Growing community of inventors

Beroun, Czechia

Martin Kopp

Average Co-Inventor Count = 3.37

ph-index = 5

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 60

Martin KoppJan Kohout (13 patents)Martin KoppMartin Grill (9 patents)Martin KoppTomas Pevny (7 patents)Martin KoppLukas Bajer (5 patents)Martin KoppDavid A McGrew (4 patents)Martin KoppBlake Harrell Anderson (3 patents)Martin KoppLukas Machlica (3 patents)Martin KoppPetr Somol (3 patents)Martin KoppJan Brabec (3 patents)Martin KoppCenek Skarda (3 patents)Martin KoppDanila Khikhlukha (2 patents)Martin KoppKyrylo Shcherbin (2 patents)Martin KoppDavid Mcgrew (2 patents)Martin KoppMarc René Jacques Marie Dupont (2 patents)Martin KoppLukas Bajer (1 patent)Martin KoppVojtech Outrata (1 patent)Martin KoppMichael Adam Polak (1 patent)Martin KoppStepan Dvorak (1 patent)Martin KoppPavel Prochazka (1 patent)Martin KoppJaroslav Hlavac (1 patent)Martin KoppMartin Kopp (21 patents)Jan KohoutJan Kohout (19 patents)Martin GrillMartin Grill (22 patents)Tomas PevnyTomas Pevny (23 patents)Lukas BajerLukas Bajer (5 patents)David A McGrewDavid A McGrew (151 patents)Blake Harrell AndersonBlake Harrell Anderson (84 patents)Lukas MachlicaLukas Machlica (15 patents)Petr SomolPetr Somol (12 patents)Jan BrabecJan Brabec (11 patents)Cenek SkardaCenek Skarda (4 patents)Danila KhikhlukhaDanila Khikhlukha (4 patents)Kyrylo ShcherbinKyrylo Shcherbin (2 patents)David McgrewDavid Mcgrew (2 patents)Marc René Jacques Marie DupontMarc René Jacques Marie Dupont (2 patents)Lukas BajerLukas Bajer (1 patent)Vojtech OutrataVojtech Outrata (1 patent)Michael Adam PolakMichael Adam Polak (1 patent)Stepan DvorakStepan Dvorak (1 patent)Pavel ProchazkaPavel Prochazka (1 patent)Jaroslav HlavacJaroslav Hlavac (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Cisco Technology, Inc. (21 from 20,333 patents)


21 patents:

1. 12457233 - Command line obfuscation detection techniques

2. 12373550 - Cross-domain indicator of compromise (IoC) identification

3. 12160429 - Learning of malicious behavior vocabulary and threat detection through behavior matching

4. 11985154 - Comprehensible threat detection

5. 11956208 - Graphical representation of security threats in a network

6. 11936683 - Analyzing encrypted traffic behavior using contextual traffic data

7. 11750621 - Learning of malicious behavior vocabulary and threat detection through behavior matching

8. 11451578 - Analyzing encrypted traffic behavior using contextual traffic data

9. 11336617 - Graphical representation of security threats in a network

10. 11245675 - Device detection in network telemetry with TLS fingerprinting

11. 11019095 - Ransomware detection using file replication logs

12. 10965704 - Identifying self-signed certificates using HTTP access logs for malware detection

13. 10805338 - Analyzing encrypted traffic behavior using contextual traffic data

14. 10805377 - Client device tracking

15. 10749770 - Classification of IoT devices based on their network traffic

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/6/2025
Loading…