Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance

P Khemani, V Bandekar - US Patent 7,865,589, 2011 - Google Patents
US7865589B2 - Systems and methods for providing structured policy expressions to represent
unstructured data in a network appliance - Google Patents US7865589B2 - Systems and …

Systems and methods for configuring policy bank invocations

P Khemani, V Bandekar - US Patent 8,341,287, 2012 - Google Patents
6,611,822 B 1 8/2003 Beams et al. 2002/0034173 A1 3/2002 Border et al. 6,615,166 B1
9/2003 Guheen et al. 2002/0098840 A1 7/2002 Hanson et al. 6,615,199 B1 9/2003 Bowman …

Systems and methods for managing application security profiles

N Sikka, A Reddy, R Mirani, A Chauhan - US Patent 8,490,148, 2013 - Google Patents
Systems and methods for configuring and evaluating policies that direct processing of one or
more data streams are described. A configuration interface is described for allowing users to …

A Survey on Energy-Aware Security Mechanisms for the Internet of Things

P He, Y Zhou, X Qin - Future Internet, 2024 - mdpi.com
The Internet of Things (IoT) employs sensors and the Internet for information exchange,
enabling intelligent identification, monitoring, and management, which has deeply impacted …

Systems and methods for configuring flow control of policy expressions

P Khemani, V Bandekar - US Patent 7,853,678, 2010 - Google Patents
5,057,996 A 10, 1991 Cutler et al. 5,187,790 A 2f1993 East et al. 5,204.897 A 4/1993
Wyman 5,297.283 A 3/1994 Kelly, Jr. et al. 5.426, 637 A 6/1995 Derby et al. 5,729,710 A …

Fuzzy logic aided intelligent threat detection in cisco adaptive security appliance 5500 series firewalls

N Naik, P Jenkins, B Kerby, J Sloane… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Cisco Adaptive Security Appliance (ASA) 5500 Series Firewall is amongst the most popular
and technically advanced for securing organisational networks and systems. One of its most …

Efficient packet capture for cyber threat analysis

DK Ahn, S Moore - US Patent 11,729,144, 2023 - Google Patents
Methods, systems, and computer-readable media for efficiently detecting threat incidents for
cyber threat analysis are described herein. In various embodiments, a computing device …

Systems and methods for configuring policy bank invocations

P Khemani, V Bandekar - US Patent 8,631,147, 2014 - Google Patents
Abstract Systems and methods for configuring and evaluating policies that direct processing
of one or more data streams are described. A configuration interface is described for …

Systems and methods for using object oriented expressions to configure application security policies

V Korrapati, P Khemani, R Mirani… - US Patent 7,870,277, 2011 - Google Patents
5,057,996 A 10, 1991 Cutler et al. 5,187,790 A 2f1993 East et al. 5,204.897 A 4/1993
Wyman 5,297.283 A 3/1994 Kelly, Jr. et al. 5,729,710 A 3/1998 Magee et al. 5,911,051 A 6 …

A theoretical model for analysis of firewalls under bursty traffic flows

Y Shahsavari, H Shahhoseini, K Zhang… - IEEE Access, 2019 - ieeexplore.ieee.org
Firewalls are located at the front line of the network against outside threats. Performance
modeling and analysis of network firewalls help to better understand their behavior and …