1
Mike Moran, Tauras Liubinskas, Jack Goral: Application performance monitoring expert. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, October 5, 2004: US06801940 (309 worldwide citation)

A system, method, and computer program product are provided for expert application performance analysis. An application is monitored. Performance data is gathered during the monitoring. A set of metrics is generated based on the performance data. A performance of the application is measured from at ...


2
Mike Moran, Tauras Liubinskas, Jack Goral: Prioritized data capture, classification and filtering in a network monitoring environment. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group, October 14, 2003: US06633835 (292 worldwide citation)

A system, method and computer program product are provided for adaptive priority data filtering. Data is collected from a network segment and classified into multiple flows. The flows are prioritized into high and low priority flows. High priority flows are stored in a high priority queue prior to p ...


3
Bryson P Gordon, Thor Ivar Ekle: Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, May 4, 2004: US06732157 (222 worldwide citation)

A system, method and computer program product are provided for filtering unwanted electronic mail messages. After receiving electronic mail messages, the electronic mail messages that are unwanted are filtered utilizing a combination of techniques including: compound filters, paragraph hashing, and ...


4
Cheuk W Ko, Jaisook Rho: Method and apparatus for providing a policy-driven intrusion detection system. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, September 7, 2004: US06789202 (192 worldwide citation)

One embodiment of the present invention provides a providing policy-driven intrusion detection system for a networked computer system. This system operates by receiving a global policy for intrusion detection for the networked computer system. This global policy specifies rules in the form of a glob ...


5
Lee Codel Lawson Tarbotton, Daniel Joseph Wolff, Nicholas Paul Kelly: Detecting unwanted properties in received email messages. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, June 29, 2004: US06757830 (188 worldwide citation)

Received e-mail messages are subject to a minimum delay period determined in dependence upon characteristics of the e-mail message received. Prior to release of the e-mail message upon expiry of the minimum delay period a check is made that the most up-to-date anti-virus and anti-spamming tests have ...


6
James S Magdych, Tarik Rahmanovic, John R McDonald, Brock E Tellier: System, method and computer program product for risk assessment scanning based on detected anomalous events. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group, April 8, 2003: US06546493 (185 worldwide citation)

A system, method and computer program product are provided for scanning a source of suspicious network communications. Initially, network communications are monitored for violations of policies. Then, it is determined whether the network communications violate at least one of the policies. Further, ...


7
Satish Shetty: Protocol-level malware scanner. Networks Associates Technology, Christopher J Hamaty, Swidler Berlin Shereff Friedman, August 3, 2004: US06772345 (185 worldwide citation)

A method, system, and computer program product for malware scanning of data that is being transferred or downloaded to a computer system that is performed at the protocol level, and is capable of blocking the spread of malwares that may not be blocked by operating system level scanning. A method of ...


8
Anton C Rothwell, Luke D Jagger, William R Dennis, David R Clarke: Intelligent SPAM detection system using an updateable neural analysis engine. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, July 27, 2004: US06769016 (183 worldwide citation)

A system, method and computer program product are provided for detecting an unwanted message. First, an electronic mail message is received. Text in the electronic mail message is decomposed. Statistics associated with the text are gathered using a statistical analyzer. A neural network engine coupl ...


9
Mark James McArdle, Steven Blair Schoenfeld: System and methodology for messaging server-based management and enforcement of crypto policies. Networks Associates Technology, Patrick J S Inouye, John A Smart, Christopher J Hamaty, August 27, 2002: US06442686 (181 worldwide citation)

A cryptographic-enabled messaging system providing a “Policy Management Agent” is described. The Policy Management Agent works in conjunction with a standard mail server, such as an SMTP (Simple Mail Transport Protocol) mail server, to ensure that incoming and outgoing e-mail adheres to the policies ...


10
Victor Kouznetsov: Method and system for updating anti-intrusion software. Networks Associates Technology, Kevin J Zilka, Christopher J Hamaty, Silicon Valley IP Group PC, April 20, 2004: US06725377 (176 worldwide citation)

A method and system for updating anti-intrusion software is provided. In a preferred embodiment, a computer program product updates anti-intrusion software on a computer network which has an anti-intrusion monitor server. The anti-intrusion monitor server recognizes attacks on the computer network i ...