Software protection injection at load time
Software security based on control flow integrity
Software system with controlled access to objects
Software-hardware partitioning in a virus processing system
Source code repair method for malicious code detection
Source/destination operating system type-based IDS...
Spam detector with challenges
Spam honeypot domain identification
Specification-based anomaly detection
Specification-based anomaly detection
Stateful and cross-protocol intrusion detection for voice...
Stateful and cross-protocol intrusion detection for voice...
Stateful attack protection
Static code image modeling and recognition
Statistical methods for detecting TCP SYN flood attacks
Stealth threat detection
Storage based apparatus for antivirus
Storage conversion for anti-virus speed-up
Storage system, virus infection spreading prevention method,...
Strategies for ensuring that executable content conforms to...