$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System for determining web application vulnerabilities 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/19
  • G06F-011/30
  • G06F-017/30
출원번호 US-0800090 (2001-03-05)
발명자 / 주소
  • Reshef, Eran
  • El-Hanany, Yuval
  • Raanan, Gil
  • Tsarfati, Tom
출원인 / 주소
  • Sanctum Ltd.
대리인 / 주소
    Brown, Raysman, Millstein, Felder & Steiner LLP
인용정보 피인용 횟수 : 287  인용 특허 : 49

초록

A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client request

대표청구항

A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client request

이 특허에 인용된 특허 (49)

  1. Hill Douglas W. ; Lynn James T., Adaptive system and method for responding to computer network security attacks.
  2. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  3. Skeen Marion D. (3826 Magnolia Dr. Palo Alto CA 94306) Bowles Mark (30 Tripp Ct. Woodside CA 94062), Apparatus and method for providing decoupling of data exchange details for providing high performance communication betw.
  4. Skeen Marion D. (Palo Alto CA) Bowles Mark (Woodside CA), Apparatus and method for providing decoupling of data exchange details for providing high performance communication betw.
  5. Gupta Sarbari (Rockville MD) Gligor Virgil D. (Chevy Chase MD), Automated penetration analysis system and method.
  6. Shostack Adam ; Allouch David,ILX, Computer security.
  7. Kalkunte Ramsesh S., Computer system and computer implemented process for performing user-defined tests of a client-server system with run time compilation of test results.
  8. Amstein Peter R. ; Blumer Thomas P. ; Coburn ; IV Arthur L. ; Forgaard Randy J. ; Schulert Andrew J. ; Stefanik Ted ; Mauceri Robert J., Computer system and computer-implemented process for creation and maintenance of online services.
  9. Duxbury Paul (Sandbach GB2), Computer system security.
  10. Hirsch Thomas S. (Bedford MA) Bianchi Richard S. (Billerica MA) Perry Ron B. (Wilton NH) Buck Kenneth J. (Tyngsboro MA), Copy file mechanism for transferring files between a host system and an emulated file system.
  11. Robert E. Gleichauf ; Gerald S Lathem ; Scott V. Waddell, Domain mapping method and system.
  12. Julie Lynn Huff ; Tracy Glenn Shelanskey ; Sheila Ann Jackson, Dynamic system defense for information warfare.
  13. Teng Henry Shao-Lin, Expert system having a plurality of security inspectors for detecting security flaws in a computer system.
  14. Cheng Josephine M. ; Shen HongHai ; Watts Steven John, Generic SQL query agent.
  15. Botz Patrick Samuel ; Moskalik Thomas Michael ; Snyder Devon Daniel ; Woodbury Carol Jean, Generic user authentication for network computers.
  16. Fudge Bob, Method and apparatus for checking security vulnerability of networked devices.
  17. Curtis Bryce Allen, Method and apparatus for creating a secure connection between a java applet and a web server.
  18. Klaus Christopher W., Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication sy.
  19. Abraham Dalen M. ; Barnes Todd A. ; Bouche Paul F. ; Bougetz Thomas P. ; Gosselin Tracy A. ; Grieve Mark G. ; Langdon Brent A. ; Allison Robert C. ; Nikkel Michael S., Method and apparatus for managing internetwork and intranetwork activity.
  20. Gleichauf Robert E. ; Randall William A. ; Teal Daniel M. ; Waddell Scott V. ; Ziese Kevin J., Method and system for adaptive network security using network vulnerability assessment.
  21. Raanan Gil,ILX ; Moran Tal,ILX ; Galant Yoron ; El-Hanani Yuval,ILX ; Reshef Eran, Method and system for extracting application protocol characteristics.
  22. Rogers Richard Michael (Beacon NY) Lagarde Konrad Charles (Milford CT), Method for fulfilling requests of a web browser.
  23. Crozier Keith (Acton MA), Method for mapping, translating, and dynamically reconciling data between disparate computer platforms.
  24. Todd ; Sr. Robert E. ; Glahe Aaron C. ; Pendleton Adam H., Method for network self security assessment.
  25. Bruno Richard Frank ; Katseff Howard Paul ; Markowitz Robert Edward ; Perea Carlos Alberto ; Robinson Bethany Scott ; Suresh Sethuraman ; Williams Hugh L., Network access to internet and stored multimedia services from a terminal supporting the H.320 protocol.
