Evidence-based application security
Evidence-based security policy manager
Exception handling validation system and method
Excising compromised routers from an ad-hoc network
Exploit-based worm propagation mitigation
Extendible security token management architecture and secure...
Extensible framework for system security state reporting and...
Extensible security architecture for an interpretive...