Growing community of inventors

White Plains, NY, United States of America

Frederico Araujo

Average Co-Inventor Count = 3.64

ph-index = 3

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 72

Frederico AraujoTeryl Paul Taylor (15 patents)Frederico AraujoMarc Philippe Stoecklin (10 patents)Frederico AraujoDouglas Lee Schales (6 patents)Frederico AraujoJiyong Jang (4 patents)Frederico AraujoJialong Zhang (3 patents)Frederico AraujoSanjeev Das (2 patents)Frederico AraujoWilliam Blair (2 patents)Frederico AraujoXiaokui Shu (1 patent)Frederico AraujoMichael Vu Le (1 patent)Frederico AraujoMarc Phillipe Stoecklin (1 patent)Frederico AraujoWill Blair (1 patent)Frederico AraujoAnne E Kohlbrenner (1 patent)Frederico AraujoXu Lin (1 patent)Frederico AraujoAnthony Saieva (1 patent)Frederico AraujoMd Sajidul Islam Sajid (1 patent)Frederico AraujoFrederico Araujo (18 patents)Teryl Paul TaylorTeryl Paul Taylor (20 patents)Marc Philippe StoecklinMarc Philippe Stoecklin (59 patents)Douglas Lee SchalesDouglas Lee Schales (38 patents)Jiyong JangJiyong Jang (45 patents)Jialong ZhangJialong Zhang (20 patents)Sanjeev DasSanjeev Das (3 patents)William BlairWilliam Blair (2 patents)Xiaokui ShuXiaokui Shu (13 patents)Michael Vu LeMichael Vu Le (11 patents)Marc Phillipe StoecklinMarc Phillipe Stoecklin (2 patents)Will BlairWill Blair (1 patent)Anne E KohlbrennerAnne E Kohlbrenner (1 patent)Xu LinXu Lin (1 patent)Anthony SaievaAnthony Saieva (1 patent)Md Sajidul Islam SajidMd Sajidul Islam Sajid (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. International Business Machines Corporation (18 from 164,108 patents)


18 patents:

1. 12455814 - Grayware analysis

2. 12346453 - Automated testing of operating system (OS) kernel helper functions accessible through extended BPF (EBPF) filters

3. 12323436 - Modulation and regulation of system event monitoring streams

4. 11985165 - Detecting web resources spoofing through stylistic fingerprints

5. 11941054 - Iterative constraint solving in abstract graph matching for cyber incident reasoning

6. 11829879 - Detecting adversarial attacks through decoy training

7. 11822673 - Guided micro-fuzzing through hybrid program analysis

8. 11775638 - Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views

9. 11748473 - Intrusion detection in micro-services through container telemetry and behavior modeling

10. 11720667 - Stateful microservice-aware intrusion detection

11. 11562086 - Filesystem view separation for data confidentiality and integrity using lattice-based security domains

12. 11501156 - Detecting adversarial attacks through decoy training

13. 11163878 - Integrity, theft protection and cyber deception using a deception-based filesystem

14. 10979453 - Cyber-deception using network port projection

15. 10887346 - Application-level sandboxing

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/3/2025
Loading…