Graph-based network security threat detection across time and entities
G Apostolopoulos - US Patent 10,205,735, 2019 - Google Patents
The disclosed techniques relate to a graph-based network security analytic framework to
combine multiple sources of information and security knowledge in order to detect risky …
combine multiple sources of information and security knowledge in order to detect risky …
Malware communications detection
S Muddu, C Tryfonas, JA Zadeh, AB Bond… - US Patent …, 2019 - Google Patents
A security platform employs a variety techniques and mechanisms to detect security related
anomalies and threats in a computer network environment. The security platform is “big …
anomalies and threats in a computer network environment. The security platform is “big …
Graph-based network anomaly detection across time and entities
G Apostolopoulos - US Patent 10,609,059, 2020 - Google Patents
The disclosed techniques relate to a graph-based network security analytic framework to
combine multiple sources of information and security knowledge in order to detect risky …
combine multiple sources of information and security knowledge in order to detect risky …
Science and the market for technology
Well-functioning markets for technology (MFT) allow inventors to sell their inventions to
others that may derive more value from them. We argue that the growing use of science in …
others that may derive more value from them. We argue that the growing use of science in …
Detecting anomalies in a computer network based on usage similarity scores
S Muddu, C Tryfonas, F Lam… - US Patent …, 2021 - Google Patents
US10911470B2 - Detecting anomalies in a computer network based on usage similarity scores
- Google Patents US10911470B2 - Detecting anomalies in a computer network based on usage …
- Google Patents US10911470B2 - Detecting anomalies in a computer network based on usage …
Lateral movement detection for network security analysis
S Muddu, C Tryfonas, F Lam… - US Patent …, 2019 - Google Patents
A security platform employs a variety techniques and mechanisms to detect security related
anomalies and threats in a computer network environment. The security platform is “big …
anomalies and threats in a computer network environment. The security platform is “big …
Anomaly detection based on connection requests in network traffic
S Muddu, C Tryfonas, M Iliofotou - US Patent 10,587,633, 2020 - Google Patents
US10587633B2 - Anomaly detection based on connection requests in network traffic -
Google Patents US10587633B2 - Anomaly detection based on connection requests in …
Google Patents US10587633B2 - Anomaly detection based on connection requests in …
Model workflow control in a distributed computation system
S Muddu, C Tryfonas, S Kavacheri - US Patent 10,581,881, 2020 - Google Patents
US10581881B2 - Model workflow control in a distributed computation system - Google
Patents US10581881B2 - Model workflow control in a distributed computation system …
Patents US10581881B2 - Model workflow control in a distributed computation system …
Network security anomaly and threat detection using rarity scoring
S Muddu, C Tryfonas, Y Li - US Patent 11,470,096, 2022 - Google Patents
A security platform employs a variety techniques and mechanisms to detect security related
anomalies and threats in a computer network environment. The security platform is “big …
anomalies and threats in a computer network environment. The security platform is “big …
Window-based rarity determination using probabilistic suffix trees for network security analysis
S Muddu, C Tryfonas, M Iliofotou - US Patent 10,560,468, 2020 - Google Patents
US10560468B2 - Window-based rarity determination using probabilistic suffix trees for network
security analysis - Google Patents US10560468B2 - Window-based rarity determination using …
security analysis - Google Patents US10560468B2 - Window-based rarity determination using …