Search
Selected: All

Behavior profiling

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Behavioral learning based security

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Blocking replication of e-mail worms

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Buffer overflow vulnerability detection and patch generation...

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Byte-distribution analysis of file security

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Cache hint correction for security scanning

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Centralized data transformation

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Centrally managed malware scanning

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Characterizing computer attackers

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Child identity monitor

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Child identity monitor

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Classification of software on networked systems

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Client apparatus, server apparatus and authority control method

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Client compliancy with self-policing clients

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Client-side technique for detecting software robots

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Code module operating system (OS) interactions intercepting...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Combining virus checking and replication filtration

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Communication apparatus, communication method, and recording...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Communication apparatus, communication method, and recording...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Communication apparatus, communication method, and recording...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.