  26. Anderson Craig D. ; Anderson Mark B. ; Cookmeyer Eugene N. ; Daniels Ralph A. ; Wheat Lee E. ; Lingle Roger A., Protocol analyzer for monitoring digital transmission networks.
  27. Ross Jay B. (Pennington NJ), Protocol converter for a secure FAX transmission system.
  28. Autrey Kevin ; Gessel Robert J., Protocol interface gateway and method of connecting an emulator to a network.
  29. Mousseau Gary P. (Waterloo CAX) Lazaridis Mihal (Waterloo CAX) Little Herb A. (Waterloo CAX) Barnstijn Michael A. (Waterloo CAX), Remote control of gateway functions in a wireless data communication network.
  30. Jacobs Dwayne C. (Austin TX) Wangler James A. (Cedar Park TX), Remote password administration for a computer network among a plurality of nodes sending a password update message to al.
  31. Scarr James L. (Akron OH) Karolick Katherine (Brecksville OH) Reid Nacine M. (Parma Hights OH) Pressler Armin (Indianapolis IN) Bartkus Sandy J. (Midland MI), Script-based system for testing a multi-user computer system.
  32. Leshem Eran,ILX ; Weinberg Amir,ILX, Software system and associated methods for facilitating the analysis and management of web sites.
  33. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  34. Kimura Nobuko,JPX ; Onodera Takashi,JPX ; Yokoshi Noriyuki,JPX, System and method for converting communication protocols.
  35. Seitz Greg, System and method for optimal multiplexed message aggregation between client applications in client-server networks.
  36. Pepe David Mathew (Middletown NJ) Blitzer Lisa B. (Manalapan NJ) Brockman James Joseph (Perrineville NJ) Cruz William (Eatontown NJ) Hakim Dwight Omar (Matawan NJ) Hovey Richard Reid (Somerville NJ) , System and method for providing protocol translation and filtering to access the world wide web from wireless or low-ban.
  37. Wied William J. ; Loa Kanchei, System and method of communicating between trusted and untrusted computer systems.
  38. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  39. Kiyohara Toshimi (Nara JPX) Yamaguchi Tomohisa (Ikoma JPX), System for accessing peripheral devices connected in network.
  40. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  41. Held Andrew G. (Kirkland WA) Jung Edward (Seattle WA) Zbikowski Mark (Woodinville WA), System for selectively setting a server node, evaluating to determine server node for executing server code, and downloa.
  42. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  43. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  44. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  45. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  46. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  47. Casella Stephen R. ; Bardani ; Jr. Robert L. ; Swan David M., Testing and debugging tool for network applications.
  48. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  49. Stewart Gordon Gregory, Web server mechanism for processing function calls for dynamic data queries in a web page.

이 특허를 인용한 특허 (287)

  1. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  2. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  3. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  4. Guruswamy, Kowsik, Analyzing the security of communication protocols and channels for a pass through device.
  5. Guruswamy, Kowsik, Analyzing the security of communication protocols and channels for a pass-through device.
  6. Adar, Eyal, Apparatus and methods for assessing and maintaining security of a computerized system under development.
  7. Ben-Itzhak, Yuval, Application layer security method and system.
  8. Chess, Brian V.; Ragoler, Iftach; Hamer, Philip Edward; Spitler, Russell Andrew; Fay, Sean Patrick; Jagdale, Prajakta Subbash, Application security testing.
  9. Chess, Brian V.; Ragoler, Iftach; Hamer, Philip Edward; Spitler, Russell Andrew; Fay, Sean Patrick; Jagdate, Prajakta Subbash, Application security testing.
  10. Ben Itzhak,Yuval, Application-layer security method and system.
  11. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  12. Apfelbaum, Larry; Houh, Henry; Mayberry, Thomas; Friedman, George, Automated security threat testing of web pages.
  13. Sima, Caleb, Automated user interaction in application assessment.
  14. Peinado, Marcus; Cui, Weidong; Wang, Jiahe Helen; Locasto, Michael E., Automatic data patch generation for unknown vulnerabilities.
