Detecting polymorphic threats
Detection of nonconforming network traffic flow aggregates...
Detection of security vulnerabilities in computer programs
Detection of unauthorized access in a network
Determining relative attack surface
Determining threat level associated with network activity
Distributed computer network security activity model SDI-SCAM
Distributed network security service
Dynamic learning method and adaptive normal behavior profile...
Dynamic risk management