Growing community of inventors

New York, NY, United States of America

Renaud Deraison

Average Co-Inventor Count = 2.69

ph-index = 6

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 132

Renaud DeraisonVincent Gilcreest (7 patents)Renaud DeraisonWei Tai (5 patents)Renaud DeraisonRon Gula (4 patents)Renaud DeraisonBryan Peter Doyle (4 patents)Renaud DeraisonDamien McParland (4 patents)Renaud DeraisonBarry Sheridan (3 patents)Renaud DeraisonAnthony Bettini (3 patents)Renaud DeraisonMatthew Ray Everson (3 patents)Renaud DeraisonMarcus J Ranum (1 patent)Renaud DeraisonMatthew Todd Hayton (1 patent)Renaud DeraisonNicholas Miles (1 patent)Renaud DeraisonClint R Merrill (1 patent)Renaud DeraisonJohn Walker (1 patent)Renaud DeraisonCharles Joseph Bacon (1 patent)Renaud DeraisonNicolas Pouvesle (1 patent)Renaud DeraisonKatherine Alice Sexton (1 patent)Renaud DeraisonRenaud Deraison (14 patents)Vincent GilcreestVincent Gilcreest (7 patents)Wei TaiWei Tai (5 patents)Ron GulaRon Gula (14 patents)Bryan Peter DoyleBryan Peter Doyle (5 patents)Damien McParlandDamien McParland (4 patents)Barry SheridanBarry Sheridan (4 patents)Anthony BettiniAnthony Bettini (3 patents)Matthew Ray EversonMatthew Ray Everson (3 patents)Marcus J RanumMarcus J Ranum (9 patents)Matthew Todd HaytonMatthew Todd Hayton (3 patents)Nicholas MilesNicholas Miles (3 patents)Clint R MerrillClint R Merrill (2 patents)John WalkerJohn Walker (1 patent)Charles Joseph BaconCharles Joseph Bacon (1 patent)Nicolas PouvesleNicolas Pouvesle (1 patent)Katherine Alice SextonKatherine Alice Sexton (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Tenable, Inc. (8 from 30 patents)

2. Tenable Network Security, Inc. (6 from 14 patents)


14 patents:

1. 12335298 - Predicting cyber risk for assets with limited scan information using machine learning

2. 12212597 - Rule-based assignment of criticality scores to assets and generation of a criticality rules table

3. 12019757 - Threat score prediction model

4. 11882144 - Rule-based assignment of criticality scores to assets and generation of a criticality rules table

5. 11818160 - Predicting cyber risk for assets with limited scan information using machine learning

6. 11621974 - Managing supersedence of solutions for security issues among assets of an enterprise network

7. 11487879 - Threat score prediction model

8. 11258817 - Rule-based assignment of criticality scores to assets and generation of a criticality rules table

9. 9860265 - System and method for identifying exploitable weak points in a network

10. 9467464 - System and method for correlating log data to discover network vulnerabilities and assets

11. 9043920 - System and method for identifying exploitable weak points in a network

12. 8839442 - System and method for enabling remote registry service security audits

13. 8707440 - System and method for passively identifying encrypted and interactive network sessions

14. 8302198 - System and method for enabling remote registry service security audits

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/28/2025
Loading…