Data collectors in connection-based intrusion detection
Data driven detection of viruses
Detecting and countering malicious code in enterprise networks
Detecting computer programs within packed computer files
Detecting unwanted properties in received email messages
Distributed system and method for conducting a comprehensive...