$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Anti-vulnerability system, method, and computer program product 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-029/06
  • G06F-009/445
  • G06F-017/30
  • G06F-021/55
  • G06F-008/65
출원번호 US-0981866 (2015-12-28)
등록번호 US-10104110 (2018-10-16)
발명자 / 주소
  • Oliphant, Brett M.
  • Blignaut, John P.
출원인 / 주소
  • SecurityProfiling, LLC
대리인 / 주소
    Cladwell, Esq., Patrick E.
인용정보 피인용 횟수 : 0  인용 특허 : 722

초록

A system, method, and computer program product are provided for identifying a first and second occurrence in connection with at least one of the networked device. In use, it is possible that it is determined that the at least one actual vulnerability of the at least one networked device is capable o

대표청구항

1. A non-transitory computer-readable media storing instructions that, when executed by one or more processors, cause the one or more processors to: receive first information associated with a plurality of actual vulnerabilities, the first information being based on second information associated wit

이 특허에 인용된 특허 (722)

  1. Kouznetsov,Victor; Libenzi,Davide; Pak,Michael C.; Urakawa,Yasutaka; Ishii,Kenji; Fujita,Masanori, API system, method and computer program product for accessing content/security analysis functionality in a mobile communication framework.
  2. Fabbio Robert A. (Austin TX), Access control policies for an object oriented database, including access control lists which span across object boundar.
  3. Villa, Emilio; Zidaritz, Adrian; Varga, Michael David; Eschelbeck, Gerhard; Jones, Michael Kevin; McArdle, Mark James, Active firewall system and methodology.
  4. Revashetti Siddaraya B. ; Balasubramaniam Chandrasekar ; Katchapalayam Babu ; Lingarkar Ravi, Active marketing based on client computer configurations.
  5. Siddaraya B. Revashetti ; Chandrasekar Balasubramaniam ; Babu Katchapalayam ; Ravi Lingarkar, Active marketing based on client computer configurations.
  6. Siddaraya B. Revashetti ; Chandrasekar Balasubramaniam ; Babu Katchapalayam ; Ravi Lingarkar, Active marketing based on client computer configurations.
  7. Proctor, Paul E., Adaptive feedback security system and method.
  8. Mitchem Terrance ; Carney Michael R. ; Loe Brian J., Adaptive security system having a hierarchy of security servers.
  9. Hill Douglas W. ; Lynn James T., Adaptive system and method for responding to computer network security attacks.
  10. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  11. Jerger Michael S. ; Bisset Jeffrey A. ; Sinclair Craig T. ; Toutonghi Michael J., Administering permissions associated with a security zone in a computer system security model.
  12. Epstein, Jeremy; Thomas, Linda, Advanced data guard having independently wrapped components.
  13. Nedbal,Manuel; Fellner,Paul; Blaimschein,Peter, Agent architecture for triggering remotely initiated data processing operations.
  14. Czarnecki Gregory J., Aircraft missile-hit survivability using infrared lamp and sacrificial support structure.
  15. Fisher, Lee Adam; Clark, Jack Robert Arron; Baines, Nicholas Edward, Alert message control of security mechanisms in data processing systems.
  16. Fisher, Lee Adam; Clark, Jack Robert Arron; Baines, Nicholas Edward, Alert message control of security mechanisms in data processing systems.
  17. Kouznetsov,Victor, Anti-intrusion software updating system and method.
  18. Gordon, Bryson P.; Ekle, Thor Ivar, Anti-spam system, method, and computer program product.
  19. Kouznetsov, Victor; Huang, Ricky, Anti-virus policy enforcement system and method.
  20. Barton, Chris A.; Vignoles, James M.; Lawrence, James W., Anti-virus scanning co-processor.
  21. Barton, Chris A.; Tarbotton, Lee Codel Lawson; Roberts, Guy William Welch, Anti-virus toolbar system and method for use with a network browser.
  22. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  23. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  24. Ben-Itzhak, Yuval, Application layer security method and system.
  25. Moran, Mike; Liubinskas, Tauras; Goral, Jack, Application performance monitoring expert.
  26. Hollander,Yona; Rachman,Ophir; Horovitz,Oded, Application program interface interception system and method.
  27. Shrader, Theodore Jack London; Rich, Bruce Arland; Yarsa, Julianne; Skibbie, Donna, Architecture for dynamic permissions in java.
  28. Baekelmans,John; De Kegel,Erik; Mc Daniel,Dean; Sinclair,Keith, Arrangement for automated fault detection and fault resolution of a network device.
  29. Gates Lawrence B. (Vernon NJ) Crawley Charles P. (Mentor OH), Article dispensing apparatus.
  30. Markham,Thomas R.; Bogle,Jessica J.; Payne, Jr.,Charles N., Associative policy model.
  31. Makinson, Graham Arthur; Wolff, Daniel Joseph, Authorizing an additional computer program module for use with a core computer program.
  32. Gryaznov,Dmitry, Automated Internet Relay Chat malware monitoring and interception.
  33. Sloan, Ronald E.; Slutsky, Stephen B., Automated coaching for a financial modeling and counseling system.
  34. Caceres, Maximiliano Gerardo; Richarte, Gerardo Gabriel; Friedman, Agustin Azubel; Quesada, Ricardo; Notarfrancesco, Luciano; Friederichs, Oliver; Burroni, Javier; Ajzenman, Gustavo; Becedillas, Gabriel; Leidl, Bruce, Automated computer system security compromise.
  35. Caceres,Maximiliano Gerardo; Richarte,Gerardo Gabriel; Friedman,Agustin Azubel; Quesada,Ricardo; Notarfrancesco,Luciano; Friederichs,Oliver; Burroni,Javier; Ajzenman,Gustavo; Becedillas,Gabriel; Leid, Automated computer system security compromise.
  36. Banzhof,Carl E., Automated computer vulnerability resolution system.
  37. Banzhof,Carl E., Automated computer vulnerability resolution system.
  38. Gallagher,Thomas P., Automated detection of cross site scripting vulnerabilities.
  39. Aaron,Jeffrey A., Automated diagnosis for computer networks.
  40. Wiedmann, Ulrich; Lillie, Terrance L.; Sneiderman, Richard P.; Wiedmann, Christian; Zeljko, Robert, Automated discovery of access points in wireless computer networks.
  41. Wiedmann, Ulrich; Lillie, Terrance L.; Sneiderman, Richard P.; Wiedmann, Christian; Zeljko, Robert, Automated discovery of access points in wireless computer networks.
  42. Apfelbaum, Larry; Houh, Henry; Mayberry, Thomas; Friedman, George, Automated security threat testing of web pages.
  43. Teblyashkin,Ivan Alexandrovich; Peternev,Viatcheslav Nikolaevich; Gryaznov,Dmitry Olegovich, Automatic builder of detection and cleaning routines for computer viruses.
  44. Chu,Simon C.; Hunter,Steven W.; Piazza,William Joseph; Pruett,Gregory Brian, Automatic client responses to worm or hacker attacks.
  45. Ivanov,Oleg; Ivanov,Sergei, Automatic detection and patching of vulnerable files.
  46. Cheng William ; Hwang Kenneth ; Kannan Ravi ; Katchapalayam Babu ; Liu Bing ; Narasimhan Balaji ; Ramanujam Gopal ; Tran Jonathan, Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer.
  47. McArdle, Mark J.; Johnston, Brent A.; Nathan, Philip D. R.; Dool, James, Automatically configuring a computer firewall based on network connection.
  48. McArdle,Mark J.; Johnston,Brent A.; Nathan,Philip D. R.; Dool,James, Automatically configuring a computer firewall based on network connection.
  49. Ko,Cheuk W., Automatically generating valid behavior specifications for intrusion detection.
  50. Stockwell Edward B. ; Boebert William E. ; Vanyo Heidi A., Binary filter using pattern recognition.
  51. Hursey, Neil John, Cache hints for computer file access.
  52. Cafarelli, Dominick A.; Yildiz, Kazim O., Capture file format system and method for a network analyzer.
  53. Hinchliffe,Alex James; Howard,Fraser Peter; Kemp,Andrew; Rai,Bobby, Centrally managed malware scanning.
  54. Singleton, Richard Brian, Checking computer program installation.
  55. Sobel, William E.; McCorkendale, Bruce, Client compliancy with self-policing clients.
  56. Gordon, Bryson P.; Schneider, Ryan L., Combined multiple-application alert system and method.
  57. Gordon, Bryson P.; Ekle, Thor Ivar, Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages.
  58. Joiner,Herbert V., Comprehensive enterprise network analyzer, scanner and intrusion detection framework.
  59. Sung, Andrew H.; Mukkamala, Srinivas; Lassez, Jean-Louis, Computationally intelligent agents for distributed intrusion detection system and method of practicing same.
