US7389351B2
(en)
*
|
2001-03-15 |
2008-06-17 |
Microsoft Corporation |
System and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts
|
US7565692B1
(en)
|
2000-05-30 |
2009-07-21 |
At&T Wireless Services, Inc. |
Floating intrusion detection platforms
|
AU2002230541B2
(en)
|
2000-11-30 |
2007-08-23 |
Cisco Technology, Inc. |
Flow-based detection of network intrusions
|
US7325252B2
(en)
|
2001-05-18 |
2008-01-29 |
Achilles Guard Inc. |
Network security testing
|
US20090138342A1
(en)
|
2001-11-14 |
2009-05-28 |
Retaildna, Llc |
Method and system for providing an employee award using artificial intelligence
|
US7225343B1
(en)
|
2002-01-25 |
2007-05-29 |
The Trustees Of Columbia University In The City Of New York |
System and methods for adaptive model generation for detecting intrusions in computer systems
|
US8132250B2
(en)
|
2002-03-08 |
2012-03-06 |
Mcafee, Inc. |
Message profiling systems and methods
|
EP1349081A1
(en)
|
2002-03-28 |
2003-10-01 |
LION Bioscience AG |
Method and apparatus for querying relational databases
|
US7496628B2
(en)
|
2003-02-25 |
2009-02-24 |
Susquehanna International Group, Llp |
Electronic message filter
|
US20040221171A1
(en)
*
|
2003-05-02 |
2004-11-04 |
Ahmed Ahmed Awad E. |
Intrusion detector based on mouse dynamics analysis
|
US8990928B1
(en)
|
2003-12-11 |
2015-03-24 |
Radix Holdings, Llc |
URL salience
|
US7392278B2
(en)
|
2004-01-23 |
2008-06-24 |
Microsoft Corporation |
Building and using subwebs for focused search
|
US8561177B1
(en)
|
2004-04-01 |
2013-10-15 |
Fireeye, Inc. |
Systems and methods for detecting communication channels of bots
|
US8539582B1
(en)
|
2004-04-01 |
2013-09-17 |
Fireeye, Inc. |
Malware containment and security analysis on connection
|
US8528086B1
(en)
|
2004-04-01 |
2013-09-03 |
Fireeye, Inc. |
System and method of detecting computer worms
|
US7953814B1
(en)
|
2005-02-28 |
2011-05-31 |
Mcafee, Inc. |
Stopping and remediating outbound messaging abuse
|
US8255532B2
(en)
|
2004-09-13 |
2012-08-28 |
Cisco Technology, Inc. |
Metric-based monitoring and control of a limited resource
|
US7540025B2
(en)
|
2004-11-18 |
2009-05-26 |
Cisco Technology, Inc. |
Mitigating network attacks using automatic signature generation
|
US20060253582A1
(en)
|
2005-05-03 |
2006-11-09 |
Dixon Christopher J |
Indicating website reputations within search results
|
JP5118020B2
(en)
|
2005-05-05 |
2013-01-16 |
シスコ アイアンポート システムズ エルエルシー |
Identifying threats in electronic messages
|
US7609625B2
(en)
|
2005-07-06 |
2009-10-27 |
Fortinet, Inc. |
Systems and methods for detecting and preventing flooding attacks in a network environment
|
US7730040B2
(en)
|
2005-07-27 |
2010-06-01 |
Microsoft Corporation |
Feedback-driven malware detector
|
US7707284B2
(en)
|
2005-08-03 |
2010-04-27 |
Novell, Inc. |
System and method of searching for classifying user activity performed on a computer system
|
KR20070049514A
(en)
|
2005-11-08 |
2007-05-11 |
한국정보보호진흥원 |
Malignant code monitor system and monitoring method using thereof
|
US8650080B2
(en)
|
2006-04-10 |
2014-02-11 |
International Business Machines Corporation |
User-browser interaction-based fraud detection system
|
EP2005698B1
(en)
|
2006-04-13 |
2012-01-04 |
Art of Defence GmbH |
Method for providing web application security
|
US7984500B1
(en)
|
2006-10-05 |
2011-07-19 |
Amazon Technologies, Inc. |
