Detecting device abnormality by comparing a current value of...
Detecting insertion of removable media
Detecting legacy powered device in power over ethernet system
Detecting malicious alteration of stored computer files
Detecting malicious software by analyzing patterns of system...
Detecting network power connection status using AC signals
Detecting software attacks by monitoring electric power...
Detecting states of signals
Detecting unwanted properties in received email messages
Detection and elimination of macro viruses
Detection and identification methods for software
Detection circuit and method for clearing BIOS configuration...
Detection method of illegal access to computer system
Detection of a digital data fingerprint
Detection of an attack such as a pre-attack on a computer...
Detection of computer viruses spanning multiple data streams
Detection of frequent and dispersed invariants
Detection of support components for add-in card
Detection of support components for add-in card
Detection of support for security protocol and address...