| Blockchain-based admission processes for protected entities |
2022-7-29 |
2023-1-05 |
|
| Method and system for detecting and mitigating https flood attacks |
2022-5-31 |
2022-9-15 |
|
| System and methods for malware detection using log analytics for channels and … |
2022-4-29 |
2022-10-20 |
|
| Techniques for generating signatures characterizing advanced application layer … |
2021-11-23 |
2023-1-10 |
2023-1-10 |
| Characterization of HTTP flood DDoS attacks |
2021-11-23 |
2023-2-14 |
2023-2-14 |
| Techniques for protecting web-access |
2021-9-22 |
2023-3-23 |
|
| Method and system for blockchain based cyber protection of network entities |
2021-8-20 |
2021-12-09 |
|
| Techniques for protecting against excessive utilization of cloud services |
2021-3-15 |
2021-9-09 |
|
| Techniques for disaggregated detection and mitigation of distributed denial-of- … |
2020-12-30 |
2021-7-22 |
|
| DETECTION AND MITIGATION OF SLOW APPLICATION LAYER DDoS ATTACKS |
2020-12-23 |
2021-5-20 |
|
| System and method for analytics based waf service configuration |
2020-12-17 |
2021-6-24 |
|
| System and method for attack sequence matching |
2020-7-29 |
2020-11-12 |
|
| Detection and mitigation ddos attacks performed over quic communication … |
2020-6-29 |
2022-6-22 |
|
| System and method for analytics based WAF service configuration |
2020-5-26 |
2022-8-23 |
2022-8-23 |
| Detection and mitigation of recursive domain name system attacks |
2020-4-13 |
2020-7-30 |
|
| System and method for automatic waf service configuration |
2019-12-30 |
2021-7-01 |
|
| Baselining techniques for detecting anomalous https traffic behavior |
2019-12-19 |
2021-6-24 |
|
| System and method for detecting bots using semi-supervised deep learning … |
2019-9-18 |
2023-4-11 |
2023-4-11 |
| Hardening of cloud security policies |
2019-6-03 |
2020-8-13 |
|
| System and method to detect and block bot traffic |
2019-3-26 |
2022-9-20 |
2022-9-20 |
| Techniques for defensing cloud platforms against cyber-attacks |
2018-12-31 |
2020-7-02 |
|
| Techniques for reducing the time to mitigate of ddos attacks |
2018-12-20 |
2019-6-27 |
|
| System and method for providing insights on distributed denial of service … |
2018-12-11 |
2022-7-05 |
2022-7-05 |
| Techniques for predicting subsequent attacks in attack campaigns |
2018-12-11 |
2021-8-10 |
2021-8-10 |
| System and method for out of path ddos attack detection |
2018-12-06 |
2019-6-13 |
|
| System and method for out of path DDoS attack detection |
2018-12-06 |
2023-4-18 |
2023-4-18 |
| Multi-tiered network architecture for mitigation of cyber-attacks |
2018-10-18 |
2020-8-11 |
2020-8-11 |
| System and method for botnet identification |
2018-10-15 |
2019-4-18 |
|
| Techniques for defense against domain name system (DNS) cyber-attacks |
2018-3-29 |
2021-3-02 |
2021-3-02 |
| Extensible, asynchronous, centralized analysis and optimization of server … |
2017-12-28 |
2018-5-03 |
|
| Method and system for load balancing over a cluster of authentication, … |
2017-8-25 |
2017-12-07 |
|
| System and method for real-time tuning of inference systems |
2017-4-10 |
2019-12-31 |
2019-12-31 |
| System and method for operating protection services |
2017-4-10 |
2017-7-27 |
|
| Accelerating HTTP responses in a client/server environment |
2016-12-29 |
2020-8-04 |
2020-8-04 |
| Network-based perimeter defense system and method |
2016-10-27 |
2021-1-05 |
2021-1-05 |
| Techniques for adaptive traffic direction via scalable application delivery … |
2016-7-01 |
2017-1-05 |
|
| Method and system for detection of headless browser bots |
2016-6-01 |
2016-12-08 |
|
| Method and system for fulfilling server push directives on an edge proxy |
2016-5-05 |
2020-4-21 |
2020-4-21 |
| Optimized stream management |
2016-5-04 |
2017-11-09 |
|
| Method and system for detecting and mitigating attacks performed using … |
2016-5-04 |
2017-6-06 |
2017-6-06 |
| Optimization of asynchronous pushing of web resources |
2016-2-24 |
2020-4-07 |
2020-4-07 |
| Techniques for distribution of application delivery |
2016-1-19 |
2018-11-27 |
2018-11-27 |
| Network protection system and method |
2016-1-10 |
2017-5-02 |
2017-5-02 |
| Techniques for separating the processing of clients' traffic to different zones … |
2015-12-03 |
2017-3-07 |
2017-3-07 |
| System and method for detecting abnormal traffic behavior using infinite … |
2015-11-05 |
2017-5-11 |
|
| System and method for stateless distribution of bidirectional flows with … |