Detecting fraudulent activity by analysis of information requests
|
US7865953B1
(en)
|
2007-05-31 |
2011-01-04 |
Trend Micro Inc. |
Methods and arrangement for active malicious web pages discovery
|
US8238669B2
(en)
|
2007-08-22 |
2012-08-07 |
Google Inc. |
Detection and classification of matches between time-based media
|
US7958555B1
(en)
|
2007-09-28 |
2011-06-07 |
Trend Micro Incorporated |
Protecting computer users from online frauds
|
US9779403B2
(en)
|
2007-12-07 |
2017-10-03 |
Jpmorgan Chase Bank, N.A. |
Mobile fraud prevention system and method
|
WO2009106998A1
(en)
|
2008-02-28 |
2009-09-03 |
Ipharro Media Gmbh |
Frame sequence comparison in multimedia streams
|
US8082187B2
(en)
|
2008-05-07 |
2011-12-20 |
AcademixDirect, Inc. |
Method of generating a referral website URL using website listings in a cookie
|
US8856937B1
(en)
|
2008-06-27 |
2014-10-07 |
Symantec Corporation |
Methods and systems for identifying fraudulent websites
|
US10027688B2
(en)
|
2008-08-11 |
2018-07-17 |
Damballa, Inc. |
Method and system for detecting malicious and/or botnet-related domain names
|
US8086480B2
(en)
|
2008-09-25 |
2011-12-27 |
Ebay Inc. |
Methods and systems for activity-based recommendations
|
US8850571B2
(en)
|
2008-11-03 |
2014-09-30 |
Fireeye, Inc. |
Systems and methods for detecting malicious network content
|
US8448245B2
(en)
|
2009-01-17 |
2013-05-21 |
Stopthehacker.com, Jaal LLC |
Automated identification of phishing, phony and malicious web sites
|
US8695091B2
(en)
|
2009-02-11 |
2014-04-08 |
Sophos Limited |
Systems and methods for enforcing policies for proxy website detection using advertising account ID
|
WO2010105184A2
(en)
|
2009-03-13 |
2010-09-16 |
Breach Security , Inc. |
A method and apparatus for phishing and leeching vulnerability detection
|
US8607340B2
(en)
*
|
2009-07-21 |
2013-12-10 |
Sophos Limited |
Host intrusion prevention system using software and user behavior analysis
|
US8229219B1
(en)
|
2009-08-06 |
2012-07-24 |
Google Inc. |
Full-length video fingerprinting
|
US8600993B1
(en)
|
2009-08-26 |
2013-12-03 |
Google Inc. |
Determining resource attributes from site address attributes
|
US8396857B2
(en)
|
2009-08-31 |
2013-03-12 |
Accenture Global Services Limited |
System to modify websites for organic search optimization
|
EP2323046A1
(en)
|
2009-10-16 |
2011-05-18 |
Telefónica, S.A. |
Method for detecting audio and video copy in multimedia streams
|
US8625033B1
(en)
|
2010-02-01 |
2014-01-07 |
Google Inc. |
Large-scale matching of audio and video
|
US9501644B2
(en)
|
2010-03-15 |
2016-11-22 |
F-Secure Oyj |
Malware protection
|
US8612463B2
(en)
|
2010-06-03 |
2013-12-17 |
Palo Alto Research Center Incorporated |
Identifying activities using a hybrid user-activity model
|
US8260914B1
(en)
|
2010-06-22 |
2012-09-04 |
Narus, Inc. |
Detecting DNS fast-flux anomalies
|
RU2446459C1
(en)
|
2010-07-23 |
2012-03-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method for checking web resources for presence of malicious components
|
US20130074187A1
(en)
|
2010-07-26 |
2013-03-21 |
Ki Yong Kim |
Hacker virus security-integrated control device
|
US8924488B2
(en)
|
2010-07-27 |
2014-12-30 |
At&T Intellectual Property I, L.P. |
Employing report ratios for intelligent mobile messaging classification and anti-spam defense
|
BR112013004345B1
(en)
|
2010-08-25 |
