Filter generation
Finite state automaton compression
Flood attack projection model
Flow-based detection of network intrusions
Flow-based method for tracking back single packets
Fraudulent message detection
Fraudulent message detection
Fuzzy scanning system and method
Generating a multiple-prerequisite attack graph
Generating code to validate input data
Generating malware definition data for mobile computing devices
Generating malware definition data for mobile computing devices
Generic detection and elimination of marco viruses
Generic method for detecting attack programs hidden in data...
Hardware-based anti-virus system
Hardware-based intrusion detection accelerator
Heuristic detection of malicious computer code by page tracking
Heuristic detection of polymorphic computer viruses based on...
Hierarchy-based method and apparatus for detecting attacks...
Host intrusion prevention server