Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance
P Khemani, V Bandekar - US Patent 7,865,589, 2011 - Google Patents
US7865589B2 - Systems and methods for providing structured policy expressions to represent
unstructured data in a network appliance - Google Patents US7865589B2 - Systems and …
unstructured data in a network appliance - Google Patents US7865589B2 - Systems and …
Systems and methods for configuring policy bank invocations
P Khemani, V Bandekar - US Patent 8,341,287, 2012 - Google Patents
6,611,822 B 1 8/2003 Beams et al. 2002/0034173 A1 3/2002 Border et al. 6,615,166 B1
9/2003 Guheen et al. 2002/0098840 A1 7/2002 Hanson et al. 6,615,199 B1 9/2003 Bowman …
9/2003 Guheen et al. 2002/0098840 A1 7/2002 Hanson et al. 6,615,199 B1 9/2003 Bowman …
Systems and methods for managing application security profiles
N Sikka, A Reddy, R Mirani, A Chauhan - US Patent 8,490,148, 2013 - Google Patents
Systems and methods for configuring and evaluating policies that direct processing of one or
more data streams are described. A configuration interface is described for allowing users to …
more data streams are described. A configuration interface is described for allowing users to …
A Survey on Energy-Aware Security Mechanisms for the Internet of Things
The Internet of Things (IoT) employs sensors and the Internet for information exchange,
enabling intelligent identification, monitoring, and management, which has deeply impacted …
enabling intelligent identification, monitoring, and management, which has deeply impacted …
Systems and methods for configuring flow control of policy expressions
P Khemani, V Bandekar - US Patent 7,853,678, 2010 - Google Patents
5,057,996 A 10, 1991 Cutler et al. 5,187,790 A 2f1993 East et al. 5,204.897 A 4/1993
Wyman 5,297.283 A 3/1994 Kelly, Jr. et al. 5.426, 637 A 6/1995 Derby et al. 5,729,710 A …
Wyman 5,297.283 A 3/1994 Kelly, Jr. et al. 5.426, 637 A 6/1995 Derby et al. 5,729,710 A …
Fuzzy logic aided intelligent threat detection in cisco adaptive security appliance 5500 series firewalls
Cisco Adaptive Security Appliance (ASA) 5500 Series Firewall is amongst the most popular
and technically advanced for securing organisational networks and systems. One of its most …
and technically advanced for securing organisational networks and systems. One of its most …
Efficient packet capture for cyber threat analysis
DK Ahn, S Moore - US Patent 11,729,144, 2023 - Google Patents
Methods, systems, and computer-readable media for efficiently detecting threat incidents for
cyber threat analysis are described herein. In various embodiments, a computing device …
cyber threat analysis are described herein. In various embodiments, a computing device …
Systems and methods for configuring policy bank invocations
P Khemani, V Bandekar - US Patent 8,631,147, 2014 - Google Patents
Abstract Systems and methods for configuring and evaluating policies that direct processing
of one or more data streams are described. A configuration interface is described for …
of one or more data streams are described. A configuration interface is described for …
Systems and methods for using object oriented expressions to configure application security policies
V Korrapati, P Khemani, R Mirani… - US Patent 7,870,277, 2011 - Google Patents
5,057,996 A 10, 1991 Cutler et al. 5,187,790 A 2f1993 East et al. 5,204.897 A 4/1993
Wyman 5,297.283 A 3/1994 Kelly, Jr. et al. 5,729,710 A 3/1998 Magee et al. 5,911,051 A 6 …
Wyman 5,297.283 A 3/1994 Kelly, Jr. et al. 5,729,710 A 3/1998 Magee et al. 5,911,051 A 6 …
A theoretical model for analysis of firewalls under bursty traffic flows
Firewalls are located at the front line of the network against outside threats. Performance
modeling and analysis of network firewalls help to better understand their behavior and …
modeling and analysis of network firewalls help to better understand their behavior and …