2020-12-08 |
Lookout, Inc. |
system and method to avoid malware attached to a server
|
AU2011293160B2
(en)
|
2010-08-26 |
2015-04-09 |
Verisign, Inc. |
Method and system for automatic detection and analysis of malware
|
US8837769B2
(en)
|
2010-10-06 |
2014-09-16 |
Futurewei Technologies, Inc. |
Video signature based on image hashing and shot detection
|
US9626677B2
(en)
*
|
2010-11-29 |
2017-04-18 |
Biocatch Ltd. |
Identification of computerized bots, and identification of automated cyber-attack modules
|
US8521667B2
(en)
|
2010-12-15 |
2013-08-27 |
Microsoft Corporation |
Detection and categorization of malicious URLs
|
CN102082792A
(en)
|
2010-12-31 |
2011-06-01 |
成都市华为赛门铁克科技有限公司 |
Phishing webpage detection method and device
|
US8972412B1
(en)
|
2011-01-31 |
2015-03-03 |
Go Daddy Operating Company, LLC |
Predicting improvement in website search engine rankings based upon website linking relationships
|
US8726376B2
(en)
|
2011-03-11 |
2014-05-13 |
Openet Telecom Ltd. |
Methods, systems and devices for the detection and prevention of malware within a network
|
US8402543B1
(en)
|
2011-03-25 |
2013-03-19 |
Narus, Inc. |
Machine learning based botnet detection with dynamic adaptation
|
RU107616U1
(en)
|
2011-03-28 |
2011-08-20 |
Закрытое акционерное общество "Лаборатория Касперского" |
SYSTEM OF QUICK ANALYSIS OF DATA STREAM ON THE AVAILABILITY OF MALICIOUS OBJECTS
|
US9363278B2
(en)
|
2011-05-11 |
2016-06-07 |
At&T Mobility Ii Llc |
Dynamic and selective response to cyber attack for telecommunications carrier networks
|
US8151341B1
(en)
|
2011-05-23 |
2012-04-03 |
Kaspersky Lab Zao |
System and method for reducing false positives during detection of network attacks
|
US8555388B1
(en)
|
2011-05-24 |
2013-10-08 |
Palo Alto Networks, Inc. |
Heuristic botnet detection
|
CA2840992C
(en)
|
2011-07-08 |
2017-03-14 |
Brad WARDMAN |
Syntactical fingerprinting
|
US20140173287A1
(en)
|
2011-07-11 |
2014-06-19 |
Takeshi Mizunuma |
Identifier management method and system
|
GB2493514B
(en)
|
2011-08-02 |
2015-04-08 |
Qatar Foundation |
Copy detection
|
US8677472B1
(en)
*
|
2011-09-27 |
2014-03-18 |
Emc Corporation |
Multi-point collection of behavioral data relating to a virtualized browsing session with a secure server
|
US8645355B2
(en)
|
2011-10-21 |
2014-02-04 |
Google Inc. |
Mapping Uniform Resource Locators of different indexes
|
US8584235B2
(en)
|
2011-11-02 |
2013-11-12 |
Bitdefender IPR Management Ltd. |
Fuzzy whitelisting anti-malware systems and methods
|
US9519781B2
(en)
|
2011-11-03 |
2016-12-13 |
Cyphort Inc. |
Systems and methods for virtualization and emulation assisted malware detection
|
RU2487406C1
(en)
|
2011-11-24 |
2013-07-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of detecting malicious entities distributed over peer-to-peer networks
|
US8660296B1
(en)
|
2012-01-10 |
2014-02-25 |
Google Inc. |
Systems and methods for facilitating video fingerprinting using local descriptors
|
US9111090B2
(en)
|
2012-04-02 |
2015-08-18 |
Trusteer, Ltd. |
Detection of phishing attempts
|
RU2523114C2
(en)
|
2012-04-06 |
2014-07-20 |
Закрытое акционерное общество "Лаборатория Касперского" |
Method of analysing malicious activity on internet, detecting malicious network nodes and neighbouring intermediate nodes
|
US10304036B2
(en)
|
2012-05-07 |
2019-05-28 |
Nasdaq, Inc. |
