Average Co-Inventor Count = 2.34
ph-index = 12
The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.
Company Filing History:
1. Exabeam, Inc. (19 from 22 patents)
2. Dropbox, Inc. (7 from 1,146 patents)
3. Siebel Systems, Inc. (4 from 296 patents)
4. Oracle America, Inc. (1 from 1,927 patents)
5. Sugarsync, Inc. (1 from 6 patents)
32 patents:
1. 12368651 - User interface for managing and viewing synchronization settings in a synchronization system
2. 12063226 - Graph-based multi-staged attack detection in the context of an attack framework
3. 12034732 - System, method, and computer program for automatically classifying user accounts in a computer network using keys from an identity management system
4. 11979296 - User interface for viewing items in a synchronization system
5. 11956253 - Ranking cybersecurity alerts from multiple sources using machine learning
6. 11625366 - System, method, and computer program for automatic parser creation
7. 11483215 - User interface for viewing items in a synchronization system
8. 11431741 - Detecting unmanaged and unauthorized assets in an information technology network with a recurrent neural network that identifies anomalously-named assets
9. 11423143 - Anomaly detection based on processes executed within a network
10. 11178168 - Self-learning cybersecurity threat detection system, method, and computer program for multi-domain data
11. 11140167 - System, method, and computer program for automatically classifying user accounts in a computer network using keys from an identity management system
12. 10944777 - System, method, and computer program for detection of anomalous user network activity based on multiple data sources
13. 10938670 - User interface for viewing items in a synchronization system
14. 10887325 - Behavior analytics system for determining the cybersecurity risk associated with first-time, user-to-entity access alerts
15. 10841338 - Dynamic rule risk score determination in a cybersecurity monitoring system