Search
Selected: All

Filter generation

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Finite state automaton compression

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Flood attack projection model

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Flow-based detection of network intrusions

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Flow-based method for tracking back single packets

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fraudulent message detection

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fraudulent message detection

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Fuzzy scanning system and method

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Generating a multiple-prerequisite attack graph

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Generating code to validate input data

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Generating malware definition data for mobile computing devices

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Generating malware definition data for mobile computing devices

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Generic detection and elimination of marco viruses

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Generic method for detecting attack programs hidden in data...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Hardware-based anti-virus system

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Hardware-based intrusion detection accelerator

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Heuristic detection of malicious computer code by page tracking

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Heuristic detection of polymorphic computer viruses based on...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Hierarchy-based method and apparatus for detecting attacks...

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Host intrusion prevention server

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.