Detecting local graphic password deciphering attacks
Detecting malware carried by an e-mail message
Detecting method and architecture thereof for malicious codes
Detecting method for network intrusion
Detecting polymorphic threats
Detecting public network attacks using signatures and fast...
Detecting return-to-LIBC buffer overflows via dynamic...
Detecting rogue access points in a computer network
Detecting shellcode that modifies IAT entries
Detecting the presence of an installation on a data...
Detecting unsanctioned network servers
Detecting user-mode rootkits
Detecting variants of known threats
Detection and blocking of malicious code
Detection and minimization of false positives in...
Detection and removal of undesirable items in a data...
Detection of a class of viral code
Detection of decryption to identify encrypted virus
Detection of key logging software
Detection of malicious computer code