2015-9-30 |
2022-7-19 |
2022-7-19 |
| Multi-layer traffic steering for service chaining over software defined … |
2015-6-18 |
2015-12-24 |
|
| System and methods for malware detection using log based crowdsourcing analysis |
2015-6-15 |
2019-8-27 |
2019-8-27 |
| Techniques for traffic diversion in software defined networks for mitigating … |
2015-6-02 |
2016-12-29 |
|
| Method for live migration of virtual machines |
2015-1-28 |
2015-5-21 |
|
| Method and system for configuring behavioral network intelligence system using … |
2014-12-04 |
2019-8-06 |
2019-8-06 |
| Techniques for optimizing authentication challenges for detection of malicious … |
2014-10-22 |
2016-4-28 |
|
| Method and system for detection of malicious bots |
2014-2-18 |
2016-3-22 |
2016-3-22 |
| Method and system for efficient deployment of web applications in a multi- … |
2013-11-13 |
2014-3-06 |
|
| Escalation security method for use in software defined networks |
2013-9-24 |
2015-3-26 |
|
| System and method for creation, distribution, application, and management of … |
2013-6-25 |
2016-9-27 |
2016-9-27 |
| Techniques for providing scalable application delivery controller services |
2013-4-04 |
2013-10-10 |
|
| System and method thereof for mitigating denial of service attacks in virtual … |
2013-3-14 |
2014-9-18 |
|
| Edge side landing pages |
2013-3-06 |
2016-4-05 |
2016-4-05 |
| Method and system for spooling diameter transactions |
2012-12-31 |
2017-5-02 |
2017-5-02 |
| Mobile resource accelerator |
2012-9-07 |
2013-3-21 |
|
| Optimized rendering of dynamic content |
2012-5-18 |
2018-12-18 |
2018-12-18 |
| Method for executing virtual application delivery controllers having different … |
2012-2-27 |
2012-9-06 |
|
| Asynchronous context data messaging |
2012-1-30 |
2013-8-13 |
2013-8-13 |
| Image Optimization |
2012-1-25 |
2012-8-02 |
|
| Multi dimensional attack decision system and method thereof |
2011-11-29 |
2013-10-22 |
2013-10-22 |
| Method and system for profiling data communication activity of users of mobile … |
2011-9-20 |
2012-3-22 |
|
| In-line network device for storing application-layer data, processing … |
2011-9-06 |
2013-12-17 |
2013-12-17 |
| Automated Optimization Based On Determination Of Website Usage Scenario |
2011-3-18 |
2011-9-22 |
|
| Method and System for Generating an Enforceable Security Policy Based on … |
2010-10-25 |
2012-4-26 |
|
| Partial Content Caching |
2008-8-06 |
2009-10-08 |
|
| Multi-virtual service module pinhole or connection class offload |
2008-6-04 |
2010-6-15 |
2010-6-15 |
| Method and System for Providing Connection Resiliency |
2007-11-20 |
2009-5-21 |
|
| Dynamic network protection |
2007-10-24 |
2008-2-28 |
|
| Adaptive Behavioral HTTP Flood Protection |
2007-10-09 |
2008-4-10 |
|
| Automatic Signature Propagation Network |
2007-10-09 |
2008-4-10 |
|
| Method of generating anomaly pattern for HTTP flood protection |
2007-10-09 |
2009-11-24 |
2009-11-24 |
| Cache expiry in multiple-server environment |
2007-8-10 |
2009-2-12 |
|
| Method, System and Computer Program Product for Preventing SIP Attacks |
2007-8-08 |
2009-2-12 |
|
| Systems and Methods for Providing Network-Wide, Traffic-Aware Dynamic … |
2007-5-15 |
2008-11-20 |
|
| Geographic resiliency and load balancing for SIP application services |
2007-5-09 |
2015-9-22 |
2015-9-22 |
| Systems, methods, and computer program products for passively routing secure … |
2007-1-19 |
2011-5-31 |
2011-5-31 |
| Systems, methods, and computer program products for passively transforming … |
2007-1-19 |
2008-6-19 |
|
| Storing and retrieving user context data |
2006-2-21 |
2007-8-30 |
|
| Debugging application performance over a network |
2005-6-22 |
2006-2-09 |
|
| Stateful attack protection |
2004-12-22 |
2006-6-22 |
|
| Content inspection in secure networks |
2004-8-03 |
2005-3-03 |
|
| Content security by network switch |
2003-11-14 |
2004-6-10 |
|
| Policy enforcement in dynamic networks |
2003-11-14 |
2004-9-09 |
|
| Passive SSL decryption |
2003-8-25 |
2005-3-03 |
|
| Persistent redirection engine |
2003-1-02 |
2003-7-03 |
|
| Multiple component connector plane for a network device |
2002-4-24 |
2006-10-17 |
2006-10-17 |
| Method and apparatus for discovering client proximity using race type … |
2001-12-27 |
2003-7-03 |
|
| Controlling traffic on links between autonomous systems |
2001-5-03 |
2002-11-07 |
|
| Method and apparatus for discovering client proximity network sites |
2000-11-30 |
2006-9-05 |
2006-9-05 |