Detachable I/O device for computer data security
Detecting collusion among multiple recipients of...
Detecting malicious alteration of stored computer files
Detecting malicious software by analyzing patterns of system...
Detection and elimination of macro viruses
Detection and identification methods for software
Detection method of illegal access to computer system
Detection of a digital data fingerprint
Detection of an attack such as a pre-attack on a computer...
Detection of computer viruses spanning multiple data streams
Detection of frequent and dispersed invariants
Detection of support for security protocol and address...
Determination of a best offset to detect an embedded pattern
Determining point of interaction device security properties...
Determining the reputation of a sender of communications
Determining theft of grammar code
Deterministic user authentication service for communication netw
Deterministic user authentication service for communication...
Deterministic user authentication service for communication...
Device and method for authenticating user's access rights to...