  60. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, Computer cleaning system, method and computer program product.
  61. Spilo Michael L ; Daub Jonathan A., Computer memory conservation system.
  62. Cummins,Fred A., Computer model of security risks.
  63. Bell, Mark Brian; Kennedy, Scott Cruickshanks; Ayers, II, Carleton Royse; Whyte, Brian; Myers, Kay, Computer network defense.
  64. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  65. Michael L. Spilo ; Jonathan A. Daub, Computer resource management system.
  66. Michael L. Spilo ; Jonathan A. Daub, Computer resource management system.
  67. Spilo Michael L. ; Daub Jonathan A., Computer resource management system.
  68. Shostack Adam ; Allouch David,ILX, Computer security.
  69. Smithson, Robert Hugh; Woodruff, Andrew Arlin; Rothwell, Anton Christian; Green, Jeffrey Martin; Bolin, Christopher Scott, Computer virus detection.
  70. Smithson,Robert Hugh; Woodruff,Andrew Arlin; Rothwell,Anton Christian; Green,Jeffrey Martin; Bolin,Christopher Scott, Computer virus detection.
  71. Grupe, Robert, Content scanning of copied data.
  72. Judge, Paul; Schneck, Phyllis Adele; Yang, Weilai; Zdziarski, Jonathan Alexander, Content-based policy compliance systems and methods.
  73. McArdle,Mark J.; Johnston,Brent A.; Nathan,Philip D. R.; Dool,James, Control of interaction between client computer applications and network resources.
  74. Li Bobby ; Chen Eva, Controlled distribution of application programs in a computer network.
  75. Kelly,Nicholas Paul; Lawson Tarbotton,Lee Codel; Gudgion,Kevin Andrew, Controlling access to suspicious files.
  76. Gartside, Paul Nicholas; Harris, Mark, Controlling use of a computer program installed on a computer.
  77. Wu,Handong; Zhou,Xiao Qiang, Correlation system and method for monitoring high-speed networks.
  78. Gates Lawrence B. (Vernon NJ), Coupon dispenser.
  79. Marc David Dyksterhouse ; Jonathan David Callas ; Mark James McArdle, Cryptographic system and methodology for creating and managing crypto policy on certificate servers.
  80. Zimmermann Philip, Cryptographic system with methods for user-controlled message recovery.
  81. Hallman, Clinton J.; Forney, David, Customizing business logic and data sources by modifying methods defined within an API.
  82. Cook, Jeffrey; Wu, Handong; Foster, Lindy, DNS server access control system and method.
  83. Shah,Bakul; Sharma,Rosen; Haight,Peter, Damage containment by translation.
  84. Lemelson Jerome H. ; Pedersen Robert D., Danger warning and emergency response system and method.
  85. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  86. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  87. Muttik, Igor; Wolff, Daniel Joseph; Tarbotton, Lee Codel Lawson, Data scanning for updatable predefined properties.
  88. Bezilla, Daniel Bailey; Immordino, John Leonard; Le Ogura, James; Ojha, Sachchida Nand, Data structure for policy-based remediation selection.
  89. Michael S. Jerger ; Jeffrey A. Bisset ; Craig T. Sinclair ; Michael J. Toutonghi, Declarative permission requests in a computer system.
  90. Yildiz, Kazim Orhan; Chen, Bing, Decoding and detailed analysis of captured frames in an IEEE 802.11 wireless LAN.
  91. Sherman, David L.; Sterne, Daniel F.; Lawler, Geoffrey T.; Heyman, Michael D., Decryption system and method for network analyzers and security programs.
  92. Swerdlow, Charles D.; Shivkumar, Kalyanam, Defibrillation shock strength determination technology.
  93. Pak,Michael C.; Kouznetsov,Victor, Delayed-delivery quarantining of network communications having suspicious contents.
  94. Hinchliffe, Alex J.; Kemp, Andrew; Rai, Bobby; Howard, Fraser P., Desktop security in peer-to-peer networks.
  95. Hursey, Neil John, Detecting computer data containing compressed video data as banned computer data.
  96. Cowie,Neil Andrew; Muttik,Igor, Detecting computer programs within packed computer files.
  97. Muttik, Igor; Long, Duncan V., Detecting computer viruses or malicious software by patching instructions into an emulator.
  98. Hursey, Neil John; McEwan, William Alexander, Detecting e-mail propagated malware.
  99. Wolff,Daniel Joseph; Harris,Mark; Glover,Michael Kenneth, Detecting malicious alteration of stored computer files.
  100. Muttik, Igor, Detecting malicious software by analyzing patterns of system calls generated during emulation.
  101. Tarbotton, Lee Codel Lawson; Gudgion, Kevin Andrew, Detecting malware carried by an E-mail message.
  102. Tarbotton, Lee Codel Lawson; Gudgion, Kevin Andrew, Detecting malware carried by an e-mail message.
  103. Tarbotton,Lee Codel Lawson; Gudgion,Kevin Andrew, Detecting malware carried by an e-mail message.
  104. Tarbotton, Lee Codel Lawson; Wolff, Daniel Joseph; Kelly, Nicholas Paul, Detecting unwanted properties in received email messages.
  105. Norris,Edward James; Dumas,David Kenneth, Detection of softswitch attacks.
  106. Childress, Rhonda L.; Goldberg, Itzhack; Kumhyr, David Bruce; Watt, Stephen James, Determining priority for installing a patch into multiple patch recipients of a network.
  107. Connary,Iven; Buck,Darin J.; Caldwell,Matthew F.; Hughes,Robert T., Determining threat level associated with network activity.
  108. Sepp Gunther (Ottobrunn DEX) Protz Rudolf (Hohenkirchen-Siegertsbrunn DEX), Device for self-defense against missiles.
  109. Michael S. Jerger ; Jeffrey A. Bisset ; Craig T. Sinclair ; Michael J. Toutonghi, Directional set operations for permission based security in a computer system.
  110. Markham, Thomas R., Distributed firewall system and method.
  111. Muttik, Igor G.; Cowie, Neil A.; Teblyashkin, Ivan A., Distributed system and method for conducting a comprehensive search for malicious code in software.
  112. Hinchliffe, Alex J.; Howard, Fraser P.; Rai, Bobby; Kemp, Andrew, Distribution of security policies for small to medium-sized organizations.
  113. Robert E. Gleichauf ; Gerald S Lathem ; Scott V. Waddell, Domain mapping method and system.
  114. Tarbotton,Lee Codel Lawson; Wolff,Daniel Joseph; Gartside,Paul Nicholas; Makinson,Graham Arthur; Kelly,Nicholas Paul, Downloading a computer file from a source computer to a target computer.
  115. Roberts, M. Beauchamp; Revashetti, Siddaraya B.; Balasubramaniam, Chandrasekar; Katchapalayam, Babu; Lingarkar, Ravi, Dynamic marketing based on client computer configurations.
  116. Vaidya Vimal, Dynamic signature inspection-based network intrusion detection.
  117. Chieu, David Pai-wei; Hollingworth, Dennis, Dynamic software wrapper.
  118. Julie Lynn Huff ; Tracy Glenn Shelanskey ; Sheila Ann Jackson, Dynamic system defense for information warfare.
  119. Jagger,Luke D.; Rothwell,Anton C.; Dennis,William R., Efficient management and blocking of malicious code and hacking attempts in a network environment.
  120. Rothwell, Anton C.; Dennis, William R.; Jagger, Luke D., Embedded anti-virus scanner for a network adapter.
  121. Pecina,Chrisine, Embedded database for computer system management.
  122. Grupe,Robert, Encrypted data file transmission.
  123. Sobel,William E; Vogel,Greg; McCorkendale,Bruce, Enforcement of compliance with network security policies.
  124. Sobel, William E.; McCorkendale, Bruce, Enhanced client compliancy using database of security sensor data.
  125. Latham Daren Wayne ; Gooderum Mark P. ; Andreas Glenn, Enhanced security network time synchronization device and method.
  126. Tracy,Richard P.; Barrett,Hugh; Berman,Lon J.; Catlin,Gary M.; Dimtsios,Thomas G., Enhanced system, method and medium for certifying and accrediting requirements compliance.
  127. Hindawi,David Salim; Donoho,David Leigh; Lippincott,Lisa Ellen; Goodrow,Dennis S.; Brown,James Milton; Lincroft,Peter; Loer,Peter Benjamin; Hindawi,Orion Yosef, Enterprise console.
