Average Co-Inventor Count = 4.19
ph-index = 10
The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.
Company Filing History:
1. Exabeam, Inc. (19 from 21 patents)
19 patents:
1. 12063226 - Graph-based multi-staged attack detection in the context of an attack framework
2. 12034732 - System, method, and computer program for automatically classifying user accounts in a computer network using keys from an identity management system
3. 11956253 - Ranking cybersecurity alerts from multiple sources using machine learning
4. 11625366 - System, method, and computer program for automatic parser creation
5. 11431741 - Detecting unmanaged and unauthorized assets in an information technology network with a recurrent neural network that identifies anomalously-named assets
6. 11423143 - Anomaly detection based on processes executed within a network
7. 11178168 - Self-learning cybersecurity threat detection system, method, and computer program for multi-domain data
8. 11140167 - System, method, and computer program for automatically classifying user accounts in a computer network using keys from an identity management system
9. 10944777 - System, method, and computer program for detection of anomalous user network activity based on multiple data sources
10. 10887325 - Behavior analytics system for determining the cybersecurity risk associated with first-time, user-to-entity access alerts
11. 10841338 - Dynamic rule risk score determination in a cybersecurity monitoring system
12. 10803183 - System, method, and computer program product for detecting and assessing security risks in a network
13. 10645109 - System, method, and computer program for detection of anomalous user network activity based on multiple data sources
14. 10496815 - System, method, and computer program for classifying monitored assets based on user labels and for detecting potential misuse of monitored assets based on the classifications
15. 10474828 - System, method, and computer program product for detecting and assessing security risks in a network