  15. Samuels, Allen R.; Sutter, Paul G., Automatic detection and window virtualization for flow control.
  16. Samuels, Allen R.; Sutter, Paul G., Automatic detection and window virtualization for flow control.
  17. Shulman, Amichai; Boodaei, Michael; Kramer, Shlomo, Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications.
  18. Shulman, Amichai; Boodaei, Michael; Kramer, Shlomo, Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications.
  19. Bromwich, Adam, Automatic training of a database intrusion detection system.
  20. Lee, Teck Hua; Look, Gary; Zhang, Hugh; Ahmed, Diar; Singh, Prashant, Automatically testing a web application that has independent display trees.
  21. Weisman, Omri, Browser based method of assessing web application vulnerability.
  22. Brennan, Todd, Centralized timed analysis in a network security system.
  23. Nachenberg,Carey, Computer code intrusion detection system based on acceptable retrievals.
  24. Meier, John D., Configuring and organizing server security information.
  25. Brennan, Todd, Content extractor and analysis system.
  26. Tagg, James P., Cooperative network for mobile internet access.
  27. Tagg, James P., Cooperative network for mobile internet access.
  28. Tagg, James P., Cooperative network for mobile internet access.
  29. Kimmel, Gerald D.; Adamouski, Francis J.; Domangue, Ersin L.; Kimmel, Wayne R.; Lightburn, James G.; Viola, Leonard R., Cryptographic key management.
  30. Neystadt, Eugene; Natanov, Nissim; Shmouely, Meir; Singer, Yoram, Delivering malformed data for fuzz testing to software applications.
  31. Spielman, Chaim, Detecting anomalous web proxy activity.
  32. Nachenberg,Carey S.; Yung,Pak Wai, Detecting code injection attacks against databases.
  33. Bromwich, Adam; Wilhelm, Jeffrey, Determining origins of queries for a database intrusion detection system.
  34. Zhang, Hugh; Lee, Teck Hua; Chow, Kevin; Ahmed, Diar; Singh, Prashant, Drag and drop interaction between components of a web application.
  35. Shulman, Amichai; Boodaei, Michael; Kramer, Shlomo, Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications.
  36. Shulman, Amichai; Boodaei, Michael; Kremer, Shlomo, Dynamic learning method and adaptive normal behavior profile (NBP) architecture for providing fast protection of enterprise applications.
  37. Samuels, Allen R.; Sutter, Paul G., Early generation of acknowledgements for flow control.
  38. Samuels, Allen; Sutter, Paul, Early generation of acknowledgements for flow control.
  39. Nachenberg, Carey; Wawda, Abu; Bromwich, Adam; Lee, On; Sanders, Darren, Effective aggregation and presentation of database intrusion incidents.
  40. Seymour, Harlan; Satish, Sourabh; Yeh, Anne; Yeung, Benjamin, Empirical database access adjustment.
  41. Leavy, Penny C.; Hoglund, Michael Gregory; Gary, Jonathan Walter; Eller, Riley Dennis, Fault injection methods and apparatus.
  42. Leavy,Penny C.; Hoglund,Michael Gregory; Gary,Jonathan Walter; Eller,Riley Dennis, Fault injection methods and apparatus.
  43. Hartmann, Alfred C., Filtering training data for machine learning.
  44. Samuels, Allen R.; Sutter, Paul G., Flow control system architecture.
  45. Samuels, Allen R.; Sutter, Paul G., Flow control system architecture.
  46. Guruswamy, Kowsik; Baggott, Nick; Vasan, Sundar; Khodosh, Yuri; Helder, David, Generating communication protocol test cases based on network traffic.
  47. Kanadam, Raghuram, Hybrid network software provision.
  48. Villavicencio, Francisco J., Impersonation in an access system.
  49. Villavicencio,Francisco J., Impersonation in an access system.
  50. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Sikka, Namit, Inferencing data types of message components.
  51. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Sikka, Namit, Inferencing data types of message components.
  52. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Sikka, Namit, Inferencing data types of message components.
  53. Kimmel, Gerald D.; Domangue, Ersin L.; Adamouski, Francis J., Information-centric security.
  54. Sima, Caleb; Millar, Steve; Kelly, Raymond; Sullivan, Bryan; Sullivan, Gerald; Tillery, David, Integrated crawling and auditing of web applications and web content.