  128. Joiner, Herbert V.; Raghuraman, Praveen; Elwell, Ken W., Enterprise interface for network analysis reporting.
  129. Joiner, Herbert V.; Verma, Ravi; Raghuraman, Praveen; Elwell, Ken W., Enterprise network analyzer agent system and method.
  130. Joiner, Herbert V.; Elwell, Ken W., Enterprise network analyzer architecture framework.
  131. Joiner, Herbert V.; Elwell, Ken W.; Verma, Ravi; Raghuraman, Praveen, Enterprise network analyzer host controller/agent interface system and method.
  132. Elwell, Ken W.; Joiner, Herbert V., Enterprise network analyzer host controller/zone controller interface system and method.
  133. Joiner,Herbert V.; Elwell,Ken W., Enterprise network analyzer zone controller system and method.
  134. Shahbazi, Majid, Enterprise-wide security system for computer devices.
  135. Shahbazi, Majid, Enterprise-wide security system for computer devices.
  136. Shahbazi, Majid, Enterprise-wide security system for computer devices.
  137. Wolff,Daniel Joseph; Tarbotton,Lee Codel Lawson; Moore,Edward, Event reporting between a reporting computer and a receiving computer.
  138. Chen Eva ; Lau Steven Yuen-Lam ; Liang Yung-Chang, Event triggered iterative virus detection.
  139. Pantuso, Joseph J.; Schneider, Ryan L., Extractor system, method and computer program product for managing network access on a per-application basis.
  140. Pantuso,Joseph J.; Schneider,Ryan L., Extractor system, method and computer program product for managing network access on a per-application basis.
  141. Glover, Michael, Fast virus scanning.
  142. Leavy,Penny C.; Hoglund,Michael Gregory; Gary,Jonathan Walter; Eller,Riley Dennis, Fault injection methods and apparatus.
  143. Bolin,Christopher, File system level integrity verification and validation.
  144. Bruestle, Jeremy J.; Lillie, Terrance L., Fine grained access control for wireless networks.
  145. Pantuso, Joseph J.; Brown, Shawn L., Firewall system and method with network mapping capabilities.
  146. Amit, Neta; Harel, Eran; Nathan, Abraham; Basker, Nevet, Firewall with two-phase filtering.
  147. Anand Rangachari ; Giraud Frederique-Anne ; Islam Nayeem ; Jaeger Trent Ray ; Liedtke Jochen, Flexible and dynamic derivation of permissions.
  148. LaPierre-McAfee, Florence L., Free motion sewing methods and mechanisms.
  149. Lin,Wei, Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers.
  150. Stockwell Edward B. ; Klietz Alan E., Generalized security policy management system and method.
  151. Gartside,Paul Nicholas; Cowie,Neil Andrew, Generating malware definition data for mobile computing devices.
  152. Chau, Hoang K.; Cheng, Isaac Kam-Chak; Cheng, Josephine Miu; Chiu, Suet Mui; Chow, Jyh-Herng; Pauser, Michael Leon; Xu, Jian, Generating one or more XML documents from a single SQL query.
  153. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Graphical user interface system and method for automatically updating software products on a client computer system.
  154. Leong, Pak-Tak Patrick; Won, King L., Graphical user interface system and method for organized network analysis.
  155. Leong,Pak Tak Patrick; Won,King L., Graphical user interface system and method for organized network analysis.
  156. Leong, Pak-Tak Patrick; Won, King L., Graphical user interface system and method for visually gauging network performance.
  157. Wolff,Daniel Joseph; Spurlock,Joel Robert; Edwards,Jonathan Lewis, Handling of malware scanning of files stored within a file storage device of a computer network.
  158. Teblyashkin,Ivan; Muttik,Igor; Peternev,Viatcheslav, Heuristic detection of polymorphic computer viruses based on redundancy in viral code.
  159. Huntington,Stephen Glen; Covington,Stanley P.; Major,John Darren; Rowley,Bevan S., Hierarchically organizing network data collected from full time recording machines and efficiently filtering the same.
  160. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Hierarchy-based method and apparatus for detecting attacks on a computer system.
  161. Wu, Handong; Sufleta, Zbigniew, High performance packet processing using a general purpose processor.
  162. Wu, Handong; Sufleta, Zbigniew, High performance packet processing using a general purpose processor.
  163. Won,King L., Identification of related communications channels in a wavelength division multiplexed optical network.
  164. Moore,Robert Edward; Howard,Fraser Peter; Tarbotton,Lee Codel, Identifying malware containing computer files using embedded text.
  165. Moore,Robert Edward; Howard,Fraser Peter; Tarbotton,Lee Codel Lawson, Identifying malware containing computer files using embedded text.
  166. Fisher, Lee Adam; Day, Gregory Charles; Brown, Jason, Identifying malware infected reply messages.
  167. McMurdie,Michael Scott; Polfer,Daniel A.; Evers,Daniel L., Image mastering API.
  168. Thrower, Woodrow A.; Oates, Jared S., Incident prioritization and adaptive response recommendations.
  169. Benantar Messaoud ; Blakley ; III George Robert ; Nadalin Anthony Joseph, Information handling system, method, and article of manufacture including object system authorization and registration.
  170. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Information processing apparatus, and system having preview control, and method thereof, and storage medium storing program for implementing the method.
  171. Cowie,Neil Andrew; Muttik,Igor Garrievich; Wolff,Daniel Joseph, Initiating execution of a computer program from an encrypted version of a computer program.
  172. Bruestle,Jeremy J.; Lillie,Terrance L.; Wiedmann,Christian; Zejlko,Robert; Sneiderman,Richard P.; Wiedmann,Ulrich, Installation and configuration process for wireless network.
  173. Ramsey,Jon; Ketts,Kevin; Buer,Steve, Integrated computer security management system and method.
  174. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  175. Rothwell, Anton C.; Jagger, Luke D.; Dennis, William R.; Clarke, David R., Intelligent SPAM detection system using an updateable neural analysis engine.
  176. Rothwell,Anton C.; Jagger,Luke D.; Dennis,William R.; Clarke,David R., Intelligent SPAM detection system using statistical analysis.
  177. Grupe, Robert R., Intelligent network scanning system and method.
  178. Grupe,Robert R., Intelligent network scanning system and method.
  179. Shipley Peter M., Intelligent network security device and method.
  180. Hoffman ; Jr. Gene ; Elrod Mark B., Internet computer system with methods for dynamic filtering of hypertext tags and content.
  181. Hoffman, Jr., Gene; Elrod, Mark B., Internet computer system with methods for dynamic filtering of hypertext tags and content.
  182. Flowers, John S.; Stracener, Thomas C., Interoperability of vulnerability and intrusion detection systems.
  183. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  184. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E., Intrusion detection and vulnerability assessment system, method and computer program product.
  185. Magdych,James S.; Rahmanovic,Tarik; McDonald,John R.; Tellier,Brock E., Intrusion detection and vulnerability assessment system, method and computer program product.
  186. Craig H. Rowland, Intrusion detection system.
  187. Scheidell, Michael, Intrusion detection system.
  188. Joiner, Herbert V.; Elwell, Ken W., Intrusion detection system and method.
  189. Daniel M. Teal, Intrusion detection system and method having dynamically loaded signatures.
  190. Teal, Daniel M., Intrusion detection system and method having dynamically loaded signatures.
  191. Bruton, III,David Aro; Jakubik,Patricia; LiVecchi,Patrick Michael; Overby, Jr.,Linwood Hugh, Intrusion event filtering.
  192. McArdle, Mark J.; Johnston, Brent A., Intrusion prevention for active networked applications.
  193. Goseva Popstojanova,Katerina; Wang,Feiyi; Wang,Rong; Gong,Fengmin; Vaidyanathan,Kalyanaraman; Trivedi,Kishor; Muthusamy,Balamurugan, Intrusion tolerant communication networks and associated methods.
  194. Gong,Fengmin; Sargor,Chandramouli; Wang,Feiyi, Intrusion tolerant server system.
  195. Sepp Gunther (Ottobrunn DEX), Laser weapon system.
  196. Thomsen, Daniel Jay; O'Brien, Richard; Bogle, Jessica; Payne, Charles, Locally adaptable central security management in a heterogeneous network environment.
  197. Thomsen,Daniel Jay; O'Brien,Richard; Bogle,Jessica; Payne,Charles, Locally adaptable central security management in a heterogeneous network environment.
