
2009-09-08 |
Microsoft Corporation |
Network map
|
US8387138B2
(en)
|
2006-03-21 |
2013-02-26 |
At&T Intellectual Property I, L.P. |
Security scanning system and method
|
US8321944B1
(en)
*
|
2006-06-12 |
2012-11-27 |
Redseal Networks, Inc. |
Adaptive risk analysis methods and apparatus
|
US8561189B2
(en)
*
|
2006-06-23 |
2013-10-15 |
Battelle Memorial Institute |
Method and apparatus for distributed intrusion protection system for ultra high bandwidth networks
|
CN101001173B
(en)
*
|
2006-06-29 |
2010-08-18 |
华为技术有限公司 |
Method for estimating network protection status
|
US7681132B2
(en)
*
|
2006-07-13 |
2010-03-16 |
International Business Machines Corporation |
System, method and program product for visually presenting data describing network intrusions
|
WO2008031085A2
(en)
|
2006-09-08 |
2008-03-13 |
Fortiusone, Inc. |
System and method for web enabled geo-analytics and image processing
|
EP2074528A4
(en)
*
|
2006-09-12 |
2012-04-04 |
Telcordia Tech Inc |
Ip network vulnerability and policy compliance assessment by ip device analysis
|
US7849497B1
(en)
*
|
2006-12-14 |
2010-12-07 |
Athena Security, Inc. |
Method and system for analyzing the security of a network
|
US7937353B2
(en)
*
|
2007-01-15 |
2011-05-03 |
International Business Machines Corporation |
Method and system for determining whether to alter a firewall configuration
|
US7908660B2
(en)
*
|
2007-02-06 |
2011-03-15 |
Microsoft Corporation |
Dynamic risk management
|
EP2122490B1
(en)
|
2007-02-13 |
2020-11-25 |
ESRI Technologies, LLC |
A method and system for integrating a social network and data repository to enable map creation
|
US8122729B2
(en)
*
|
2007-03-13 |
2012-02-28 |
Dri-Eaz Products, Inc. |
Dehumidification systems and methods for extracting moisture from water damaged structures
|
WO2009054056A1
(en)
|
2007-10-25 |
2009-04-30 |
Fujitsu Limited |
Information providing method, relay method, information holding device and relay device
|
US20090178131A1
(en)
*
|
2008-01-08 |
2009-07-09 |
Microsoft Corporation |
Globally distributed infrastructure for secure content management
|
US8266518B2
(en)
*
|
2008-01-16 |
2012-09-11 |
Raytheon Company |
Anti-tamper process toolset
|
US8990947B2
(en)
*
|
2008-02-04 |
2015-03-24 |
Microsoft Technology Licensing, Llc |
Analytics engine
|
JP5182361B2
(en)
*
|
2008-03-17 |
2013-04-17 |
富士通株式会社 |
Information acquisition support device
|
US8176560B2
(en)
*
|
2008-05-14 |
2012-05-08 |
International Business Machines Corporation |
Evaluation of tamper resistant software system implementations
|
US8910255B2
(en)
*
|
2008-05-27 |
2014-12-09 |
Microsoft Corporation |
Authentication for distributed secure content management system
|
US9069774B1
(en)
*
|
2008-11-04 |
2015-06-30 |
Infoblox Inc. |
Graphical visualization and management of networks
|
US8925039B2
(en)
*
|
2009-12-14 |
2014-12-30 |
At&T Intellectual Property I, L.P. |
System and method of selectively applying security measures to data services
|
US20110153391A1
(en)
*
|
2009-12-21 |
2011-06-23 |
Michael Tenbrock |
Peer-to-peer privacy panel for audience measurement
|
US20130232198A1
(en)
*
|
2009-12-21 |
2013-09-05 |
Arbitron Inc. |
System and Method for Peer-to-Peer Distribution of Media Exposure Data
|
KR101056268B1
(en)
*
|
2010-01-25 |
2011-08-11 |
주식회사 반딧불소프트웨어 |
Security check system and method for a terminal device capable of computer communication
|
US9483745B2
(en)
*
|
2010-11-03 |
2016-11-01 |
Sap Se |
Business network GUI
|
CN102591626B
(en)
*
|
2011-01-11 |
2015-11-25 |
腾讯科技(深圳)有限公司 |
A kind of window display method of security classes software and device
|
US8800045B2
(en)
*
|
2011-02-11 |
2014-08-05 |
Achilles Guard, Inc. |
Security countermeasure management platform
|
US9553948B2
(en)
*
|
2011-05-05 |
2017-01-24 |
Vmware, Inc. |
