1
Timothy P Farley, John M Hammer, Bryan Douglas Williams, Philip Charles Brass, George C Young, Derek John Mezack: Method and system for managing computer security information. Internet Security Systems, King & Spalding, August 8, 2006: US07089428 (119 worldwide citation)

A security management system includes a fusion engine which “fuses” or assembles information from multiple data sources and analyzes this information in order to detect relationships between raw events that may indicate malicious behavior and to provide an organized presentation of information to co ...


2
Timothy P Farley, John M Hammer, Bryan Douglas Williams, Philip Charles Brass, George C Young, Derek John Mezack: Method and system for managing computer security information. International Business Machines Corporation, King & Spalding, March 20, 2012: US08141157 (16 worldwide citation)

A security management system includes a fusion engine which “fuses” or assembles information from multiple data sources and analyzes this information in order to detect relationships between raw events that may indicate malicious behavior and to provide an organized presentation of information to co ...


3
Timothy P Farley, John M Hammer, Bryan Douglas Williams, Philip Charles Brass, George C Young, Derek John Mezack: Method and System for Managing Computer Security Information. Internet Security Systems, Steven, Wigmore, June 20, 2002: US20020078381-A1 (1 worldwide citation)

Abstract of Disclosure A security management system includes a fusion engine which "fuses" or assembles information from multiple data sources and analyzes this information in order to detect relationships between raw events that may indicate malicious behavior and to provide an organized presentati ...


4
Timothy P Farley, John M Hammer, Bryan Douglas Williams, Philip Charles Brass, George C Young, Derek John Mezack: Method and system for managing computer security information. Internet Security Systems, King & Spalding, November 23, 2006: US20060265746-A1

A security management system includes a fusion engine which “fuses” or assembles information from multiple data sources and analyzes this information in order to detect relationships between raw events that may indicate malicious behavior and to provide an organized presentation of information to co ...


5
Derek John Mezack, David M Hodges, Donald Jay Hodges: System and Method for Definition and Automated Analysis of Computer Security Threat Models. Parks Knowlton Pk001, June 19, 2008: US20080148398-A1

A network security analysis tool and related systems and methods are disclosed. The disclosed invention can accept user input to define network security threat models. The system can collect event data from one or more network devices and analyze that data for the existence of activity matching the ...


6
Timothy P Farley, John M Hammer, Bryan Douglas Williams, Philip Charles Brass, George C Young, Derek John Mezack: Method and System for Managing Computer Security Information. King & Spalding, Intellectual Property Dept Patents, April 1, 2010: US20100083382-A1

A security management system includes a fusion engine which “fuses” or assembles information from multiple data sources and analyzes this information in order to detect relationships between raw events that may indicate malicious behavior and to provide an organized presentation of information to co ...