Search
Selected: All

Protection against flooding of a server

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protection of computer resources

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protection of sensitive data from malicious e-mail

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protocol identification by heuristic content analysis

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protocol-generic eavesdropping network device

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protocol-parsing state machine and method of using same

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Push alert system, method, and computer program product

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Rapid analysis of data stream for malware presence

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Rapid application security threat analysis

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Rapidly propagating threat detection

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Rate limiting data traffic in a network

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Real time active network compartmentalization

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Real time malicious software detection

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Real time monitoring and analysis of events from multiple...

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Real time monitoring and analysis of events from multiple...

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Real time monitoring and analysis of events from multiple...

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Real-time network attack pattern detection system for...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Real-time recovery of compromised information

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Recovering from device failure

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Reducing false positive computer virus detections

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.