  55. Hurst,Dennis Wayne; Barrall,Darrin Ray; Sima,Caleb Ikaki, Internet security analysis system and process.
  56. Flowers, John S.; Stracener, Thomas C., Interoperability of vulnerability and intrusion detection systems.
  57. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  58. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  59. Hodges, Jeffrey D., Intrusion threat detection.
  60. Joshi, Vrinda S.; Ramamurthy, Srinivasagapala, Logging access system events.
  61. Park, Soo Hwan, Managing clients utilizing reverse transactions.
  62. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
  63. Simmons, Timothy, Method and apparatus for associating tickets in a ticket hierarchy.
  64. Simmons, Timothy Ernest, Method and apparatus for associating tickets in a ticket hierarchy.
  65. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  66. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  67. Braddy, Ricky Gene; Simmons, Timothy Ernest; Calvin, Phillip N., Method and apparatus for providing policy-based document control.
  68. Braddy, Ricky Gene; Simmons, Timothy Ernest, Method and apparatus for reducing disclosure of proprietary data in a networked environment.
  69. Kondamuru, Ravi; Suganthi, Josephine; Raja, Murali; Kamath, Sandeep; Verzunov, Sergey; Shetty, Anil, Method and appliance for using a dynamic response time to determine responsiveness of network services.
  70. Raja, Murali; Kondamuru, Ravi; Suganthi, Josephine; Verzunov, Sergey; Kamath, Sandeep; Shetty, Anil, Method and appliance for using a dynamic response time to determine responsiveness of network services.
  71. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K. R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  72. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K.R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  73. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Method and device for performing integrated caching in a data communication network.
  74. Shulman, Amichai; Shatz, Gur; Yellin, Ido, Method and security system for indentifying and blocking web attacks by enforcing read-only parameters.
  75. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  76. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  77. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  78. Flowers,John S.; Stracener,Thomas C., Method and system for detecting a vulnerability in a network.
  79. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  80. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  81. Ryman, Paul; Croft, Richard; Low, Tony, Method and system for real-time seeking during playback of remote presentation protocols.
  82. Schauser, Klaus E.; Christiansen, Bernd Oliver; Von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Method and system for synchronizing presentation of a dynamic data set to a plurality of nodes.
  83. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  84. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  85. Jeon, Sang Hun, Method and system of determining vulnerability of web application.
  86. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana, Method and systems for efficient delivery of previously stored content.
  87. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana, Method and systems for efficient delivery of previously stored content.
  88. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  89. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  90. Rao, Goutham; Rodriguez, Robert; Brueggemann, Eric, Method and systems for routing packets from an endpoint to a gateway.
  91. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  92. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  93. Bardsley, Jeffrey S.; Brock, Ashley A.; Davis, III, Charles K.; Kim, Nathaniel W.; McKenna, John J.; Villegas, Carlos F., Method for administration of computer security threat countermeasures to a computer system.
  94. Liu, Yaodong; Mitchell, Cary L.; Dunagan, John; Fujimoto, Dana K., Method for detecting anomalies in server behavior using operational performance and failure mode monitoring counters.
  95. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  96. Samuels, Allen; Sutter, Paul, Method of determining path maximum transmission unit.
  97. Samuels, Allen; Sutter, Paul, Method of determining path maximum transmission unit.
  98. Trefler, Alan; Hofmann, Andreas G., Methods and apparatus for integration of declarative rule-based processing with procedural programming in a digital data-processing environment.
  99. Trefler, Alan; Hofmann, Andreas G., Methods and apparatus for integration of declarative rule-based processing with procedural programming in a digital data-processing evironment.
  100. Pedersen, Bradley, Methods and apparatus for providing access to persistent application sessions.
  101. Pedersen, Bradley J., Methods and apparatus for providing access to persistent application sessions.
  102. Schauser, Klaus E.; Christiansen, Bernd Oliver; Von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Methods and apparatus for sharing graphical screen data in a bandwidth-adaptive manner.
  103. Schauser, Klaus E.; Christiansen, Bernd Oliver; Von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner.
  104. Schauser, Klaus E.; Christiansen, Bernd Oliver; von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner.
  105. Trefler, Alan; Sachs, Baruch, Methods and apparatus for user interface optimization.
  106. Trefler, Alan; Hofmann, Andreas G., Methods and apparatus for work management and routing.
  107. Sullivan, Darin; Muklashy, Shadi, Methods and interfaces for displaying performance data related to a current remote access session.
