Controlling and remotely monitoring accessed network data
Countering infections to communications modules
Critical period protection
Detecting polymorphic threats
Detection of nonconforming network traffic flow aggregates...
Detection of security vulnerabilities in computer programs
Detection of unauthorized access in a network
Determining relative attack surface
Determining threat level associated with network activity
Distributed computer network security activity model SDI-SCAM
Distributed network security service
Dynamic learning method and adaptive normal behavior profile...
Dynamic risk management
Efficient management and blocking of malicious code and...
Electronic vulnerability and reliability assessment
Electronic vulnerability and reliability assessment
End user risk management
End user risk management
Exception handling validation system and method
Extensible framework for system security state reporting and...