Social media profiling for one or more authors using one or more social media platforms
|
RU2488880C1
(en)
|
2012-05-11 |
2013-07-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of adaptive optimisation of inspection of data flow sent in network for availability of threats
|
US9154517B2
(en)
|
2012-06-19 |
2015-10-06 |
AO Kaspersky Lab |
System and method for preventing spread of malware in peer-to-peer network
|
EP2877956B1
(en)
|
2012-07-24 |
2019-07-17 |
Webroot Inc. |
System and method to provide automatic classification of phishing sites
|
RU2495486C1
(en)
|
2012-08-10 |
2013-10-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
Method of analysing and detecting malicious intermediate nodes in network
|
CN103685174B
(en)
|
2012-09-07 |
2016-12-21 |
中国科学院计算机网络信息中心 |
A kind of detection method for phishing site of independent of sample
|
US9386030B2
(en)
|
2012-09-18 |
2016-07-05 |
Vencore Labs, Inc. |
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
|
US9215239B1
(en)
|
2012-09-28 |
2015-12-15 |
Palo Alto Networks, Inc. |
Malware detection based on traffic analysis
|
US10965775B2
(en)
|
2012-11-20 |
2021-03-30 |
Airbnb, Inc. |
Discovering signature of electronic social networks
|
RU2536664C2
(en)
|
2012-12-25 |
2014-12-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method for automatic modification of antivirus database
|
RU2530210C2
(en)
*
|
2012-12-25 |
2014-10-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method for detecting malware preventing standard user interaction with operating system interface
|
RU2522019C1
(en)
|
2012-12-25 |
2014-07-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of detecting threat in code executed by virtual machine
|
RU129279U1
(en)
|
2013-01-09 |
2013-06-20 |
ОБЩЕСТВО С ОГРАНИЧЕННОЙ ОТВЕТСТВЕННОСТЬЮ "МФИ Софт" |
DEVICE FOR DETECTION AND PROTECTION AGAINST ANOMALOUS ACTIVITY ON DATA TRANSMISSION NETWORKS
|
US20160127402A1
(en)
|
2014-11-04 |
2016-05-05 |
Patternex, Inc. |
Method and apparatus for identifying and detecting threats to an enterprise or e-commerce system
|
US10425429B2
(en)
|
2013-04-10 |
2019-09-24 |
Gabriel Bassett |
System and method for cyber security analysis and human behavior prediction
|
GB201306628D0
(en)
|
2013-04-11 |
2013-05-29 |
F Secure Oyj |
Detecting and marking client devices
|
EP2901665A4
(en)
|
2013-05-13 |
2015-10-21 |
Yandex Europe Ag |
Method of and system for providing a client device with an automatic update of an ip address associated with a domain name
|
US9357469B2
(en)
|
2013-05-29 |
2016-05-31 |
Rivada Networks, Llc |
Methods and system for dynamic spectrum arbitrage with mobility management
|
US9443075B2
(en)
|
2013-06-27 |
2016-09-13 |
The Mitre Corporation |
Interception and policy application for malicious communications
|
CN103368958A
(en)
|
2013-07-05 |
2013-10-23 |
腾讯科技(深圳)有限公司 |
Method, device and system for detecting webpage
|
RU2538292C1
(en)
|
2013-07-24 |
2015-01-10 |
Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" |
Method of detecting computer attacks to networked computer system
|
KR102120823B1
(en)
|
2013-08-14 |
2020-06-09 |
삼성전자주식회사 |
Method of controlling read sequence of nov-volatile memory device and memory system performing the same
|
CN103491205B
(en)
|
2013-09-30 |
2016-08-17 |
北京奇虎科技有限公司 |
The method for pushing of a kind of correlated resources address based on video search and device
