Patent Id | Score | Title | Patent Type | Publication Date | Priority Date | Search Efficiency | Original Assignee | Current Assignee |
|---|---|---|---|---|---|---|---|---|
| EP1512075A1 | ●●●●● | ADAPTIVE INTRUSION DETECTION SYSTEM | GRANT | 2005-03-09 | 2002-05-22 | Great | Lucid Security Corp | Lucid Security Corp |
| US7926113B1 | ●●●●● | System and method for managing network vulnerability analysis systems | GRANT | 2011-04-12 | 2003-06-09 | Great | Tenable Network Security Inc | Tenable Inc |
| EP1461707A1 | ●●●●● | AUTOMATED COMPUTER VULNERABILITY RESOLUTION SYSTEM | GRANT | 2004-09-29 | 2001-12-31 | Great | Citadel Security Software Inc | Citadel Security Software Inc |
| EP1559008A1 | ●●●●● | SYSTEM AND METHOD FOR RISK DETECTION AND ANALYSIS IN A COMPUTER NETWORK | GRANT | 2005-08-03 | 2002-10-01 | Great | Skybox Security Ltd | Skybox Security Ltd |
| US7359962B2 | ●●●●● | Network security system integration | GRANT | 2008-04-15 | 2002-04-30 | Great | 3Com Corp | Trend Micro Inc, HP Inc |
| US7181769B1 | ●●●●● | Network security system having a device profiler communicatively coupled to a traffic monitor | GRANT | 2007-02-20 | 2000-08-25 | Great | Ncircle Network Security Inc | Tripwire Inc |
| US6546493B1 | ●●●●● | System method and computer program product for risk assessment scanning based on detected anomalous events | GRANT | 2003-04-08 | 2001-11-30 | Great | Networks Associates Technology Inc | McAfee LLC |
| US7451488B2 | ●●●●● | Policy-based vulnerability assessment | GRANT | 2008-11-11 | 2003-04-29 | Great | Securify Inc | McAfee LLC |
| US8266703B1 | ●●●●● | System method and computer program product for improving computer network intrusion detection by risk prioritization | GRANT | 2012-09-11 | 2001-11-30 | Great | McAfee LLC | McAfee LLC |
| US20040064726A1 | ●●●●● | Vulnerability management and tracking system (VMTS) | APPLICATION | 2004-04-01 | 2002-09-30 | Great | Electronic Data Systems LLC | Hewlett Packard Development Co LP |
| US7574740B1 | ●●●●● | Method and system for intrusion detection in a computer network | GRANT | 2009-08-11 | 2000-04-28 | Great | International Business Machines Corp | International Business Machines Corp |
| US7278161B2 | ●●●●● | Protecting a data processing system from attack by a vandal who uses a vulnerability scanner | GRANT | 2007-10-02 | 2001-10-01 | Great | International Business Machines Corp | Trend Micro Inc |
| US20030135749A1 | ●●●●● | System and method of defining the security vulnerabilities of a computer system | APPLICATION | 2003-07-17 | 2001-10-31 | Great | Hewlett Packard Co | Hewlett Packard Development Co LP |
| EP1470691B1 | ●●●●● | INTEGRATED NETWORK INTRUSION DETECTION | GRANT | 2012-06-13 | 2002-02-01 | Great | Intel Corp | Intel Corp |
| EP1574013B1 | ●●●●● | CONTENT MANAGEMENT SYSTEM | GRANT | 2009-06-17 | 2002-12-13 | Great | Computer Associates Think Inc | CA Inc |
| ●●●●● | ●●●●● | ●●●●● | ●●●●● | ●●●●● | ●●●●● | Great | ●●●●● | ●●●●● |
| ●●●●● | ●●●●● | ●●●●● | ●●●●● | ●●●●● | ●●●●● | Great | ●●●●● | ●●●●● |
| ●●●●● | ●●●●● | ●●●●● | ●●●●● | ●●●●● | ●●●●● | Great | ●●●●● | ●●●●● |

