1
John C Munson, Sebastian G Elbaum: Dynamic software system intrusion detection. Cylant, Woodcock Washburn, January 20, 2004: US06681331 (151 worldwide citation)

A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented compute ...


2
John C Munson, Sebastian G Elbaum: Method of and system for detecting an anomalous operation of a computer system. Cylant, David H Judson, November 8, 2005: US06963983 (75 worldwide citation)

A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented compute ...


3
John C Munson, Sebastian G Elbaum: Method of and system for detecting an anomalous operation of a computer system. Reflex Security, David H Judson, August 4, 2009: US07571478 (33 worldwide citation)

A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented compute ...


4
John C Munson, Sebastian G Elbaum: Method of and system for detecting an anomalous operation of a computer system. David H Judson, Locke Liddell & Sapp, July 22, 2004: US20040143756-A1

A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented compute ...


5
John C Munson, Sebastian G Elbaum: Method of and system for detecting an anomalous operation of a computer system. Law Office Of David H Judson, March 30, 2006: US20060070118-A1

A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented compute ...