Detecting and preventing malcode execution
Detecting and removing rootkits from within an infected...
Detecting anomalous web proxy activity
Detecting buffer overflows using frame pointer characteristics
Detecting content in files
Detecting dissemination of malicious programs
Detecting fraudulent activity by analysis of information...
Detecting local graphic password deciphering attacks
Detecting malware carried by an e-mail message
Detecting method and architecture thereof for malicious codes
Detecting method for network intrusion
Detecting polymorphic threats
Detecting public network attacks using signatures and fast...
Detecting return-to-LIBC buffer overflows via dynamic...
Detecting rogue access points in a computer network
Detecting shellcode that modifies IAT entries
Detecting the presence of an installation on a data...
Detecting unsanctioned network servers
Detecting user-mode rootkits
Detecting variants of known threats