User interface for managing monitoring profiles
|
CN102624696B
(en)
*
|
2011-12-27 |
2014-11-05 |
中国航天科工集团第二研究院七〇六所 |
Network security situation evaluation method
|
WO2013149337A1
(en)
|
2012-04-02 |
2013-10-10 |
Hydrogenics Corporation |
Fuel cell start up method
|
WO2014103308A1
(en)
*
|
2012-12-28 |
2014-07-03 |
パナソニック株式会社 |
Control method
|
US9571372B1
(en)
*
|
2013-01-24 |
2017-02-14 |
Symantec Corporation |
Systems and methods for estimating ages of network devices
|
US8973134B2
(en)
*
|
2013-05-14 |
2015-03-03 |
International Business Machines Corporation |
Software vulnerability notification via icon decorations
|
US9367694B2
(en)
*
|
2014-05-16 |
2016-06-14 |
Raytheon Bbn Technologies Corp. |
Probabilistic cyber threat recognition and prediction
|
KR101646329B1
(en)
*
|
2014-05-30 |
2016-08-09 |
한국통신인터넷기술 주식회사 |
Cyber attack response and analysis system and method thereof
|
US9819685B1
(en)
|
2014-12-10 |
2017-11-14 |
State Farm Mutual Automobile Insurance Company |
Method and system for identifying security risks using graph analysis
|
US9467455B2
(en)
|
2014-12-29 |
2016-10-11 |
Palantir Technologies Inc. |
Systems for network risk assessment including processing of user access rights associated with a network of devices
|
US9648036B2
(en)
*
|
2014-12-29 |
2017-05-09 |
Palantir Technologies Inc. |
Systems for network risk assessment including processing of user access rights associated with a network of devices
|
US9100430B1
(en)
|
2014-12-29 |
2015-08-04 |
Palantir Technologies Inc. |
Systems for network risk assessment including processing of user access rights associated with a network of devices
|
US10184974B2
(en)
|
2015-09-22 |
2019-01-22 |
Raytheon Company |
Systems and methods for determining whether a circuit is operating properly
|
EP3360043A4
(en)
|
2015-10-08 |
2019-04-24 |
Siege Technologies LLC |
Assessing effectiveness of cybersecurity technologies
|
ES2832999T3
(en)
*
|
2015-12-14 |
2021-06-14 |
Siemens Ag |
System and procedure for passive evaluation of industrial perimeter security
|
US10102376B2
(en)
|
2016-08-22 |
2018-10-16 |
International Business Machines Corporation |
Implementing locale management on PaaS: locale replacement risk analysis
|
CA3044909C
(en)
|
2016-11-25 |
2023-06-27 |
Cybernetiq, Inc. |
Computer network security configuration visualization and control system
|
US10686669B2
(en)
*
|
2017-06-16 |
2020-06-16 |
Cisco Technology, Inc. |
Collecting network models and node information from a network
|
US10706156B2
(en)
*
|
2017-10-13 |
2020-07-07 |
1230604 BC Ltd. |
Security risk identification in a secure software lifecycle
|
US10846410B2
(en)
*
|
2017-12-21 |
2020-11-24 |
Microsoft Technology Licensing, Llc |
Automated fuzzing based on analysis of application execution flow
|
CN109981346B
(en)
*
|
2019-02-21 |
2020-07-10 |
清华大学 |
Network space coordinate system creating method and device based on autonomous system
|
US11734636B2
(en)
|
2019-02-27 |
2023-08-22 |
University Of Maryland, College Park |
System and method for assessing, measuring, managing, and/or optimizing cyber risk
|
US10644943B1
(en)
*
|
2019-03-27 |
2020-05-05 |
Juniper Networks, Inc. |
Multilayer and interactive user interfaces for displaying features of an optimized network plan
|
US11720686B1
(en)
*
|
2020-04-08 |
2023-08-08 |
Wells Fargo Bank, N.A. |
Security model utilizing multi-channel data with risk-entity facing cybersecurity alert engine and portal
|
US11777992B1
(en)
|
2020-04-08 |
2023-10-03 |
Wells Fargo Bank, N.A. |
Security model utilizing multi-channel data
|
US11706241B1
(en)
|
2020-04-08 |
2023-07-18 |
Wells Fargo Bank, N.A. |
Security model utilizing multi-channel data
|
CN114500015B
(en)
*
|
2022-01-14 |
2024-02-27 |
北京网藤科技有限公司 |
Situation awareness system based on industrial network and control method thereof
|