  198. Muttik, Igor Garrievich; Teblyashkin, Ivan Alexandrovich, Malware detection using external call characteristics.
  199. Muttik, Igor Garrievich; Teblyashkin, Ivan Alexandrovich, Malware detection using external call characteristics.
  200. Hursey,Neil John; McEwan,William Alexander, Malware scanning as a low priority task.
  201. Hursey,Neil John, Malware scanning messages containing multiple data records.
  202. Hursey,Neil John; McEwan,William Alexander, Malware scanning of compressed computer files.
  203. Hursey,Nell John; McEwan,William Alexander, Malware scanning of compressed computer files.
  204. Tarbotton,Lee Codel Lawson; Vignoles,James Malcolm; Barton,Christopher Andrew, Malware scanning to create clean storage locations.
  205. Kouznetsov, Victor; Libenzi, Davide; Fallenstedt, Martin; Palmer, David W.; Pak, Michael C., Malware scanning user interface for wireless devices.
  206. Makinson,Graham Arthur; Baulk,Eamonn John; Wolff,Daniel Joseph, Malware scanning using a network bridge.
  207. Kouznetsov, Victor; Libenzi, Davide; Fallenstedt, Martin; Palmer, David W.; Pak, Michael C., Malware scanning wireless service agent system and method.
  208. Chivaluri Dinkar, Management agent automatically executes corrective scripts in accordance with occurrences of specified events regardless.
  209. Nedbal,Manuel, Managing computer program configuration data.
  210. Ackroyd,Robert John, Managing malware protection upon a computer network.
  211. Singleton, Richard B., Master security policy server.
  212. Gartside, Paul Nicholas; Harris, Mark, Mechanism to check the malicious alteration of malware scanner.
  213. Tarbotton,Lee Codel Lawson; Rice,Trevor Hugh; Roberts,Guy William Welch; Bidgood,Andrew John Peter; Botterill,Carl Steven, Mechanisms for banning computer programs from use.
  214. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  215. Bellovin,Steven Michael, Method and apparatus for a distributed firewall.
  216. Schmugar, Craig; Gullotto, Vincent, Method and apparatus for a virus information patrol.
  217. Wu,Shyhtsun Felix; Fei,Aiguo; Gong,Fengmin, Method and apparatus for adaptively classifying network traffic.
  218. Hammond, Nicolas J., Method and apparatus for auditing network security.
  219. Hammond,Nicolas J., Method and apparatus for auditing network security.
  220. Esbensen Daniel, Method and apparatus for automated network-wide surveillance and security breach intervention.
  221. Das,Rajarshi; Lassettre,Edwin Richie; Segal,Alla; Whalley,Ian Nicholas; White,Steve Richard, Method and apparatus for automatic updating and testing of software.
  222. Cafarelli, Dominick Anthony; Anderson, James Peter, Method and apparatus for capture, analysis and display of packet information sent in an IEEE 802.11 wireless network.
  223. Fudge Bob, Method and apparatus for checking security vulnerability of networked devices.
  224. Ivory, Christopher Joseph, Method and apparatus for connection-oriented multiplexing and switching network analysis, management, and troubleshooting.
  225. Ko,Cheuk W., Method and apparatus for content-based instrusion detection using an agile kernel-based auditor.
  226. Matt,Brian J., Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique.
  227. Yildiz,Kazim Orhan, Method and apparatus for detailed protocol analysis of frames captured in an IEEE 802.11 (b) wireless LAN.
  228. Yildiz,Kazim Orhan, Method and apparatus for detailed protocol analysis of frames captured in an IEEE 802.11(b) wireless LAN.
  229. Fei, Aiguo; Sun, Kai; Gong, Fengmin, Method and apparatus for detecting a distributed denial of service attack.
  230. Ko, Cheuk W., Method and apparatus for detecting a macro computer virus using static analysis.
  231. Klaus Christopher W., Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication sy.
  232. Fortin, Vincent H.; Lauer, Will C.; Stabile, Lawrence A.; Wallace, Richard, Method and apparatus for detecting changes to network elements.
  233. Tsafnat,Guy; Ko,Cheuk W.; Brutch,Paul C., Method and apparatus for detecting denial-of-service attacks using kernel execution profiles.
  234. Kelekar, Samir Gurunath, Method and apparatus for detecting events pertaining to potential change in vulnerability status.
  235. Gupta, Ramesh M.; Jain, Parveen K.; Amidon, Keith E.; Gong, Fengmin; Vissamsetti, Srikant; Haeffele, Steve M.; Raman, Ananth, Method and apparatus for detecting intrusions on a computer system.
  236. Gupta, Ramesh M.; Jain, Parveen K.; Amidon, Keith E.; Gong, Fengmin; Vissamsetti, Srikant; Haeffele, Steve M.; Raman, Ananth, Method and apparatus for detecting intrusions on a computer system.
  237. Bu, Zheng; Gong, Fengmin, Method and apparatus for detecting shellcode.
  238. Bu, Zheng; Gong, Fengmin, Method and apparatus for detecting shellcode.
  239. Hanchett,Paul F., Method and apparatus for establishing security scanner attributes in a computer system.
  240. Schmitz, Peter O., Method and apparatus for filtering network traffic based on the correct channel in an IEEE 802.11(b) wireless lan.
  241. Cafarelli, Dominick Anthony; Yildiz, Kazim Orhan, Method and apparatus for filtering that specifies the types of frames to be captured and to be displayed for an IEEE802.11 wireless LAN.
  242. Cambridge, Rodney D., Method and apparatus for implementing a handheld security system.
  243. Drew, Jeffrey M., Method and apparatus for minimizing file scanning by anti-virus programs.
  244. Drew,Jeffrey M., Method and apparatus for minimizing file scanning by anti-virus programs.
  245. Schmitz, Peter O.; Cafarelli, Dominick A.; Anderson, James P.; Rosenthal, Elazar, Method and apparatus for monitoring different channels in an IEEE 802.11 wireless LAN.
  246. Choe, Kerry M., Method and apparatus for monitoring internet traffic on an internet web page.
  247. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  248. Knobbe, Roger; Schwab, Stephen; Purtell, Andrew, Method and apparatus for passively calculating latency for a network appliance.
  249. Cambridge, Rodney D.; Ali, Fearuz, Method and apparatus for predicting the incidence of a virus.
  250. Cambridge,Rodney D.; Ali,Fearuz, Method and apparatus for predicting the incidence of a virus.
  251. Rayes,Ammar; Cheung,Michael, Method and apparatus for preventing spoofing of network addresses.
  252. Ko, Cheuk W.; Rho, Jaisook, Method and apparatus for providing a policy-driven intrusion detection system.
  253. Cooper, Geoffrey; Sherlock, Kieran G.; Hoy, Mark, Method and apparatus for rate limiting.
  254. Cafarelli, III, Dominick Anthony; Hansen, Daniel, Method and apparatus for real-time protocol analysis using an active and adaptive auto-throtting CPU allocation front end process.
  255. Cafarelli, III, Dominick Anthony; Hansen, Daniel, Method and apparatus for real-time protocol analysis using an auto-throttling front end process.
  256. Currie, David; Leonard, Kenneth; Tyler, Benjamin, Method and apparatus for real-time security verification of on-line services.
  257. Sames, David L.; Tally, Gregg W., Method and apparatus for securely and dynamically managing user roles in a distributed system.
  258. Sames, David L.; Whitmore, Brent S.; Niebuhr, Brian S.; Tally, Gregg W., Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system.
  259. Chandrasekar Balasubramaniam ; Ravi Kannan ; Siddaraya Basappa Revashetti IN; Srivats Sampath ; Babu Katchapalayam, Method and apparatus for securing software distributed over a network.
  260. Mathur Ashish (Sunnyvale CA), Method and apparatus for updating system software for a plurality of data processing units in a communication network.
  261. Clinton J. Hallman ; Leslie W. Vaughn, Jr. ; David Forney, Method and apparatus for using a static metadata object to reduce database accesses.
  262. Sternin, Jeffrey Y., Method and apparatus to facilitate accessing data in network management protocol tables.
  263. Fu,Tianying; Kadam,Sunil S.; Bacus,Michael P., Method and apparatus to facilitate cross-domain push deployment of software in an enterprise environment.
  264. Sternin, Jeffrey Y.; Tung, Steven C.; Qi, Yongping, Method and apparatus to facilitate fast network management protocol replies in large tables.
  265. Kadam, Sunil S.; Fu, Tianying; Shetty, Satish K.; Bacus, Michael P., Method and apparatus to facilitate remote software management by applying network address-sorting rules on a hierarchical directory structure.
  266. Kadam,Sunil S.; Fu,Tianying; Bacus,Michael P., Method and apparatus to facilitate software installation using embedded user credentials.
