Update status alerting for a malware scanner
Updating malware definition data for mobile data processing...
Use of a programmable network processor to observe a flow of...
Use of geo-location data for spam detection
User interface for network security console
Using a benevolent worm to assess and correct computer...
Using a virus checker in one file server to check for...
Using a virus checker in one file server to check for...
Using antimalware technologies to perform offline scanning...
Using asynchronous changes to memory to detect malware
Using differential information entropy to detect bugs and...
Using fuzzy classification models to perform matching...
Using security-related attributes
Using threshold lists for worm detection
Utilizing early exclusive volume access and direct volume...
Validating a memory type modification attempt
Validating active computer terminal sessions
Validation of secure sockets layer communications
Variable scan of files based on file context
Verification of software application authenticity