Behavior profiling
Behavioral learning based security
Blocking replication of e-mail worms
Buffer overflow vulnerability detection and patch generation...
Byte-distribution analysis of file security
Cache hint correction for security scanning
Centralized data transformation
Centrally managed malware scanning
Characterizing computer attackers
Child identity monitor
Child identity monitor
Classification of software on networked systems
Client apparatus, server apparatus and authority control method
Client compliancy with self-policing clients
Client-side technique for detecting software robots
Code module operating system (OS) interactions intercepting...
Combining virus checking and replication filtration
Communication apparatus, communication method, and recording...
Communication apparatus, communication method, and recording...
Communication apparatus, communication method, and recording...