|
US9330258B1
(en)
|
2013-09-30 |
2016-05-03 |
Symantec Corporation |
Systems and methods for identifying uniform resource locators that link to potentially malicious resources
|
CA2924764C
(en)
|
2013-10-21 |
2020-03-10 |
Microsoft Technology Licensing, Llc |
Mobile video search
|
GB2520987B
(en)
|
2013-12-06 |
2016-06-01 |
Cyberlytic Ltd |
Using fuzzy logic to assign a risk level profile to a potential cyber threat
|
IN2013CH05744A
(en)
|
2013-12-12 |
2015-06-19 |
Infosys Ltd |
|
US20150363791A1
(en)
|
2014-01-10 |
2015-12-17 |
Hybrid Application Security Ltd. |
Business action based fraud detection system and method
|
US9060018B1
(en)
|
2014-02-05 |
2015-06-16 |
Pivotal Software, Inc. |
Finding command and control center computers by communication link tracking
|
US9262635B2
(en)
|
2014-02-05 |
2016-02-16 |
Fireeye, Inc. |
Detection efficacy of virtual machine-based analysis with application specific events
|
KR101514984B1
(en)
|
2014-03-03 |
2015-04-24 |
(주)엠씨알시스템 |
Detecting system for detecting Homepage spreading Virus and Detecting method thereof
|
RU2543564C1
(en)
|
2014-03-20 |
2015-03-10 |
Закрытое акционерное общество "Научно-производственное предприятие "Информационные технологии в бизнесе" |
System of detection and prevention of intrusions based on control of access to resources
|
US9853997B2
(en)
|
2014-04-14 |
2017-12-26 |
Drexel University |
Multi-channel change-point malware detection
|
US9332022B1
(en)
|
2014-07-07 |
2016-05-03 |
Symantec Corporation |
Systems and methods for detecting suspicious internet addresses
|
US20160036837A1
(en)
|
2014-08-04 |
2016-02-04 |
Microsoft Corporation |
Detecting attacks on data centers
|
US9800592B2
(en)
|
2014-08-04 |
2017-10-24 |
Microsoft Technology Licensing, Llc |
Data center architecture that supports attack detection and mitigation
|
US9942250B2
(en)
|
2014-08-06 |
2018-04-10 |
Norse Networks, Inc. |
Network appliance for dynamic protection from risky network activities
|
KR101587161B1
(en)
|
2014-09-03 |
2016-01-20 |
한국전자통신연구원 |
Apparatus and method for real-time network antivirus
|
RU2589310C2
(en)
|
2014-09-30 |
2016-07-10 |
Закрытое акционерное общество "Лаборатория Касперского" |
System and method of calculating interval of repeated determination of categories of network resource
|
US20160110819A1
(en)
|
2014-10-21 |
2016-04-21 |
Marc Lauren Abramowitz |
Dynamic security rating for cyber insurance products
|
JP6916112B2
(en)
|
2014-11-21 |
2021-08-11 |
ブルヴェクター, インコーポレーテッドBluvector, Inc. |
Network data characterization system and method
|
US10574675B2
(en)
|
2014-12-05 |
2020-02-25 |
T-Mobile Usa, Inc. |
Similarity search for discovering multiple vector attacks
|
US9367872B1
(en)
|
2014-12-22 |
2016-06-14 |
Palantir Technologies Inc. |
Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
|
US9934376B1
(en)
|
2014-12-29 |
2018-04-03 |
Fireeye, Inc. |
Malware detection appliance architecture
|
US10230526B2
(en)
|
2014-12-31 |
2019-03-12 |
William Manning |
Out-of-band validation of domain name system records
|
US9712549B2
(en)
|
2015-01-08 |
2017-07-18 |
Imam Abdulrahman Bin Faisal University |
System, apparatus, and method for detecting home anomalies
|
CN104504307B
(en)
|
2015-01-08 |
2017-09-29 |
北京大学 |
Audio frequency and video copy detection method and device based on copy cell