  108. Sullivan, Darin; Muklashy, Shadi, Methods and interfaces for displaying performance data related to a current remote access session.
  109. Alexandrov, Albert; Saavedra, Rafael; Chalmers, Robert; Srinivasan, Kavitha, Methods and systems for bandwidth adaptive N-to-N communication in a distributed system.
  110. Alexandrov, Albert; Saavedra, Rafael; Chalmers, Robert; Srinivasan, Kavitha, Methods and systems for bandwidth adaptive N-to-N communication in a distributed system.
  111. Ryman, Paul; Feijoo, Ricardo Fernando; Nagubadi, Anil, Methods and systems for cataloging text in a recorded session.
  112. Mazzaferri, Richard James, Methods and systems for generating playback instructions for playback of a recorded computer session.
  113. Mazzaferri, Richard James, Methods and systems for generating playback instructions for rendering of a recorded computer session.
  114. Ryman, Paul Adam, Methods and systems for in-session playback on a local machine of remotely-stored and real time presentation layer protocol data.
  115. Hayton, Richard, Methods and systems for interactive evaluation of policies.
  116. Hayton, Richard, Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies.
  117. Hayton, Richard, Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies.
  118. Ryman, Paul, Methods and systems for joining a real-time session of presentation layer protocol data.
  119. Abdine, Derek M.; Giakouminakis, Anastasios; Loder, Chad; Li, Richard D., Methods and systems for providing recommendations to address security vulnerabilities in a network of computing systems.
  120. Ryman, Paul Adam, Methods and systems for real-time seeking during real-time playback of a presentation layer protocol data stream.
  121. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices.
  122. von Eicken, Thorsten; Winterstein, Florian, Methods for providing performance improvement recommendations.
  123. Sum, Sam Ng Ming; Madou, Matias, Modify execution of application under test so user is power user.
  124. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  125. Lyon,Barrett, Network overload detection and mitigation system and method.
  126. Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  127. Keanini,Timothy D.; Quiroga,Martin A.; Buchanan,Brian W.; Flowers,John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  128. Aaron,Jeffrey A., Non-invasive monitoring of the effectiveness of electronic security services.
  129. Yamaoka, Yuji; Nakayama, Yuko; Morikawa, Ikuya; Kojima, Hisashi, Page information collection program, page information collection method, and page information collection apparatus.
  130. Kelley,Edward Emile; McAuliffe,Wayne Anthony, Password protection.
  131. Leavy, Penny C.; Hoglund, Michael Gregory; Gary, Jonathan Walter; Eller, Riley Dennis, Pattern generation, IDS signature conversion, and fault detection.
  132. Meier, John D.; Vasireddy, Srinath, Performance engineering and the application life cycle.
  133. Keanini, Timothy D.; Molitor, Andrew; Gurney, John-Mark; Cooper, Jeremy; Buchanan, Brian, Persistent host determination.
  134. Guruswamy, Kowsik, Platform for analyzing the security of communication protocols and channels.
  135. Guruswamy, Kowsik, Platform for analyzing the security of communication protocols and channels.
  136. Redpath, Richard J., Plug-in parsers for configuring search engine crawler.
  137. Srisuresh, Pyda; Murgia, Marco A.; Gunuganti, Ramakanth, Policy based network address translation.
  138. Srisuresh, Pyda; Murgia, Marco A.; Gunuganti, Ramakanth, Policy based network address translation.
  139. Abuelsaad, Tamer E.; Bodin, William; Jaramillo, David; Nassar, Nader M., Policy driven administration of mobile applications.
  140. Abuelsaad, Tamer E.; Bodin, William; Jaramillo, David; Nassar, Nader M., Policy-driven administration of mobile applications.
  141. Guruswamy, Kowsik, Portable program for generating attacks on communication protocols and channels.
  142. Knouse,Charles W.; Thiyagarajan,Lakshmi Velandai, Post data processing.
  143. Khatutsky, Victor E., Proactive performance management for multi-user enterprise software systems.
  144. Khatutsky, Victor E., Proactive performance management for multi-user enterprise software systems.
  145. Nachenberg, Carey; Barajas, Frank, Real-time training for a computer code intrusion detection system.
  146. Guruswamy, Kowsik, Reconfigurable message-delivery preconditions for delivering attacks to analyze the security of networked systems.
