Attack graph aggregation
Attack impact prediction system
Authenticating third party products via a secure...
Automated computer system security compromise
Automated computer vulnerability resolution system
Automated detection of cross site scripting vulnerabilities
Automated evidence gathering
Automated identification and clean-up of malicious computer...
Automated immune response for a computer
Automated rootkit detector
Automated security management
Automated security threat testing of web pages
Automated sniffer apparatus and method for wireless local...
Automated unpacking of executables packed by multiple layers...
Automatic builder of detection and cleaning routines for...
Automatic client responses to worm or hacker attacks
Automatic tracking cookie detection
Automating software security restrictions on applications
Automating software security restrictions on system resources