Detection and blocking of malicious code
Detection and minimization of false positives in...
Detection and removal of undesirable items in a data...
Detection of a class of viral code
Detection of decryption to identify encrypted virus
Detection of key logging software
Detection of malicious computer code
Detection of malicious programs
Detection of misuse of authorized access in an information...
Detection of nonconforming network traffic flow aggregates...
Detection of observers and countermeasures against observers
Detection of polymorphic script language viruses by data...
Detection of security vulnerabilities in computer programs
Detection of softswitch attacks
Detection of SYSENTER/SYSCALL hijacking
Detection of unauthorized access in a network
Detection of undesired computer files in archives
Determination of related entities
Determining a source of malicious computer element in a...
Determining relative attack surface