Quantcast
Channel: Network - IT, Communications & Networking - Columbia Technology Ventures
Browsing all 54 articles
Browse latest View live

Internet Radio/TV Networks

ms99-06-17 - “Lead Inventor: Henning Schulzrinne, Ph.D. Streaming Video/Audio from Internet Overload Server: Internet is an increasingly being used for delivering multimedia content, such as streaming...

View Article


Dynamically Addressing Circuit Network

m00-004 - Addressing Sources and Destinations of Information in Physical Data Network The network comprising the nodes is interconnected by links. Each Node in the network is assigned a set of...

View Article


Scheduling Interactive Audiovisual Presentations

m00-017 - “Name of the inventor: Hari Kalva Object-Based Audiovisual Presentation Scheduling Incorporated into Server A system and method for scheduling an object-based presentation that can be used as...

View Article

Data Sharing in Intermittently Connected Hosts

m00-018 - “Lead Inventor: Henning Schulzrinne, Ph.D. Wireless Networks with Sporadic Access in Buildings, Subways, Remote Areas Wireless networks may lack coverage inside a building, subways,...

View Article

Dynamic Provisioning for Differentiated Services (DiffServ)

m00-043 - “Lead Inventors: Raymond Rui-feng Liao; Andrew Campbell, Ph.D. Differentiated Services (DiffServ) for Quality-of-Service (QoS) Network Traffic requires Efficient Capacity Differentiated...

View Article


Distributed Computer System using Graphical User Interface Toolkit

m00-070 - “Name of the inventor: Steven Feiner Computer Systems with Distributed User Interfaces Methods and systems for computer systems having distributed user interfaces are described. Interface...

View Article

Malicious Software (Malware) Detection Using Byte Sequence Analysis

m01-039 - “Lead Inventor: Salvatore J. Stolfo, Ph.D. Malware and Viral Software Cause Disruption and Data Loss, Requiring Better Screening Strategies Malware and viral software is a serious problem in...

View Article

Computer System Intrusion Detection by Monitoring Operating System Registry...

m02-018 - “Lead Inventors: Salvatore J. Stolfo Ph.D., Frank Apap, Andrew Honig, Shlomo Hershkop Ph.D., Eleazar Eskin, Ph.D. Windows Operating System Virus Scanners Unable to Detect New Malicious...

View Article


Anomaly Detection and Adaptive Learning for Intrusion Detection Systems (IDSs)

m02-024 - “Lead Inventors: Salvatore J. Stolfo Ph.D., Wei Fan, Ph.D. Intrusion Detection Systems (IDSs) and Credit Card Fraud Detection Systems With increasingly critical data being stored on computer...

View Article


Intrusion Detection and E-Mail Security

m02-030 - “Lead Inventor: Salvatore J. Stolfo Ph.D. STV Reference: IR M02-030 & M02-031 Cyber Attacks on Computer Systems on the Rise: The number and sophistication of intrusion attacks on computer...

View Article

Intrusion Detection and E-Mail Security

m02-031 - “Lead Inventor: Salvatore J. Stolfo Ph.D. STV Reference: IR M02-030 & M02-031 Cyber Attacks on Computer Systems on the Rise: The number and sophistication of intrusion attacks on computer...

View Article

Anomaly Identification for Intrusion Detection and Forensics

m02-032 - “Lead Inventors: Salvatore J. Stolfo, Ph.D.; Eleazar Eskin; Leonid Portnoy Intrusion Detection for Computer Networks Rely on Databases of Known Intrusion Signatures: Existing intrusion...

View Article

Migrating Legacy and Networked Applications

m03-058 - “Lead Inventors: Jason Nieh, Ph.D., Dinesh K Subhraveti Improving Process Migration Expensive: Process migration, the ability to transfer a process from one computing device to another is a...

View Article


"Call Routing in IP (Internet Protocol) Based Telephony Network as PBX...

m01-059 - Telephony services are migrating over an IP-based network. Such services include call routing, voicemail, call forwarding, conferencing. An organization planning to deploy IP-based services...

View Article

Predictive Application Failures in Software Code Errors

m04-065 - “Lead Inventor: Angelos D. Keromytis, PhD. Tech Ventures Reference: IR M04-065, IR M05-081, IR M05-082 Intelligent software application instrumentation for code failure: Software applications...

View Article


Runtime detection and deactivation of malicious software

m04-074 - To detect malicious software behavior, this technology intercepts calls to operating system services and libraries and determines from what locations in memory the call originated. Calls made...

View Article

Detecting Targeted Attacks Using Shadow Honeypots in network security

m05-069 - “Lead Inventors: Angelos Keromytis, Ph.D.; Stylianos Sidiroglou; Kostas G. Anagnostakis Honeypots and anomaly detection systems capable of detecting new types of cumputer attacks: Intrusion...

View Article


Tracking Malicious Executables Using Unsupervised Online Learning

m05-075 - “Lead Inventors: Salvatore J. Stolfo, Ph.D.; Angelos D. Keromytis; Stylianos Sidiroglou Algorithm to detect viruses in email attachements removes vulnerability to zero-day malicious...

View Article

An encryption unit for IP protocol network security

m06-014 - “Lead Inventor: Angelos Keromytis, Ph.D. Problem or Unmet Need: IPsec provides a mechanism to establish a secure end-to-end channel between communicating parties. In an organization, such a...

View Article

Architecture to prevent denial-of-service attacks with stateless multipath...

m06-015 - “Lead Inventor: Angelos Keromytis, Ph.D. Websites and database security from denial-of-service attacks: Overlays networks can be used to mitigate the impact of denial-of-service attacks. They...

View Article
Browsing all 54 articles
Browse latest View live