Malware Detector, Angelos Stavrou, Sushil Jajodia, Anup Ghosh, Rhandi Martin, Charalampos Andrianakis, US 11,330,000 B2, May 10, 2022 On-demand Disposable Virtual Work System, Anup K. Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang, US 10,956,184, March 23, 2021 Malware Detector, Angelos Stavrou, Sushil Jajodia, Anup Ghosh, Rhandi Martin, Charalampos Andrianakis, US 11,330,000, March 10, 2022 On-demand Disposable Virtual Work System, Anup K. Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang, US 10,956,184, March 23, 2021 Malware Detector, Angelos Stavrou, Sushil Jajodia, Anup Ghosh, Rhandi Martin, Charalampos Andrianakis, US 10,243,975, March 26,2019 Virtual Browsing Environment, Anup K. Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang, US 10,120,998, November 6, 2018 On-demand Disposable Virtual Work System, Anup K. Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang, US 9,846,588, December 19, 2017 Malware Detector, Angelos Stavrou, Sushil Jajodia, Anup Ghosh, Rhandi Martin, Charalampos Andrianakis, US 9,531,747 B2, December 27,2016 Virtual Browsing Environment, Anup K. Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang, US 9,436,822 B2, September 6, 2016 K-zero Day Safety, Sushil Jajodia, Lingyu Wang, Stephen Noel, Anoop Singhal, US 9,325,729 B2, April 26, 2016 Methods and Systems for Determining Hardening Strategies, Massmiliano Albanese, Sushil Jajodia, Steven Noel, US 9,203,861, December 1, 2015 Malware Detector, Angelos Stavrou, Sushil Jajodia, Anup Ghosh, Rhandi Martin, Charalampos Andrianakis, US8,935,773, January 13, 2015 K-zero Day Safety, Sushil Jajodia, Lingyu Wang, Stephen Noel, Anoop Singhal, US 8,918,884 B2, December 23, 2014 On-demand Disposable Virtual Work System, Anup K. Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang, US 8,856,782, October 7, 2014 Virtual Browsing Environment, Anup K. Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang, US 8,839,422, September 16, 2014 Intrusion Event Correlation System, Steven E. Noel, Sushil Jajodia, Eric B. Robertson, US 8,719,943, May 6, 2014 Packet Flow Side Channel, Xinyuan Wang, Shiping Chen, Sushil Jajodia, US 8,644,353, February 4, 2014 Interactive Analysis of Attack Queries using Relational Queries, Sushil Jajodia, Lingyu Wang, Anoop Singhal, US 8,566,269, October 22, 2013 Intrusion Event Correlation System, Sushil Jajodia, Steven E. Noel, Eric B. Robertson, US 8,181,252, May 15, 2012 Protecting Sensitive Data Associations, Sushil Jajodia, US 8,082,452, December 20, 2011 Network Analysis, Modeling, and Response, Sushil Jajodia, Steven Noel, Pramod Kalapa, Michael Jacobs, Brian O'Berry, Eric Robertson, Robert Weierbach, US 7,904,962, March 8, 2011 Packet Flow Side Channel, Xinyuan Wang, Shiping Chen, Sushil Jajodia, US 7,822,073, October 26, 2010 Intrusion Event Correlator, Steven E. Noel, Eric B. Robertson, Sushil Jajodia, US 7,735,141, June 8, 2010 Fragile Watermarks, Sushil Jajodia, Huiping Guo, Yingjiu Li, US 7,730,037, June 1, 2010 Method and Apparatus for Watermarking Stream Data, Sushil Jajodia, Huiping Guo, Yingjiu Li, US 7,720,250, May 18, 2010 Attack Graph Aggregation, Steven E. Noel, Sushil Jajodia, US 7,627,900, December 1, 2009 Minimum-cost Network Hardening, Steven E. Noel, Sushil Jajodia, Brian C. O'Berry, Michael A. Jacobs, US 7,555,778, June 30.2009 Fingerprinting and Recognition of Data, Neil Johnson, Zoran Duric, and Sushil Jajodia, US 7,127,106 B1, October 24, 2006 |