1
Christopher W Klaus: Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system. Internet Security Systems, Morris Manning & Martin L, April 6, 1999: US05892903 (438 worldwide citation)

A system and method is disclosed for detecting security vulnerabilities in a computer network. The system includes an IP spoofing attack detector, a stealth port service map generator, a source port verifier, source routing verifier, an RPC service detector and a Socks configuration verifier. Each o ...


2
Christopher Jay Rouland, Patrick Morton Becker, Christopher W Klaus: Method and system for dynamically protecting a computer system from attack. International Business Machines Corporation, King & Spalding, March 22, 2011: US07913303 (62 worldwide citation)

A dynamic protection system can analyze a computer system to determine its vulnerabilities to attack and generate a policy for protecting the computer system based on the identified vulnerabilities. Data received by the computer system can be analyzed to determine if it poses a threat to the system. ...


3
Christopher Jay Rouland, Patrick Morton Becker, Christopher W Klaus: Method and system for dynamically protecting a computer system from attack. International Business Machines Corporation, King & Spalding, July 23, 2013: US08495740 (13 worldwide citation)

A dynamic protection system can analyze a computer system to determine its vulnerabilities to attack and generate a policy for protecting the computer system based on the identified vulnerabilities. Data received by the computer system can be analyzed to determine if it poses a threat to the system. ...