1
Stuart C McClure, George Kurtz, Robin Keir, Marshall A Beddoe, Michael J Morton, Christopher M Prosise, David M Cole, Christopher Abad: System and method for network vulnerability detection and reporting. McAfee, Zilka Kotab PC, Christopher J Hamaty, December 19, 2006: US07152105 (169 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


2
Marshall A Beddoe, Thomas A Maufer: Meta-instrumentation for security analysis. Mu Dynamics, Fenwick & West, August 10, 2010: US07774637 (76 worldwide citation)

A system and method for analyzing and/or testing member devices in a multi-device system. The multi-device system includes a device-under-analysis (DUA) and a device-under-observation (DUO). An analyzer that is external to the multi-device system generates and sends test messages to the DUA. The ana ...


3
Stuart C McClure, George Kurtz, Robin Keir, Marshall A Beddoe, Michael J Morton, Christopher M Prosise, David M Cole, Christopher Abad: System and method for network vulnerability detection and reporting. McAfee, Zilka Kotab PC, June 2, 2009: US07543056 (66 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


4
Stuart C McClure, George Kurtz, Robin Keir, Marshall A Beddoe, Michael J Morton, Christopher M Prosise, David M Cole, Christopher Abad: System and method for network vulnerability detection and reporting. McAfee, Patent Capital Group, March 13, 2012: US08135830 (35 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


5
Stuart C McClure, George Kurtz, Robin Keir, Marshall A Beddoe, Michael J Morton, Christopher M Prosise, David M Cole, Christopher Abad: System and method for network vulnerability detection and reporting. McAfee, Patent Capital Group, December 24, 2013: US08615582 (19 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


6
Marshall A Beddoe, Stuart C McClure: System and method of network endpoint security. McAfee, Zilka Kotab PC, September 7, 2010: US07793338 (18 worldwide citation)

A system and a method enhance endpoint security of a computer network. The system and method generate security assessments of hosts on quarantined and non-quarantined networks. Based on the generated security assessments, secure hosts are connected to the non-quarantined network and non-secure or vu ...


7
Stuart C McClure, George Kurtz, Robin Keir, Marshall A Beddoe, Michael J Morton, Christopher M Prosise, David M Cole, Christopher Abad: System and method for network vulnerability detection and reporting. McAfee, Patent Capital Group, December 31, 2013: US08621073 (17 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


8
Stuart C McClure, George Kurtz, Robin Keir, Marshall A Beddoe, Michael J Morton, Christopher M Prosise, David M Cole, Christopher Abad: System and method for network vulnerability detection and reporting. McAfee, Patent Capital Group, December 31, 2013: US08621060 (15 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


9
Marshall A Beddoe, Kowsik Guruswamy: Modification of messages for analyzing the security of communication protocols and channels. Spirent Communications, Haynes Beffel & Wolfeld, Ernest J Beffel Jr, December 3, 2013: US08601585 (11 worldwide citation)

A system is used to analyze the implementation of a protocol by a device-under-analysis (DUA). The system includes a source endpoint, a destination endpoint (the DUA), and a message generator. The source endpoint generates an original message and attempts to send it to the DUA. The original message ...


10
Marshall A Beddoe, Thomas A Maufer: Meta-instrumentation for security analysis. MU Dynamics, K&L Gates, December 6, 2011: US08074097 (2 worldwide citation)

A system and method for analyzing and/or testing member devices in a multi-device system. The multi-device system includes a device-under-analysis (DUA) and a device-under-observation (DUO). An analyzer that is external to the multi-device system generates and sends test messages to the DUA. The ana ...