  147. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Nanduri, Priya, Rule generalization for web application entry point modeling.
  148. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Nanduri, Priya, Rule generalization for web application entry point modeling.
  149. Trefler, Alan; Sachs, Baruch A., Rule-based user interface conformance methods.
  150. Wilkerson, Brian, Scalable control system for test execution and monitoring utilizing multiple processors.
  151. Guruswamy, Kowsik; Sapovalovs, Dmitrijs F., Scenario based scale testing.
  152. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  153. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  154. Ramnani, Subash, Simulating multi-monitor functionality in a single monitor environment.
  155. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  156. Bozanich, Adam; Guruswamy, Kowsik; Beddoe, Marshall A., Syntax-based security analysis using dynamically generated test cases.
  157. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  158. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  159. Jorapur,Gopal P., System and method for automatic test case generation.
  160. Shulman, Amichai; Boodaei, Michael; Kremer, Shlomo, System and method for correlating between HTTP requests and SQL queries.
  161. Guruswamy, Kowsik, System and method for discovering assets and functional relationships in a network.
  162. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  163. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  164. Walls,Thomas J.; Shah,Viren; Ghosh,Anup K., System and method for identifying and eliminating vulnerabilities in computer software applications.
  165. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpoie, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  166. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  167. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  168. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  169. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  170. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  171. Cole,David M.; Hanzlik,Dennis J.; Caso,Erik, System and method for network vulnerability detection and reporting.
  172. Keir,Robin M.; Ecker,Stephen A., System and method for network vulnerability detection and reporting.
  173. Kurtz, George R.; Cole, David M.; Caso, Erik; Kuykendall, Dan, System and method for network vulnerability detection and reporting.
  174. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  175. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  176. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  177. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  178. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  179. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; K.R., Bharat Bhushan; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  180. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bushan K. R., Bharath; Kumar, Anil, System and method for performing flash crowd caching of dynamically generated objects in a data communication network.
  181. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing granular invalidation of cached dynamically generated objects in a data communication network.
  182. Hallak, Renen, System and method for protecting web clients and web-based applications.
  183. Russ, Fernando Federico; Weil, Alejandro David; Eissler, Matias Ernesto; Dibar, Francisco Javier; Manrique, Hector Adrian, System and method for providing network penetration testing.
  184. Sima, Caleb, System and method for testing web applications with recursive discovery and analysis.
  185. Mualem,Hezi I.; Black,Nick; Molnar,John; Lunz,Jason, System and method for threat detection and response.
  186. Trivedi, Pooja; Momchilov, Georgy; Pope, David, System and method for transferring data among computing environments.
  187. Trivedi, Pooja; Momchilov, Georgy; Pope, David, System and method for transferring data among computing environments.
  188. Chase, James Edward, System and method for updating or modifying an application without manual coding.
  189. Andres, Steven G.; Cole, David M.; Cummings, Thomas Gregory; Garcia, Roberto Ramon; Kenyon, Brian Michael; Kurtz, George R.; McClure, Stuart Cartier; Moore, Christopher William; O'Dea, Michael J.; Saruwatari, Ken D., System and method of managing network security risks.
  190. Beddoe, Marshall; Keir, Robin, System and method of operating system identification.
  191. Mazzaferri, Richard James, System and methods for automatic time-warped playback in rendering a recorded computer session.
  192. Mazzaferri, Richard James, System and methods for automatic time-warped playback in rendering a recorded computer session.
  193. Frenkel, Benjamin A., System and software for creation and modification of software.
  194. Pennington, Bill; Grossman, Jeremiah; Stone, Robert; Pazirandeh, Siamak, System for detecting vulnerabilities in applications using client-side application interfaces.
  195. Pennington, Bill; Grossman, Jeremiah; Stone, Robert; Pazirandeh, Siamak, System for detecting vulnerabilities in web applications using client-side application interfaces.
  196. Reshef,Eran; El Hanany,Yuval; Raanan,Gil; Tsarfati,Tom, System for determining web application vulnerabilities.
  197. Newman, Aaron Charles, System for tracking and analyzing the integrity of an application.
  198. Plamondon, Robert, Systems and method of using HTTP head command for prefetching.
  199. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for additional retransmissions of dropped packets.
  200. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for additional retransmissions of dropped packets.
  201. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for adjusting the maximum transmission unit by an intermediary device.
