Average Co-Inventor Count = 3.14
ph-index = 15
The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.
Company Filing History:
1. Columbia University (58 from 2,487 patents)
58 patents:
1. 11599628 - Detecting return-oriented programming payloads by evaluating data for a gadget address space address and determining whether operations associated with instructions beginning at the address indicate a return-oriented programming payload
2. 11106799 - Methods, media, and systems for detecting an anomalous sequence of function calls
3. 10902111 - Methods, media, and systems for detecting attack on a digital processing device
4. 10819726 - Detecting network anomalies by probabilistic modeling of argument strings with markov chains
5. 10423788 - Methods, media, and systems for detecting an anomalous sequence of function calls
6. 10367797 - Methods, systems, and media for authenticating users using multiple services
7. 10305919 - Systems and methods for inhibiting attacks on applications
8. 10237059 - Diversified instruction set processing to enhance security
9. 10192049 - Detecting return-oriented programming payloads by evaluating data for a gadget address space address and determining whether operations associated with instructions beginning at the address indicate a return-oriented programming payload
10. 10181026 - Methods, media, and systems for detecting attack on a digital processing device
11. 10178104 - Methods, media, and systems for securing communications between a first node and a second node
12. 10178113 - Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models
13. 10063576 - Detecting network anomalies by probabilistic modeling of argument strings with markov chains
14. 10038704 - Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
15. 9992222 - Systems and methods for inhibiting attacks with a network