  267. Rosenfled,Amir, Method and software for calculating rate constraints.
  268. Gleichauf, Robert E.; Teal, Daniel M.; Wiley, Kevin L., Method and system for adaptive network security using intelligent packet analysis.
  269. Robert E. Gleichauf ; Daniel M. Teal ; Kevin L. Wiley, Method and system for adaptive network security using intelligent packet analysis.
  270. Gleichauf Robert E. ; Randall William A. ; Teal Daniel M. ; Waddell Scott V. ; Ziese Kevin J., Method and system for adaptive network security using network vulnerability assessment.
  271. Kouznetsov Viktor, Method and system for allowing computer programs easy access to features of a virus scanning engine.
  272. Koehler Stephen C., Method and system for authenticating digital certificates issued by an authentication hierarchy.
  273. Cambridge,Rodney D., Method and system for bi-directional updating of antivirus database.
  274. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  275. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of networked application client software by explicit human input.
  276. Nabahi Narimane, Method and system for custom computer software installation.
  277. Nabahi Narimane, Method and system for custom computer software installation using rule-based installation engine and simplified script computer program.
  278. Tarbotton, Lee Codel Lawson; Gartside, Paul Nicholas; Wolff, Daniel Joseph, Method and system for defining a safe storage area for use in recovering a computer system.
  279. Edwards, Jonathan; Turner, Shawna, Method and system for delayed write scanning for detecting computer malwares.
  280. Edwards,Jonathan; Turner,Shawna, Method and system for delayed write scanning for detecting computer malwares.
  281. Flowers,John S.; Stracener,Thomas C., Method and system for detecting a vulnerability in a network.
  282. Berg,Ryan James; Rose,Larry; Peyton,John; Danahy,John J.; Gottlieb,Robert; Rehbein,Chris, Method and system for detecting privilege escalation vulnerabilities in source code.
  283. Berg,Ryan James; Rose,Larry; Peyton,John; Danahy,John J.; Gottlieb,Robert; Rehbein,Chris, Method and system for detecting race condition vulnerabilities in source code.
  284. Cox, Brian R.; Kim, Do; Haagensen, Brandt, Method and system for detecting viruses on handheld computers.
  285. Berg, Ryan J.; Rose, Larry; Peyton, John; Danahy, John J.; Gottlieb, Robert; Rehbein, Chris, Method and system for detecting vulnerabilities in source code.
  286. Berg,Ryan J.; Rose,Larry; Peyton,John; Danahy,John J.; Gottlieb,Robert; Rehbein,Chris, Method and system for detecting vulnerabilities in source code.
  287. Agrawal, Ajay; Sathya, Sriharsha; Neelakantamurthy, Yashovan; Prakash, Apurva; Malpani, Raghavendra; Saraswati, Abhishek; Rao, Suryaprashant; Hate, Ashish; Schmitz, Peter O., Method and system for dynamic evaluation of a wireless network with a portable computing device.
  288. Schneier, Bruce; Gross, Andrew H.; Callas, Jonathan D., Method and system for dynamic network intrusion monitoring, detection and response.
  289. Schneier,Bruce; Gross,Andrew H.; Callas,Jonathan D., Method and system for dynamic network intrusion monitoring, detection and response.
  290. Ziese,Kevin J., Method and system for dynamically distributing updates in a network.
  291. Rouland, Christopher Jay; Becker, Patrick Morton; Klaus, Christopher W., Method and system for dynamically protecting a computer system from attack.
  292. Rouland, Christopher Jay; Becker, Patrick Morton; Klaus, Christopher W., Method and system for dynamically protecting a computer system from attack.
  293. Jagger,Luke David; Rothwell,Anton Christian; Dennis,William R., Method and system for identifying unsolicited mail utilizing checksums.
  294. Dodd, Timothy D.; Mewett, Scott; Ide, Curtis E.; Overcash, Kevin A.; Dennerline, David A.; Williams, Bobby J.; Sells, Martin D., Method and system for identifying, fixing, and updating security vulnerabilities.
  295. Hackenberger, William Frank; Hendry, Randy Jay; Wood, Christopher James, Method and system for implementing security devices in a network.
  296. Leslie W. Vaughn ; Zachary A. Nelson, Method and system for integrated network management applications.
  297. Hollander, Yona; Rachman, Ophir; Horovitz, Oded, Method and system for intercepting an application program interface.
  298. Ioele,Anthony; Clancy,Mark; Samchuck,Gerald M.; Jafri,Syed Hasan; Morgasen,Howard, Method and system for internet hosting and security.
  299. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  300. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  301. Edwards,Jonathan, Method and system for limiting processor utilization by a virus scanner.
  302. Parish, Sandy, Method and system for localizing Web pages.
  303. Churchyard,Peter J.; Supernor,William P., Method and system for maintaining a communications protocol session.
  304. Cook, Jeff; Heyman, Michael; Dinsmore, Peter, Method and system for management and notification of electronic certificate changes.
  305. Farley, Timothy P.; Hammer, John M.; Williams, Bryan Douglas; Brass, Philip Charles; Young, George C.; Mezack, Derek John, Method and system for managing computer security information.
  306. Cunningham Mark,GBX ; Trevarrow Andrew,GBX, Method and system for monitoring and controlling network access.
  307. Blake, Kenneth W.; Converse, Vikki Kim; Edmark, Ronald O'Neal; Garrison, John Michael, Method and system for morphing honeypot with computer security incident correlation.
  308. Blake,Kenneth W.; Converse,Vikki Kim; Edmark,Ronald O'Neal; Garrison,John Michael, Method and system for morphing honeypot with computer security incident correlation.
  309. Mishra, Debi P.; Kays, Jr., David E.; Horstmann, Markus; Lucovsky, Mark H.; Chan, Shannon J.; Shah, Bharat A.; Jensenworth, Gregory A., Method and system for on-demand installation of software implementations.
  310. Sufleta, Zbigniew, Method and system for passive quality of service monitoring of a network.
  311. Wu, Handong, Method and system for playing associated audible advertisement simultaneously with the display of requested content on handheld devices and sending a visual warning when the audio channel is off.
  312. Chandrasekar Balasubramaniam ; Ravi Kannan ; Srivats Sampath ; Babu Katchapalayam, Method and system for processing events related to a first type of browser from a second type of browser.
  313. Kim, Do K.; Pearce, Christopher L.; Constantine, Jeffrey J., Method and system for protecting a computer using a remote e-mail scanning device.
  314. Hodges Vernon ; O'Donnell Shawn, Method and system for providing automated updating and upgrading of antivirus applications using a computer network.
  315. Hodges Vernon ; O'Donnell Shawn, Method and system for providing automated updating and upgrading of antivirus applications using a computer network.
  316. Gryaznov,Dmitry, Method and system for providing computer malware names from multiple anti-virus scanners.
  317. Pearson,Sterling Michael, Method and system for remotely configuring and monitoring a communication device.
  318. Baffes, Paul T.; Garrison, John Michael; Gilfix, Michael; Hsu, Allan; Stading, Tyron Jerrod, Method and system for responding to a computer intrusion.
  319. Sampath Srivats ; Balasubramaniam Chandrasekar ; Lingarkar Ravi ; Katchapalayam Babu ; Kannan Ravi, Method and system for securing, managing or optimizing a personal computer.
  320. Kouznetsov, Victor, Method and system for updating anti-intrusion software.
  321. Voss, Timothy, Method and system of assessing risk using a one-dimensional risk assessment model.
  322. Miller Jeremy P. ; Umamaheswaran Venkatakrishnan ; Weiss Kurt A. ; Wood Charlie W., Method for adhering materials having differing expansion properties and articles produced therefrom.
  323. Fabrizio Daniel ; Spilo Michael L., Method for caching virtual memory paging and disk input/output requests.
  324. Hollander Yona,ILX ; Rahman Ophir,ILX ; Sagiv Shmuel,ILX ; Segal Ury,ILX, Method for detecting buffer overflow for computer security.
  325. Spilo, Michael L., Method for improving the perceived performance of a computer system.
  326. Todd ; Sr. Robert E. ; Glahe Aaron C. ; Pendleton Adam H., Method for network self security assessment.
  327. Spilo Michael L. ; Daub Jonathan A., Method for reducing the memory requirements for an application program executing in a multi-tasking environment.
  328. Lotem, Amnon; Cohen, Gideon; Ban Naon, Lior, Method for simulation aided security event management.
  329. Spilo Michael L., Method for testing cache memory systems.
  330. Fabrizio, Daniel; Daub, Jonathan, Method of allocating clusters of computer readable medium to a file while minimizing fragmentation of the computer readable medium.
