Hotspot


Archive | 2014

LABELING COMPUTING OBJECTS FOR IMPROVED THREAT DETECTION

Andrew J. Thomas; Mark D. Harris; Simon Neil Reed; Neil Robert Tyndale Watkiss; Kenneth D. Ray


Archive | 2014

Threat detection using endpoint variance

Kenneth D. Ray; Mark D. Harris; Simon Neil Reed; Neil Robert Tyndale Watkiss; Andrew J. Thomas


Archive | 2014

Key management for compromised enterprise endpoints

Harald Schutz; Andrew J. Thomas; Kenneth D. Ray; Daniel Salvatore Schiappa


Archive | 2014

THREAT DETECTION USING A TIME-BASED CACHE OF REPUTATION INFORMATION ON AN ENTERPRISE ENDPOINT

Mark D. Harris; Simon Neil Reed; Kenneth D. Ray; Neil Robert Tyndale Watkiss; Andrew J. Thomas; Robert W. Cook


Archive | 2014

USING INDICATIONS OF COMPROMISE FOR REPUTATION BASED NETWORK SECURITY

Kenneth D. Ray; Simon Neil Reed; Mark D. Harris; Neil Robert Tyndale Watkiss; Andrew J. Thomas; Robert W. Cook; Dmitri Samosseiko


Archive | 2016

FIREWALL TECHNIQUES FOR COLORED OBJECTS ON ENDPOINTS

Andrew J. Thomas; Neil Robert Tyndale Watkiss; Dan Schiappa; Kenneth D. Ray


Archive | 2015

Monitoring variations in observable events for threat detection

Kenneth D. Ray; Mark D. Harris; Simon Neil Reed; Neil Robert Tyndale Watkiss; Andrew J. Thomas


Archive | 2014

SERVER DRIFT MONITORING

Andrew J. Thomas; Kenneth D. Ray; Mark D. Harris


Archive | 2014

THREAT DETECTION USING URL CACHE HITS

Mark D. Harris; Kenneth D. Ray


Archive | 2016

NORMALIZED INDICATIONS OF COMPROMISE

Kenneth D. Ray; Robert W. Cook; Andrew J. Thomas; Dmitri Samosseiko; Mark D. Harris

Researchain Logo
Decentralizing Knowledge