Growing community of inventors

Carrboro, NC, United States of America

Robert W Danford

Average Co-Inventor Count = 4.35

ph-index = 6

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 639

Robert W DanfordClark Debs Jeffries (8 patents)Robert W DanfordJon R Ramsey (7 patents)Robert W DanfordTimothy M Vidas (7 patents)Robert W DanfordKevin David Himberger (6 patents)Robert W DanfordRoss Rowland Kinder (5 patents)Robert W DanfordAlan David Boulanger (4 patents)Robert W DanfordRaj Kumar Singh (2 patents)Robert W DanfordAaron Hackworth (2 patents)Robert W DanfordRobert Barry Sisk (2 patents)Robert W DanfordWilliam M Urbanski (2 patents)Robert W DanfordTerry Dwain Escamilla (2 patents)Robert W DanfordMichael A Walter (2 patents)Robert W DanfordKenneth M Farmer (2 patents)Robert W DanfordRobert W Danford (15 patents)Clark Debs JeffriesClark Debs Jeffries (119 patents)Jon R RamseyJon R Ramsey (26 patents)Timothy M VidasTimothy M Vidas (16 patents)Kevin David HimbergerKevin David Himberger (28 patents)Ross Rowland KinderRoss Rowland Kinder (16 patents)Alan David BoulangerAlan David Boulanger (5 patents)Raj Kumar SinghRaj Kumar Singh (10 patents)Aaron HackworthAaron Hackworth (9 patents)Robert Barry SiskRobert Barry Sisk (5 patents)William M UrbanskiWilliam M Urbanski (5 patents)Terry Dwain EscamillaTerry Dwain Escamilla (5 patents)Michael A WalterMichael A Walter (4 patents)Kenneth M FarmerKenneth M Farmer (2 patents)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. International Business Machines Corporation (8 from 164,197 patents)

2. Secureworks, Inc. (6 from 46 patents)

3. Dell Products Inc. (1 from 12,976 patents)


15 patents:

1. 11632398 - Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics

2. 10735470 - Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics

3. 10659498 - Systems and methods for security configuration

4. 10594573 - Systems and methods for rule quality estimation

5. 10263788 - Systems and methods for providing a man-in-the-middle proxy

6. 10116625 - Systems and methods for secure containerization

7. 10009380 - Systems and methods for security configuration

8. 9633202 - Managing a DDoS attack

9. 8423645 - Detection of grid participation in a DDoS attack

10. 7957372 - Automatically detecting distributed port scans in computer networks

11. 7734776 - Automatically detecting malicious computer network reconnaissance by updating state codes in a histogram

12. 7707633 - Applying blocking measures progressively to malicious network traffic

13. 7669240 - Apparatus, method and program to detect and control deleterious code (virus) in computer network

14. 7356587 - Automatically detecting malicious computer network reconnaissance by updating state codes in a histogram

15. 7308716 - Applying blocking measures progressively to malicious network traffic

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/26/2025
Loading…