  202. Kuykendall, Dan; Cohen, Matthew; Kashitsyn, Dmitriy; Tisdale, Andrew; Morton, Michael J.; Astrakhantsev, Artem, Systems and methods for advanced dynamic analysis scanning.
  203. Kuykendall, Dan; Cohen, Matthew; Kashitsyn, Dmitriy; Tisdale, Andrew; Morton, Michael J.; Astrakhantsev, Artem, Systems and methods for advanced dynamic analysis scanning.
  204. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  205. He, Junxiao; Suganthi, Josephine; Verzunov, Sergey; Shetty, Anil; Venkatraman, Charu, Systems and methods for bypassing an appliance.
  206. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for client-side application-aware prioritization of network communications.
  207. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  208. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  209. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring flow control of policy expressions.
  210. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring handling of undefined policy events.
  211. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  212. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  213. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  214. Clinton, John W.; Trefler, Alan; Frenkel, Benjamin, Systems and methods for distributed rules processing.
  215. Frenkel, Benjamin A., Systems and methods for distributed rules processing.
  216. Plamondon, Robert, Systems and methods for domain name resolution interception caching.
  217. Kamath, Sandeep; Raja, Murali; Suganthi, Josephine; Shetty, Anil; Verzunov, Sergey, Systems and methods for dynamic decentralized load balancing across multiple sites.
  218. Mullick, Amarnath; Venkatraman, Charu; Nanjundaswamy, Shashi; He, Junxiao; Soni, Ajay; Stavrakos, Nicholas; Koopmans, Chris, Systems and methods for enhanced client side policy.
  219. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana; Stavrakos, Nicholas; Monks, Jeff; Koopmans, Fred; Koopmans, Chris; Dakhane, Kapil, Systems and methods for enhanced delta compression.
  220. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for facilitating a peer to peer route via a gateway.
  221. Agarwal, Puneet; Adhya, Saibal Kumar; Thirunarayanan, Srinivasan; Harris, James, Systems and methods for fine grain policy driven cookie proxying.
  222. Plamondon, Robert, Systems and methods for identifying long matches of data in a compression history.
  223. Plamondon, Robert, Systems and methods for identifying long matches of data in a compression history.
  224. Plamondon, Robert D., Systems and methods for identifying long matches of data in a compression history.
  225. Sikka, Namit; Reddy, Anoop; Mirani, Rajiv; Chauhan, Abhishek, Systems and methods for managing application security profiles.
  226. Sikka, Namit; Reddy, Anoop; Mirani, Rajiv; Chauhan, Abhishek, Systems and methods for managing application security profiles.
  227. Reddy, Anoop; Anderson, Craig, Systems and methods for multi-level tagging of encrypted items for additional security and efficient encrypted item determination.
  228. Reddy, Anoop; Anderson, Craig, Systems and methods for multi-level tagging of encrypted items for additional security and efficient encrypted item determination.
  229. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for network disruption shielding techniques.
  230. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  231. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  232. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP buffering.
  233. Sundarrajan, Prabakar; He, Junxiao; Nanjundaswamy, Shashi; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing.
  234. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Nanjundaswamy, Shashi, Systems and methods for providing client-side accelerated access to remote applications via TCP pooling.
  235. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Suganthi, Josephine, Systems and methods for providing client-side dynamic redirection to bypass an intermediary.
  236. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Osviannikov, Michael; Plamondon, Robert, Systems and methods for providing dynamic ad hoc proxy-cache hierarchies.
  237. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for providing dynamic ad hoc proxy-cache hierarchies.
  238. Khemani, Prakash; Bandekar, Vishal, Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance.
  239. Agarwal, Puneet; Adhya, Saibal Kumar; Thirunarayanan, Srinivasan; Harris, James, Systems and methods for proxying cookies for SSL VPN clientless sessions.
  240. Agarwal, Puneet; Adhya, Saibal Kumar; Thirunarayanan, Srinivasan; Harris, James, Systems and methods for proxying cookies for SSL VPN clientless sessions.
  241. Suganthi, Josephine; He, Junxiao; Verzunov, Sergey; Shetty, Anil; Venkatraman, Charu, Systems and methods for routing VPN traffic around network distribution.
