This application claims the benefit of U.S. provisional application Serial No. 60/093,560, filed Jul. 21, 1998, entitled Information Security Analysis System. This application is a continuation of U.S. application Ser. No. 09/357,540, filed Jul. 19, 1999 and entitled “Information Security Analysis System”, now U.S. Pat. No. 6,304,262.
Number | Name | Date | Kind |
---|---|---|---|
5361359 | Tajalli et al. | Nov 1994 | A |
5410648 | Pazel | Apr 1995 | A |
5414833 | Hershey | May 1995 | A |
5440723 | Arnold et al. | Aug 1995 | A |
5537540 | Miller et al. | Jul 1996 | A |
5555419 | Arsenault | Sep 1996 | A |
5608854 | Labedz et al. | Mar 1997 | A |
5684945 | Chen et al. | Nov 1997 | A |
5794046 | Meier et al. | Aug 1998 | A |
5796951 | Hamner | Aug 1998 | A |
5819094 | Sato et al. | Oct 1998 | A |
5822535 | Takase et al. | Oct 1998 | A |
5832208 | Chen et al. | Nov 1998 | A |
5845081 | Rangarajan et al. | Dec 1998 | A |
5923849 | Venkatraman | Jul 1999 | A |
5958010 | Agarwal et al. | Sep 1999 | A |
5960170 | Chen et al. | Sep 1999 | A |
5960439 | Hamner et al. | Sep 1999 | A |
5991881 | Conklin et al. | Nov 1999 | A |
6026442 | Lewis et al. | Feb 2000 | A |
6043825 | Glenn et al. | Mar 2000 | A |
6076106 | Hamner et al. | Jun 2000 | A |
6088804 | Hill et al. | Jul 2000 | A |
6304262 | Maloney et al. | Oct 2001 | B1 |
Number | Date | Country |
---|---|---|
409171460 | Jun 1997 | JP |
WO 9842103 | Sep 1998 | WO |
Entry |
---|
Deri L., Mankis D., “VRML: Adding 3D to Network Management”, 4th International Conference on Intelligence in Services and Networks, pp. 469-477, 1997. |
Law A M et al., “Simulation Software for Communications Networks: The State of the Art,” IEEE Communications Magazine, vol. 32, No. 3, pp. 44-50, 1994. |
Chang C K; Al-Saloan Y Y; Defanti T, Scientific Visualization; A Performance Study of CSMA/CD with Connected Data Links—(Hybride-Ethernet), Proceedings of the Third Workshop on Future Trends of Distributed Computing Systems, pp. 389-394, 1992. |
Sczepansky, A, “Auf Herz Und Nieren Pruefen”, Elektronik, De, Franzis Verlag GMBH, pp. 78-81, 1997, Apr. 2, 1997. |
Yau S S et al., “An Interactive Software maintenance Environment,” AFIPS Conference Proceedings, pp. 553, 555-561, 1987 Jun. 1987. |
Lo R. et al., “Towards a Testbed for Malicious Code Detection,” Computer Society Annual Conference, pp. 160-166, 1961. |
Saito T et al., “Protection Against Trojan Horses by Source Code Analysis,” Electronics & Communications in Japan, Part III—Fundamental Electronic Science, pp. 11-18, 1994 Jan. 1994. |
Number | Date | Country | |
---|---|---|---|
60/093560 | Jul 1998 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09/357540 | Jul 1999 | US |
Child | 09/903115 | US |