Using a modulation transfer function of a device to create...
Using a virus checker in one file server to check for...
Using a virus checker in one file server to check for...
Using an object model to improve handling of personally...
Using antimalware technologies to perform offline scanning...
Using asynchronous changes to memory to detect malware
Using differential information entropy to detect bugs and...
Using fuzzy classification models to perform matching...
Using GAA to derive and distribute proxy mobile node home...
Using object based security for controlling object specific...
Using packet filters and network virtualization to restrict...
Using patterns to perform personal identification data...
Using permissions to allocate device resources to an...
Using security-related attributes
Using threshold lists for worm detection
Utilizing a mobile device to operate an electronic locking...
Utilizing early exclusive volume access and direct volume...
Validating a memory type modification attempt
Validating active computer terminal sessions
Validation of secure sockets layer communications