  242. Samuels, Allen R.; Jensen, Richard; Dittia, Zubin; Decasper, Dan S.; Ovsiannikov, Michael; Plamondon, Robert D., Systems and methods for sharing compression histories between multiple devices.
  243. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for sharing compression histories between multiple devices.
  244. Ryman, Paul, Systems and methods for single stack shadowing.
  245. Rosenstein, Adam H., Systems and methods for state signing of internet resources.
  246. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for stochastic-based quality of service.
  247. Chan,Christine Wai Han, Systems and methods for testing whether access to a resource is authorized based on access information.
  248. Indiran, Eric; Green, Brian; Piasecki, Derek, Systems and methods for transferring data between computing devices.
  249. Rose, Neil; Brown, Kevin, Systems and methods for use in indexing applications based on security standards.
  250. He, Junxiao; Venkatraman, Charu; Rajan, Roy; Soni, Ajay, Systems and methods for using a client agent to manage HTTP authentication cookies.
  251. He, Junxiao; Venkatraman, Charu; Soni, Ajay, Systems and methods for using a client agent to manage HTTP authentication cookies.
  252. He, Junxiao; Venkatraman, Charu; Soni, Ajay, Systems and methods for using a client agent to manage HTTP authentication cookies.
  253. He, Junxiao; Venkatraman, Charu; Soni, Ajay, Systems and methods for using an HTTP-aware client agent.
  254. He, Junxiao; Venkatraman, Charu; Soni, Ajay, Systems and methods for using an HTTP-aware client agent.
  255. Venkatraman, Charu; He, Junxiao; Soni, Ajay; Stavrakos, Nicholas; Monks, Jeff; Koopmans, Fred; Koopmans, Chris; Dakhane, Kapil, Systems and methods for using an HTTP-aware client agent.
  256. Korrapati, Vamsi; Khemani, Prakash; Mirani, Rajiv; Chauhan, Abhishek, Systems and methods for using object oriented expressions to configure application security policies.
  257. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of compression history expiration and synchronization.
  258. Plamondon, Robert, Systems and methods of dynamically checking freshness of cached objects based on link status.
  259. Verzunov, Sergey; He, Junxiao; Nanjundaswamy, Shashi; Venkatraman, Charu; Bhushan, Bharath; Annamalaisami, Saravana; Shetty, Anil, Systems and methods of for providing multi-mode transport layer compression.
  260. Plamondon, Robert, Systems and methods of freshening and prefreshening a DNS cache.
  261. Plamondon, Robert, Systems and methods of prefetching objects for caching using QoS.
  262. Plamondon, Robert, Systems and methods of prefreshening cached objects based on user's current web page.
  263. Plamondon, Robert, Systems and methods of providing security and reliability to proxy caches.
  264. Plamondon, Robert, Systems and methods of revalidating cached objects in parallel with request for object.
  265. Plamondon, Robert, Systems and methods of revalidating cached objects in parallel with request for object.
  266. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of using application and protocol specific parsing for compression.
  267. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods of using packet boundaries for reduction in timeout prevention.
  268. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen R., Systems and methods of using packet boundaries for reduction in timeout prevention.
  269. Plamondon, Robert, Systems and methods of using the refresh button to determine freshness policy.
  270. Samuels, Allen; Sutter, Paul, TCP selection acknowledgements for communicating delivered and missing data packets.
  271. Samuels, Allen R.; Sutter, Paul G., TCP selective acknowledgements for communicating delivered and missed data packets.
  272. Yunus, Mamoon; Mallal, Rizwan, Technique for determining web services vulnerabilities and compliance.
  273. Guruswamy, Kowsik; Maze, James, Test driven deployment and monitoring of heterogeneous network systems.
  274. Samuels, Allen R.; Sutter, Paul G., Transaction boundary detection for reduction in timeout penalties.
  275. Martherus, Robin E.; Ramamurthy, Srinivasagopalan, User authentication.
  276. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  277. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  278. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  279. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince, Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways.
  280. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince, Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways.
  281. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgements.
  282. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgements.
  283. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgments.
  284. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgments.
  285. Patel, Ashish; Aboualy, Tamer, Web application exploit mitigation in an information technology environment.
  286. Meier, John D., Web application security frame.
  287. Hurst,Dennis Wayne; Barrall,Darrin Ray; Sima,Caleb Ikaki, Webcrawl internet security analysis and process.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로