|
EP3065076A1
(en)
|
2015-03-04 |
2016-09-07 |
Secure-Nok AS |
System and method for responding to a cyber-attack-related incident against an industrial control system
|
US9253208B1
(en)
|
2015-03-05 |
2016-02-02 |
AO Kaspersky Lab |
System and method for automated phishing detection rule evolution
|
US9769201B2
(en)
|
2015-03-06 |
2017-09-19 |
Radware, Ltd. |
System and method thereof for multi-tiered mitigation of cyber-attacks
|
US9712553B2
(en)
|
2015-03-27 |
2017-07-18 |
The Boeing Company |
System and method for developing a cyber-attack scenario
|
US10382484B2
(en)
|
2015-06-08 |
2019-08-13 |
Illusive Networks Ltd. |
Detecting attackers who target containerized clusters
|
US9917852B1
(en)
|
2015-06-29 |
2018-03-13 |
Palo Alto Networks, Inc. |
DGA behavior detection
|
RU164629U1
(en)
|
2015-06-30 |
2016-09-10 |
Акционерное общество "Институт точной механики и вычислительной техники имени С.А. Лебедева Российской академии наук" |
ELECTRONIC MODULE OF PROTECTION AGAINST NETWORK ATTACKS ON THE BASIS OF THE NETWORK PROCESSOR NP-5
|
EP3125147B1
(en)
|
2015-07-27 |
2020-06-03 |
Swisscom AG |
System and method for identifying a phishing website
|
US9456000B1
(en)
|
2015-08-06 |
2016-09-27 |
Palantir Technologies Inc. |
Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
|
CN106506435B
(en)
|
2015-09-08 |
2019-08-06 |
中国电信股份有限公司 |
For detecting the method and firewall system of network attack
|
WO2017049045A1
(en)
|
2015-09-16 |
2017-03-23 |
RiskIQ, Inc. |
Using hash signatures of dom objects to identify website similarity
|
CN105429956B
(en)
|
2015-11-02 |
2018-09-25 |
重庆大学 |
Malware detection system based on P2P dynamic clouds and method
|
US10200382B2
(en)
|
2015-11-05 |
2019-02-05 |
Radware, Ltd. |
System and method for detecting abnormal traffic behavior using infinite decaying clusters
|
US9894036B2
(en)
|
2015-11-17 |
2018-02-13 |
Cyber Adapt, Inc. |
Cyber threat attenuation using multi-source threat data analysis
|
RU2622870C2
(en)
|
2015-11-17 |
2017-06-20 |
Общество с ограниченной ответственностью "САЙТСЕКЬЮР" |
System and method for evaluating malicious websites
|
CN106709777A
(en)
|
2015-11-18 |
2017-05-24 |
阿里巴巴集团控股有限公司 |
Order clustering method and apparatus thereof, and anti-malicious information method and apparatus thereof
|
US10594710B2
(en)
|
2015-11-20 |
2020-03-17 |
Webroot Inc. |
Statistical analysis of network behavior using event vectors to identify behavioral anomalies using a composite score
|
RU2613535C1
(en)
|
2015-11-20 |
2017-03-16 |
Илья Самуилович Рабинович |
Method for detecting malicious software and elements
|
EP3373179B1
(en)
|
2015-12-14 |
2019-08-07 |
Mitsubishi Electric Corporation |
Information processing device, information processing method, and information processing program
|
US9723344B1
(en)
|
2015-12-29 |
2017-08-01 |
Google Inc. |
Early detection of policy violating media
|
US11069370B2
(en)
|
2016-01-11 |
2021-07-20 |
University Of Tennessee Research Foundation |
Tampering detection and location identification of digital audio recordings
|
RU2628192C2
(en)
|
2016-01-27 |
2017-08-15 |
Акционерное общество "Творческо-производственное объединение "Центральная киностудия детских и юношеских фильмов им. М. Горького" |
Device for semantic classification and search in archives of digitized film materials
|
US9900338B2
(en)
|
