Growing community of inventors

Somerville, MA, United States of America

Sohrob Kazerounian

Average Co-Inventor Count = 3.27

ph-index = 1

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 2

Sohrob KazerounianNicolas Beauchesne (4 patents)Sohrob KazerounianKarl Matthew Lynn (4 patents)Sohrob KazerounianWilliam Stow Finlayson, Iv (4 patents)Sohrob KazerounianDaniel Carlton Hannah (1 patent)Sohrob KazerounianTuomas P Oikarinen (1 patent)Sohrob KazerounianMatthew R Silver (1 patent)Sohrob KazerounianWilliam Stow Finlayson Iv (0 patent)Sohrob KazerounianWilliam Stow Finlayson Iv (0 patent)Sohrob KazerounianSohrob Kazerounian (6 patents)Nicolas BeauchesneNicolas Beauchesne (18 patents)Karl Matthew LynnKarl Matthew Lynn (7 patents)William Stow Finlayson, IvWilliam Stow Finlayson, Iv (4 patents)Daniel Carlton HannahDaniel Carlton Hannah (2 patents)Tuomas P OikarinenTuomas P Oikarinen (1 patent)Matthew R SilverMatthew R Silver (1 patent)William Stow Finlayson IvWilliam Stow Finlayson Iv (0 patent)William Stow Finlayson IvWilliam Stow Finlayson Iv (0 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Vectra Ai, Inc. (6 from 9 patents)


6 patents:

1. 12477001 - Method, product, and system for analyzing attack paths in computer network generated using a software representation that embodies network configuration and policy data for security management

2. 12328322 - Method, product, and system for network security management using software representation that embodies network configuration and policy data

3. 12219070 - Method, product, and system for generating detection signatures based on attack paths in a computer network identified using a software representation that embodies network configuration and policy data for security management using detection signature templates

4. 12212585 - Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management

5. 11880764 - Method, product, and system for detecting malicious network activity using a graph mixture density neural network

6. 10880321 - Method and system for learning representations of network flow traffic

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
1/7/2026
Loading…