Spam detector with challenges
Spam honeypot domain identification
Specification-based anomaly detection
Specification-based anomaly detection
Stateful and cross-protocol intrusion detection for voice...
Stateful and cross-protocol intrusion detection for voice...
Stateful attack protection
Static code image modeling and recognition
Statistical methods for detecting TCP SYN flood attacks
Stealth threat detection
Storage based apparatus for antivirus
Storage conversion for anti-virus speed-up
Storage system, virus infection spreading prevention method,...
Strategies for ensuring that executable content conforms to...
Stream scanning through network proxy servers
Streaming algorithms for robust, real-time detection of DDoS...
Structures and methods for using geo-location in security...
Supporting options in a communication session using a TCP...
Switch-user security for UNIX computer systems
Switching device, method, and computer program for efficient...