2016-02-09 |
2018-02-20 |
International Business Machines Corporation |
Forecasting and classifying cyber-attacks using neural embeddings based on pattern of life data
|
AU2017225932C1
(en)
|
2016-02-29 |
2021-06-24 |
Securekey Technologies Inc. |
Systems and methods for distributed identity verification
|
US10063572B2
(en)
|
2016-03-28 |
2018-08-28 |
Accenture Global Solutions Limited |
Antivirus signature distribution with distributed ledger
|
US10313382B2
(en)
|
2016-03-29 |
2019-06-04 |
The Mitre Corporation |
System and method for visualizing and analyzing cyber-attacks using a graph model
|
US10212145B2
(en)
|
2016-04-06 |
2019-02-19 |
Avaya Inc. |
Methods and systems for creating and exchanging a device specific blockchain for device authentication
|
US10178107B2
(en)
|
2016-04-06 |
2019-01-08 |
Cisco Technology, Inc. |
Detection of malicious domains using recurring patterns in domain names
|
CN105897714B
(en)
|
2016-04-11 |
2018-11-09 |
天津大学 |
Botnet detection method based on DNS traffic characteristics
|
RU2625050C1
(en)
|
2016-04-25 |
2017-07-11 |
Акционерное общество "Лаборатория Касперского" |
System and method of transactions trusted declaration
|
US11223598B2
(en)
|
2016-05-03 |
2022-01-11 |
Nokia Of America Corporation |
Internet security
|
RU2634211C1
(en)
|
2016-07-06 |
2017-10-24 |
Общество с ограниченной ответственностью "Траст" |
Method and system of protocols analysis of harmful programs interaction with control centers and detection of computer attacks
|
RU2636702C1
(en)
|
2016-07-07 |
2017-11-27 |
Общество С Ограниченной Ответственностью "Яндекс" |
Method and device for selecting network resource as source of content in recommendations system
|
US20180012144A1
(en)
|
2016-07-11 |
2018-01-11 |
Qualcomm Innovation Center, Inc. |
Incremental and speculative analysis of javascripts based on a multi-instance model for web security
|
CN106131016B
(en)
|
2016-07-13 |
2019-05-03 |
北京知道创宇信息技术有限公司 |
Malice URL detects interference method, system and device
|
US10212133B2
(en)
|
2016-07-29 |
2019-02-19 |
ShieldX Networks, Inc. |
Accelerated pattern matching using pattern functions
|
WO2018025157A1
(en)
|
2016-07-31 |
2018-02-08 |
Cymmetria, Inc. |
Deploying deception campaigns using communication breadcrumbs
|
US10498761B2
(en)
|
2016-08-23 |
2019-12-03 |
Duo Security, Inc. |
Method for identifying phishing websites and hindering associated activity
|
US10313352B2
(en)
|
2016-10-26 |
2019-06-04 |
International Business Machines Corporation |
Phishing detection with machine learning
|
WO2018095192A1
(en)
|
2016-11-23 |
2018-05-31 |
腾讯科技(深圳)有限公司 |
Method and system for website attack detection and prevention
|
CN106713312A
(en)
|
2016-12-21 |
2017-05-24 |
深圳市深信服电子科技有限公司 |
Method and device for detecting illegal domain name
|
EP3649767A1
(en)
|
2017-07-06 |
2020-05-13 |
Pixm |
Phishing detection method and system
|
CN107392456A
(en)
|
2017-07-14 |
2017-11-24 |
武汉理工大学 |
A kind of multi-angle rating business credit modeling method for merging internet information
|
RU2670906C9
(en)
|
2017-12-28 |
2018-12-12 |
Общество С Ограниченной Ответственностью "Центр Разработки И Внедрения Инновационных Технологий" |
Self-adjusting interactive system, method for message and/or call exchange between users of different web sites using client-server technology and computer readable medium
|