1
Phillip Andrew Porras, Michael G Corr, Steven Mark Dawson, David Watt, David Manseau, John Peter Marcotullio: Method and apparatus for identifying wireless transmitters. SRI International, August 21, 2012: US08249028 (156 worldwide citation)

In one embodiment, the present invention is a method and apparatus for identifying wireless transmitters. In one embodiment, a method for identifying a transmitter in a wireless computing network includes extracting one or more radio frequency signal characteristics from a communication from the tra ...


2
David W J Stringer Calvert, Steven Mark Dawson, Patrick D Lincoln: Methods and apparatus for scalable, distributed management of virtual private networks. SRI International, July 22, 2008: US07403980 (27 worldwide citation)

A groupware management system for collaborative groups is disclosed that is scalable to support large, dynamic, multiple, and other virtual VPNs. The system may introduce a graph (or hierarchical) structure to the VPN, providing multiple master nodes controlling membership in subsets of the collabor ...


3
Phillip Andrew Porras, Magnus Almgren, Ulf E Lindqvist, Steven Mark Dawson: Application-layer anomaly and misuse detection. SRI International, Kin Wah Tong Esq, Patterson & Sheridan, November 28, 2006: US07143444 (26 worldwide citation)

A method includes passing a request for data received by a first server process executing in a first server to a detection process that includes packing a subset of the data into an analysis format and passing the subset to an analysis process.


4
Phillip Andrew Porras, Michael G Corr, Steven Mark Dawson, David Watt, David Manseau, John Peter Marcotullio: Method and apparatus for wireless network security. SRI International, May 25, 2010: US07724717 (14 worldwide citation)

In one embodiment, the present invention is a method and apparatus for wireless network security. In one embodiment, a method for securing a wireless computing network includes receiving a communication from an unidentified transmitter, identifying the transmitter in accordance with a fingerprint ge ...


5
Phillip Andrew Porras, Michael G Corr, Steven Mark Dawson, David Watt, David Manseau, John Peter Marcotullio: Method and apparatus for identifying wireless transmitters. Patterson & Sheridan, Sri International, February 1, 2007: US20070025245-A1

In one embodiment, the present invention is a method and apparatus for identifying wireless transmitters. In one embodiment, a method for identifying a transmitter in a wireless computing network includes extracting one or more radio frequency signal characteristics from a communication from the tra ...


6
Phillip Andrew Porras, Michael G Corr, Steven Mark Dawson, David Watt, David Manseau, John Peter Marcotullio: Method and apparatus for wireless network security. Patterson & Sheridan, Sri International, February 1, 2007: US20070025265-A1

In one embodiment, the present invention is a method and apparatus for wireless network security. In one embodiment, a method for securing a wireless computing network includes receiving a communication from an unidentified transmitter, identifying the transmitter in accordance with a fingerprint ge ...


7
Phillip Andrew Porras, Magnus Almgren, Ulf E Lindqvist, Steven Mark Dawson: Application-layer anomaly and misuse detection. Moser Patterson & Sheridan, May 29, 2003: US20030101358-A1

A method includes passing a request for data received by a first server process executing in a first server to a detection process that includes packing a subset of the data into an analysis format and passing the subset to an analysis process.


8
David WJ Stringer Calvert, Steven Mark Dawson, Patrick D Lincoln: Methods and apparatus for scalable, distributed management of virtual private networks. Rutan & Tucker, May 9, 2002: US20020055989-A1

A groupware management system for collaborative groups is disclosed that is scalable to support large, dynamic, multiple, and other virtual VPNs. The system may introduce a graph (or hierarchical) structure to the VPN, providing multiple master nodes controlling membership in subsets of the collabor ...