Performance benchmarking for simulated phishing attacks
R Belani, A Higbee, S Greaux - US Patent 9,667,645, 2017 - Google Patents
Described herein are methods, network devices and machine-readable media for
conducting a simulated phishing attack on a first group of individuals, and performing an …
conducting a simulated phishing attack on a first group of individuals, and performing an …
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …
some embodiments, a method for detecting covert malware in a computing environ ment is …
Methods, systems, and media for baiting inside attackers
SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …
Prioritizing network traffic
D Alperovitch, P Greve, P Judge, S Krasser… - US Patent …, 2011 - Google Patents
US PATENT DOCUMENTS 4,289.930 A 9/1981 Connolly et al. 4,384.325 A 5, 1983 Slechta
et al. 4,386,416 A 5, 1983 Giltner et al. 4,532.588 A 7, 1985 Foster 4,713,780 A 12/1987 …
et al. 4,386,416 A 5, 1983 Giltner et al. 4,532.588 A 7, 1985 Foster 4,713,780 A 12/1987 …
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …
behavior are provided. In accordance with some embodiments, a method for detecting …
System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning
P Benjamin - US Patent 7,784,099, 2010 - Google Patents
(60) Provisional application No. 60/654,415, filed on Feb. computing device. The invention
further comprises a data 18, 2005. base that is accessible over the network and operable to …
further comprises a data 18, 2005. base that is accessible over the network and operable to …
Suspicious message processing and incident response
A Higbee, R Belani, S Greaux, W Galway… - US Patent …, 2018 - Google Patents
US9906539B2 - Suspicious message processing and incident response - Google Patents
US9906539B2 - Suspicious message processing and incident response - Google Patents …
US9906539B2 - Suspicious message processing and incident response - Google Patents …
Method and apparatus for security management via vicarious network devices
MP Shevenell, LM Lewis, RW Graham - US Patent 7,770,223, 2010 - Google Patents
BACKGROUND With the increasing dependence of nearly all aspects of modern life on
network-based communications, network security has, of necessity, become of primary …
network-based communications, network security has, of necessity, become of primary …
Systems and methods for enhancing electronic communication security
P Judge, G Rajan - US Patent 7,458,098, 2008 - Google Patents
The present invention is directed to systems and methods for enhancing electronic
communication security. An electronic communication related to an application is received …
communication security. An electronic communication related to an application is received …
Systems and methods for message threat management
P Judge - US Patent 7,096,498, 2006 - Google Patents
US PATENT DOCUMENTS with configuration data Such as goals are used to produce rules.
In some embodiments, these rules are tested against one or more sets of test data and …
In some embodiments, these rules are tested against one or more sets of test data and …