Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses M Vincent, A Mesdaq, E Thioux, A Singh, S Vashisht US Patent 9,171,160, 2015 | 351 | 2015 |
Systems and methods for automatically detecting backdoors A Singh, J Manni US Patent 8,990,944, 2015 | 292 | 2015 |
Multiphase threat analysis and correlation engine A Singh US Patent 10,270,789, 2019 | 258 | 2019 |
Detecting bootkits resident on compromised computers MM Vincent, A Singh, M Amin, Z Bu US Patent 9,251,343, 2016 | 228 | 2016 |
Framework for classifying an object as malicious with machine learning for deploying updated predictive models A Singh, A Mesdaq, A Das, V Jain US Patent 9,690,933, 2017 | 205 | 2017 |
Detecting malware based on reflection V Jain, A Singh US Patent 9,594,904, 2017 | 180 | 2017 |
Multistage system and method for analyzing obfuscated content for malware A Malik, S Deshpande, A Singh, W Zheng US Patent 9,690,936, 2017 | 170 | 2017 |
Malicious message analysis system A Singh US Patent 10,050,998, 2018 | 166 | 2018 |
Cyber attack early warning system D Mehra, A Singh US Patent 9,825,989, 2017 | 165 | 2017 |
System, apparatus and method for classifying a file as malicious using static scanning A Singh, Y Lin, A Mukherjee, Z Bu US Patent 10,192,052, 2019 | 163 | 2019 |
Detection and classification of exploit kits JL Gomez, A Singh US Patent 9,825,976, 2017 | 162 | 2017 |
Malware analysis in accordance with an analysis plan M Vincent, A Mesdaq, E Thioux, A Singh, S Vashisht US Patent 9,910,988, 2018 | 149 | 2018 |
Infiltration Detection and Network Rerouting E Thioux, A Singh US Patent App. 15/438,573, 2017 | 116 | 2017 |
Secure authentication of a user to a system and secure operation thereafter A Singh US Patent 7,084,734, 2006 | 104 | 2006 |
FireWall Policies and VPN configurations JD Dale Liu, Stephanie Miller ,Mark Lucas ,Abhishek Syngress, 2006 | 82* | 2006 |
Detection of credential spearphishing attacks using email analysis A Mesdaq, A Singh, V Jain US Patent 10,601,865, 2020 | 78 | 2020 |
Binary code change vulnerability prioritization A Singh, T Ganacharya, S Lambert US Patent 8,479,188, 2013 | 62 | 2013 |
Malicious ICMP tunneling: Defense against the vulnerability A Singh, O Nordström, C Lu, ALM Dos Santos Information Security and Privacy: 8th Australasian Conference, ACISP 2003 …, 2003 | 50 | 2003 |
Effects of Ti-incorporation in CuInS2 solar cells B Marsen, L Steinkopf, A Singh, H Wilhelm, I Lauermann, T Unold, ... Solar energy materials and solar cells 94 (10), 1730-1733, 2010 | 41 | 2010 |
Using high-interaction networks for targeted threat intelligence A Singh, S Gukal US Patent 10,230,745, 2019 | 36 | 2019 |