  331. Torii,Satoru; Mitomo,Masashi; Kotani,Seigo; Takizawa,Fumie, Method of and system for managing information, and computer product.
  332. Norman, Andrew Patrick; Brawn, John Melvin; Scrimsher, John P; Griffin, Jonathan, Method of identifying software vulnerabilities on a computer system.
  333. Rowley,Bevan S.; Huntington,Stephen G., Method of reconstructing network communications.
  334. Rowley,Bevan S.; Huntington,Stephen G., Method of simulating network communications.
  335. Kuo Chengi Jimmy ; Koltchev Jivko ; Zheng Dao-Chen ; Peter Joseph, Method of treating whitespace during virus detection.
  336. Sonnenberg, Glen, Method system and computer program product for distributed internet information search and retrieval.
  337. Porter, Keith Alan; Beck, James Leslie, Method, computer program product, and system for risk management.
  338. Baggett, Jr., Charlie C.; Adams, John J., Method, system and computer program product for assessing information security.
  339. Leong, Pak-Tak Patrick; Won, King L., Method, system and computer program product for physical link layer handshake protocol analysis.
  340. Manin, Dmitrii, Method, system and computer program product for using an instantaneous memory deficit metric to detect and reduce excess paging operations in a computer system.
  341. Baggett, Jr., Charlie C.; Adams, John J., Method, system, and computer program product for assessing information security.
  342. Keller,Alexander, Methods and apparatus for dependency-based impact simulation and vulnerability analysis.
  343. Wiedmann, Ulrich; Lillie, Terrance L.; Sneiderman, Richard P.; Wiedmann, Christian; Zeljko, Robert, Methods and systems for automated configuration of 802.1x clients.
  344. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  345. Wiedmann, Ulrich; Lillie, Terrance L.; Sneiderman, Richard P.; Wiedmann, Christian; Zeljko, Robert, Methods and systems for fallback modes of operation within wireless computer networks.
  346. Hutchinson, Robin; Giubileo, John; O'Brien, Darci, Methods and systems for managing assets.
  347. Wiedmann, Ulrich; Lillie, Terrance L.; Sneiderman, Richard P.; Wiedmann, Christian; Zeljko, Robert, Methods and systems of remote authentication for computer networks.
  348. Nwabueze, E. Kenneth; Venkataraman, Siva; Chaudhury, Supratim Roy; Thirumaligai, Appan, Methods for abstracting data from various data structures and managing the presentation of the data.
  349. Charles W. Scarantino ; H. Troy Nagle ; Leslie C. Hall ; Jeffrey Mueller ; Chang-Soo Kim, Methods, systems, and associated implantable devices for dynamic monitoring of physiological and biological properties of tumors.
  350. Nesovic Danilo N. (6370 Kimi La. La Mesa CA 91942), Modular countertop system.
  351. Eric David O'Brien ; James Robert Tryon, Jr., Modular framework for configuring action sets for use in dynamically processing network events in a distributed computing environment.
  352. O'Brien, Eric David; Tryon, Jr., James Robert, Modular framework for dynamically processing network events using action sets in a distributed computing environment.
  353. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  354. Kilpatrick, Douglas; Badger, Mark Lee; Ko, Calvin, Multi-platform sequence-based anomaly detection wrapper.
  355. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, Network access control system and method using adaptive proxies.
  356. Taylor,Kevin R.; Murugesan,Ganesh; Tajalli,Homayoon, Network access control system and method using adaptive proxies.
  357. Jagger, Luke D.; Rothwell, Anton C.; Dennis, William R., Network adapter firewall system and method.
  358. Jagger, Luke D.; Rothwell, Anton C.; Dennis, William R., Network adapter firewall system and method.
  359. Joiner,Herbert V., Network adaptive baseline monitoring system and method.
  360. Whitmore, Brent S; La Cholter, William J.; Lawler, Geoff, Network analysis system and method utilizing collected metadata.
  361. Whitmore, Brent S; La Cholter, William J.; Lawler, Geoff, Network analysis system and method utilizing collected metadata.
  362. Churchyard,Peter J, Network analyzer engine system and method.
  363. Harrison, David Ronald, Network analyzer system, method and computer program product for multi-dimensional analysis of network tunnels.
  364. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste, Network audit and policy assurance system.
  365. Kadam, Sunil S.; Fu, Tianying; Bacus, Mike Patrick, Network connection-independent updating system and method.
  366. Huntington,Stephen G.; Covington,Stanley P.; Major,John Darren; Rowley,Bevan S., Network data retrieval and filter systems and methods.
  367. Huntington,Stephen G.; Covington,Stanley P.; Major,John Darren; Rowley,Bevan S., Network data retrieval and filter systems and methods.
  368. Wiegel Scott L., Network gateway mechanism having a protocol stack proxy.
  369. Wu,Handong; Freedman,Jerome; Ivory,Christopher J., Network intrusion detection and analysis system and method.
  370. Hall, Aron, Network security apparatus and method.
  371. Dowd,Alan; Markham,Thomas R.; Foote Lennox,Tomo; Apostal,David; Lu,Raymond, Network security modeling system and method.
  372. Njemanze, Hugh S.; Aguilar-Macias, Hector; Zeng, Qiang; Beedgen, Christian Friedrich; Kothari, Pravin S., Network security monitoring system employing bi-directional communication.
  373. Jahn,Alfred, Network security software.
  374. Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  375. Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  376. Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  377. Keanini,Timothy D.; Quiroga,Martin A.; Buchanan,Brian W.; Flowers,John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  378. Willebeek LeMair,Marc; Cantrell,Craig; Cox,Dennis; McHale,John; Smith,Brian, Network security system integration.
  379. Gordy, Stephen C.; Poelstra, Henry D.; Otis, Robert W.; Gallatin, Tom, Network security tap for use with intrusion detection system.
  380. Bunker, V,Nelson Waldo; Laizerovich,David; Bunker,Eva Elizabeth; Van Schuyver,Joey Don, Network security testing.
  381. Conklin David Allen ; Harrison John Reed, Network surveillance system.
  382. Porras, Phillip Andrew; Fong, Martin Wayne, Network-based alert management.
  383. Hicks,Durwood A.; Gullotto,Vincent P., Network-based file scanning and solution delivery in real time.
  384. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Network-based risk-assessment tool for remotely detecting local computer vulnerabilities.
  385. Magdych,James S.; Rahmanovic,Tarik; McDonald,John R.; Tellier,Brock E.; Osborne,Anthony C.; Herath,Nishad P., Network-based risk-assessment tool for remotely detecting local computer vulnerabilities.
  386. Jivsov, Andrey, Non-repudiation of e-mail messages.
  387. Muttik,Igor; Paget,Francois; Van Oers,Marius Hendrik Maria, On-access malware scanning.
  388. Jou Michelle M. ; Leung Ting Yu ; Pirahesh Mir Hamid, Optimization of correlated SQL queries in a relational database management system.
  389. Heinrich, Nicolas, Overall risk in a system.
  390. Soppera,Andrea, Packet data communications.
  391. Lambiase, Serena, Patch distribution system, method and computer program product.
  392. Lemelson ; deceased Jerome H. ; Pedersen Robert D. ; Lemelson ; executrix by Dorothy, Personal emergency, safety warning system and method.
  393. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., Phase delivery of components of a system required for implementation technology.
  394. Kouznetsov,Victor; Libenzi,Davide; Fallenstedt,Martin; Palmer,David W.; Pak,Michael C., Platform abstraction layer for a wireless malware scanning engine.
  395. Kekic Miodrag M. ; Lu Grace N. ; Carlton Eloise H., Platform independent computer network management client.
  396. Kouznetsov, Victor; Libenzi, Davide; Pak, Michael C.; Urakawa, Yasutaka; Ishii, Kenji; Fujita, Masanori, Platform-independent scanning subsystem API for use in a mobile communication framework.
  397. Cooper,Geoffrey; Valente,Luis Filipe Pereira; Pearcy,Derek P.; Richardson,Harry Alexander, Policy-based vulnerability assessment.
  398. Agrawal, Ajay; Sathya, Sriharsha; Neelakantamurthy, Yashovan; Prakash, Apurva; Malpani, Raghavendra; Saraswati, Abhishek; Rao, Suryaprashant; Hate, Ashish; Schmitz, Peter O., Portable computing device and associated method for analyzing a wireless local area network.
  399. Barton,Christopher Andrew; Reed,Simon Neil; Brown,Martin Alan, Pre-approval of computer files during a malware detection.
  400. Roberts,Guy William Welch; Cole,Andrew Lewis; Baulk,Eamonn John, Predictive malware scanning of internet data.
  401. McArdle,Mark J.; Johnston,Brent A., Prevention of operating system identification through fingerprinting techniques.
