Chapel Hill, NC, United States of America

Fabian Newman Monrose


Average Co-Inventor Count = 4.5

ph-index = 4

Forward Citations = 86(Granted Patents)


Company Filing History:


Years Active: 2016-2020

where 'Filed Patents' based on already Granted Patents

9 patents (USPTO):

Title: Fabian Newman Monrose: Innovator in Cybersecurity

Introduction

Fabian Newman Monrose is a notable inventor based in Chapel Hill, NC (US). He has made significant contributions to the field of cybersecurity, holding a total of 9 patents. His work focuses on developing methods and systems to enhance the security of computer systems against various threats.

Latest Patents

Monrose's latest patents include innovative techniques for preventing code reuse attacks. One of his methods involves executing code in a protected memory page and modifying memory permissions to ensure that the code becomes non-executable after being read. This approach aims to thwart potential exploits that could compromise system integrity. Another significant patent addresses the detection of web exploit kits through a tree-based structural similarity search. This method clusters HTTP traffic into a web session tree and compares it with known exploit kit samples, enhancing the ability to identify malicious activities.

Career Highlights

Throughout his career, Monrose has worked with prestigious organizations, including the University of North Carolina at Chapel Hill and IBM. His experience in these institutions has allowed him to collaborate on various research projects and contribute to advancements in cybersecurity.

Collaborations

Monrose has collaborated with notable colleagues such as Teryl Paul Taylor and Kevin Zachary Snow. Their combined expertise has furthered the development of innovative solutions in the field.

Conclusion

Fabian Newman Monrose stands out as a prominent inventor in cybersecurity, with a focus on protecting systems from emerging threats. His contributions through patents and collaborations continue to shape the landscape of computer security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…