  402. Moran, Mike; Liubinskas, Tauras; Goral, Jack, Prioritized data capture, classification and filtering in a network monitoring environment.
  403. Dimitrios Papadimitriou ; Theodore Havinis, Priority handling of location services in a mobile communications network.
  404. Gartside, Paul, Priority-based virus scanning with priorities based at least in part on heuristic prediction of scanning risk.
  405. Melchione,Daniel Joseph, Process-based selection of virus detection actions system, method and computer program product.
  406. Lingafelt, Charles Steven; Yell, Nigel Birkbeck, Protecting a data processing system from attack by a vandal who uses a vulnerability scanner.
  407. Lingafelt,Charles Steven; Yell,Nigel Birkbeck, Protecting a data processing system from attack by a vandal who uses a vulnerability scanner.
  408. Nedbal,Manuel; Fellner,Paul; Schlemmer,Andreas, Protocol for controlling an execution process on a destination computer from a source computer.
  409. Brown,Martin A.; Gullotto,Vincent P., Protocol layer-level system and method for detecting virus activity.
  410. Shetty, Satish, Protocol-level malware scanner.
  411. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Protocol-parsing state machine and method of using same.
  412. Lucas, Martin James; Wolff, Daniel Joseph, Providing break points in a malware scanning operation.
  413. McGrew David A. ; Carman David W., Publicly verifiable key recovery.
  414. Lymer, Brent J.; Karchapalayam, Babu; Kingsbury, Brad, Push alert system, method, and computer program product.
  415. Lymer, Brent J.; Katchapalayam, Babu; Kingsbury, Brad, Push alert system, method, and computer program product.
  416. Lymer, Brent J.; Katchapalayam, Babu; Kingsbury, Brad, Push alert system, method, and computer program product.
  417. Carey, Michael James; Kiernan, Gerald George, Query optimization with deferred updates and autonomous sources.
  418. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  419. Spilo Michael L. ; Daub Jonathan A., Recoverable computer file system with a signature area containing file integrity information located in the storage blocks.
  420. Johnson, Tommy Olaus; O'Brien, Eric David; Kilpatrick, Douglas Stone, Reducing HTTP malware scanner latency using HTTP range queries for random access.
  421. Kim,Do K.; Pearce,Christopher L.; Constantine,Jeffrey J., Remote e-mail scanning system and method.
  422. Smithson, Robert Hugh; Woodruff, Andrew Arlin; Rothwell, Anton Christian; Green, Jeffrey Martin; Bolin, Christopher Scott, Response to a computer virus outbreak.
  423. Herz, Frederick S. M., SDI-SCAM.
  424. Jagger, Luke D.; Dennis, William R.; Rothwell, Anton C., SPAM report generation system and method.
  425. Markham Thomas R., Scalable key agile cryptography.
  426. Cook, Jeffrey V.; Heyman, Michael; Dinsmore, Peter, Scalable system and method for management and notification of electronic certificate changes.
  427. Barton, Chris A.; Tarbotton, Lee Codel Lawson; Lucas, Martin J., Scanner API for executing multiple scanning engines.
  428. Grupe,Robert, Scanning computer files for specified content.
  429. Smithson, Robert Hugh; Wolff, Daniel Joseph, Scanning computer files for unwanted properties.
  430. Crigler Arthur J. (La Mirada CA) Lecong Hai (Reseda CA), Seamless flush mounted countertop sink.
  431. Hearnden, Stephen Owen, Searching for sequences of character data.
  432. Boerbert William E. (Minneapolis MN), Secure computer interface.
  433. Boebert William E. (Minneapolis MN) Hanson Mark H. (Eagan MN) Markham Thomas R. (Anoka MN), Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local wo.
  434. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  435. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities.
  436. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Secure gateway with firewall and intrusion detection capabilities.
  437. Chow, Stanley T.; Johnson, Harold J.; Main, Alexander; Gu, Yuan, Secure method and system for computer protection.
  438. Shetty, Satish; Kouznetsov, Victor; Melchione, Dan, Secure method and system for using a public network or email to administer to software on a plurality of client computers.
  439. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  440. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  441. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  442. Libenzi, Davide; Kouznetsov, Victor, Secure signature server system and associated method.
  443. Bursch, Todd, Secure single-use transaction numbers.
  444. Bursch, Todd, Secure single-use transaction numbers.
  445. Bursch, Todd, Secure single-use transaction numbers.
  446. McEwan,William Alexander, Security and software testing of pre-release anti-virus updates on client and transmitting the results to the server.
  447. O'Brien, Richard; Lu, Raymond; Mitchem, Terrence; Minear, Spencer, Security framework for dynamically wrapping software applications executing in a computing system.
  448. O'Brien,Richard; Lu,Raymond; Mitchem,Terrence; Minear,Spencer, Security framework for supporting kernel-based hypervisors within a computing system.
  449. O'Brien, Eric David, Security network processor system and method.
  450. Banzhof,Carl E.; Davies,John, Security risk analysis system and method.
  451. LeGrow,Matthew A., Security scanning system and method utilizing generic IP addresses.
  452. Bartleson, Todd; Haagensen, Brandt; Cox, Brian R., Security system and method for handheld computers.
  453. Kocher, Paul Carl; Jaffe, Joshua Michael; Jun, Benjamin Che-Ming; Laren, Carter Cyrus; Pearson, Peter Kelley; Lawson, Nathaniel James, Self-protecting digital content.
  454. Kilpatrick, Douglas; Ko, Calvin; Kiernan, Stephen J., Sequence-based anomaly detection using a distance matrix.
  455. Lin, Li-Wei; Lee, Chen-Chiang; Lee, Chi-Hsin, Serial-type light-emitting diode (LED) device.
  456. Contino, Salvatore J.; Ling, Mei, Service desk system architecture for a mobile service workforce.
  457. Contino, Salvatore J.; Ling, Mei, Service desk system for allowing easily changeable associations for data retrieval and display.
  458. Brawn,John Melvin; Norman,Andrew Patrick; Dalton,Chris Ralph; Griffin,Jonathan, Signal level propagation mechanism for distribution of a payload to vulnerable systems.
  459. Wu,Handong; Schwab,Stephen; Peckham,Robert Lom, Signature based network intrusion detection system and method.
  460. Spear, Paul, Single point of entry/origination item scanning within an enterprise or workgroup.
  461. Huntington, Stephen Glen; Major, John Darren; Covington, Stanley P.; Rowley, Bevan S., Sliding window packet management systems.
  462. Huntington,Stephen Glen; Major,John Darren; Covington,Stanley P.; Rowley,Bevan S., Sliding window packet management systems.
  463. Tarbotton,Lee Codel Lawson; Wolff,Daniel Joseph; Page,Timothy James, Software audit system.
  464. Melchione,Daniel Joseph; Wong,Oyland; Huang,Ricky Y.; Vigue,Charles Leslie, Software distribution via stages.
  465. John C. Delo ; Malcolm S. Haar ; Chetan A. Parulekar ; Tracy D. Ferrier ; Benjamin Chamberlain ; David E. Gonzalez ; David R. Mckinnis, Software implementation installer mechanism.
  466. Lambiase, Serena, Software license reporting and control system and method.
  467. William Cheng ; Kenneth Hwang ; Ravi Kannan ; Babu Katchapalayam ; Bing Liu ; Balaji Narasimhan ; Gopal Ramanujam ; Jonathan Tran, Software product uninstallation system and method.
  468. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  469. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  470. Irwin, Victoria Lynn, Steganographically authenticated packet traffic.
  471. Chan Alfred ; Kekicheff Marc B. ; Weise Joel M. ; Wentker David C., System and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card.
  472. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for access field verification.
  473. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  474. Brennan, Sean, System and method for accomplishing two-factor user authentication using the internet.
  475. Brennan, Sean, System and method for accomplishing two-factor user authentication using the internet.
  476. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  477. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  478. Branstad, Dennis K.; Carman, David W., System and method for adaptive cryptographically synchronized authentication.
  479. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Payne, John; Ritter, Stephen J.; Nakawatase, Ryan Tadashi; Pelly, John; Rutherford, M. Celeste, System and method for applying a machine-processable policy rule to information gathered about a network.
  480. Fox, Kevin L.; Henning, Ronda R.; Farrell, John T.; Miller, Clifford C., System and method for assessing the security posture of a network and having a graphical user interface.
  481. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  482. Kouznetsov,Victor; Vigue,Charles L.; Fallenstedt,Martin; Melchione,Daniel, System and method for automatic selection of service provider for efficient use of bandwidth and resources in a peer-to-peer network environment.
  483. Vigue, Charles L.; Fallenstedt, Martin; Melchione, Daniel; Kouznetsov, Victor, System and method for automatic selection of service provider for efficient use of bandwidth and resources in a peer-to-peer network environment.
  484. Cushman Paul W. ; Won King L. ; Mehta Bakulesh A., System and method for automatically identifying and analyzing currently active channels in an ATM network.
  485. Jones,William L.; Schon,Walter J., System and method for automatically protecting private video content using cryptographic security for legacy systems.
  486. Schon,Walter J.; Jones,William L., System and method for automatically protecting private video content using embedded cryptographic security.
  487. Ptacek, Thomas Henry; Newsham, Timothy Nakula; Friedrichs, Oliver, System and method for building an executable script for performing a network security audit.
  488. Gordon, Bryson; Zandstra, Gary; Kannan, Ravi, System and method for certifying that data received over a computer network has been checked for viruses.
  489. Gordon,Bryson; Zandstra,Gary; Kannan,Ravi, System and method for certifying that data received over a computer network has been checked for viruses.
  490. Schwab, Stephen A., System and method for communicating coalesced rule parameters in a distributed computing environment.
  491. Spilo Michael L. ; Daub Jonathan A., System and method for computer operating system protection.
  492. Spilo Michael L. ; Daub Jonathan A., System and method for computer operating system protection.
  493. Hanchett, Paul F., System and method for configuration, management, and monitoring of a computer network using inheritance.
  494. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  495. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  496. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  497. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  498. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  499. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  500. Tajalli Homayoon (Ellicott City MD) Badger Mark L. (Rockville MD) Dalva David I. (Rockville MD) Walker Stephen T. (Glenwood MD), System and method for controlling the use of a computer.
  501. Grindrod, Geoff; Slavos, Oto; Kodali, Saigiridhar; Hallman, Clinton, System and method for customizing and processing business logic rules in a business process system.
  502. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  503. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  504. Celis Pedro ; Vaishnav Jay ; Zeller Hansjorg, System and method for database query optimization.
  505. Won, King L.; Yildiz, Kazim O.; Wu, Handong, System and method for detecting and locating access points in a wireless network.
  506. Vigue,Charles L.; Fallenstedt,Martin; Melchione,Daniel; Kouznetsov,Victor, System and method for distributed function discovery in a peer-to-peer network environment.
  507. Kouznetsov,Victor; Ushakov,Andrei, System and method for distributing portable computer virus definition records with binary file conversion.
  508. Kouznetsov, Victor, System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state.
  509. Eric David O'Brien ; James Robert Tryon, Jr., System and method for dynamically sensing an asynchronous network event within a modular framework for network event processing.
  510. Kouznetsov, Victor; Melchione, Dan; Fallenstedt, Martin, System and method for efficient distribution of application services to a plurality of computing appliances organized as subnets.
  511. Kouznetsov, Victor; Ushakov, Andrei, System and method for efficiently managing computer virus definitions using a structured virus database.
  512. Carman, David W.; Heyman, Michael D.; Sherman, Alan T., System and method for enabling authentication at different authentication strength-performance levels.
  513. Soles, William E.; Leon E. Morgan Jr.; Anth, Arthur J.; Thompson, Marion B.; O'Shea, Edward T.; Garguilo, Frank E.; Bowlin, Amy H.; Morgan, Joseph, System and method for evaluating the performance of a computer application.
  514. Pak, Michael Chin-Hwan; Ouchakov, Andrei; Pham, Khai Nhu; Gryaznov, Dmitry O.; Kouznetsov, Victor, System and method for executing computer virus definitions containing general purpose programming language extensions.
  515. Hinchliffe,Alex; Howard,Fraser Peter; Muttik,Igor G.; Harris,Mark D., System and method for facilitating IPv6 protocol usage by an application program.
  516. Churchyard, Peter, System and method for facilitating editing of codes such as HTML and XML codes by scripts.
  517. Carman, David W.; Heyman, Michael D.; Sherman, Alan T., System and method for fast nested message authentication codes and error correction codes.
  518. Freedman, Jerome N., System and method for heuristic determination of network protocols.
  519. Gryaznov,Dmitry O.; Peternev,Viatcheslav; Muttik,Igor, System and method for identifying a macro virus family using a macro virus definitions database.
  520. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  521. Epstein, Jeremy; Thomas, Linda, System and method for increasing the resiliency of firewall systems.
  522. Rothwell,Anton C.; Jagger,Luke D.; Dennis,William R.; Clarke,David R., System and method for intelligent SPAM detection using statistical analysis.
  523. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System and method for interactive web services.
  524. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System and method for interactive web services.
  525. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpoie, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  526. Holland, III, Daniel T.; Hilomen, Roark B.; Lang, Steven P., System and method for intrusion detection data collection using a network protocol stack multiplexor.
  527. Dinsmore,Peter T; Heyman,Michael; Kruus,Peter; Sherman,Alan T, System and method for key distribution in a hierarchical tree.
  528. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
  529. Gula, Ronald Joseph; Deraison, Renaud Marie Maurice; Hayton, Matthew Todd, System and method for managing network vulnerability analysis systems.
  530. Houston, Gregory Neil; Kobsa, Christian D.; Embar, Sridhar; Di Iorio, Matthew Thaddeus; Williams, Bryan Douglas; Nikitaides, Michael George, System and method for managing security events on a network.
  531. William Cheng ; Kenneth Hwang ; Ravi Kannan ; Babu Katchapalayam ; Bing Liu ; Balaji Narasimhan ; Gopal Ramanujam ; Jonathan Tran, System and method for modifying software residing on a client computer that has access to a network.
  532. Watson, Robert N. M.; Kindred, Darrell; Lewis, Ed; Niebuhr, Brian; Gudmundsson, Olafur, System and method for negotiating multi-path connections through boundary controllers in a networked computing environment.
  533. Watson,Robert N. M.; Kindred,Darrell; Lewis,Ed; Niebuhr,Brian; Gudmundsson,Olafur, System and method for negotiating multi-path connections through boundary controllers in a networked computing environment.
  534. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, System and method for network access control using adaptive proxies.
  535. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  536. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  537. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  538. Cole,David M.; Hanzlik,Dennis J.; Caso,Erik, System and method for network vulnerability detection and reporting.
  539. Keir, Robin M.; Ecker, Stephen A., System and method for network vulnerability detection and reporting.
  540. Keir,Robin M.; Ecker,Stephen A., System and method for network vulnerability detection and reporting.
  541. Kurtz, George R.; Cole, David M.; Caso, Erik; Kuykendall, Dan, System and method for network vulnerability detection and reporting.
  542. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  543. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  544. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  545. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  546. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  547. McClure,Stuart C.; Kurtz,George; Keir,Robin; Beddoe,Marshall A.; Morton,Michael J.; Prosise,Christopher M.; Cole,David M.; Abad,Christopher, System and method for network vulnerability detection and reporting.
  548. Buscema, Massimo, System and method for optimization of a database for the training and testing of prediction algorithms.
  549. Yago, Paul C.; Wu, Miles; Zhang, Kaiwang, System and method for organizing objects of a voice call in a tree representation.
  550. Gryaznov, Dmitry O.; Kuo, Chengi Jimmy, System and method for partitioned distributed scanning of a large dataset for viruses and other malware.
  551. Libenzi,Davide; Pak,Michael Chin Hwan, System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment.
  552. Tom Mohimm Daniel (Clifton Park NY), System and method for performing risk and credit analysis of financial service applications.
  553. Glawitsch, Gregor A., System and method for preventing a spoofed denial of service attack in a networked computing environment.
  554. Watson, Robert N. M.; Gudmundsson, Olafur, System and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment.
  555. Verma,Ravi, System and method for preventing software piracy.
  556. Wu,Handong; Cook,Jeff, System and method for protecting internet protocol addresses.
  557. Kouznetsov,Victor; Pak,Michael Chin Hwan; Melchione,Daniel J.; Shaughnessy,Ian, System and method for providing a framework for network appliance management in a distributed computing environment.
  558. Libenzi, Davide, System and method for providing a multi-tiered hierarchical transient message store accessed using multiply hashed unique filenames.
  559. Osborne, Anthony Charles; Leidl, Bruce Robert; Eschelbeck, Gerhard; Villa, Andrea Emilio, System and method for providing a network host decoy using a pseudo network protocol stack implementation.
  560. Kouznetsov, Victor; Melchione, Dan; Fallenstedt, Martin, System and method for providing application services with controlled access into privileged processes.
  561. Kouznetsov, Victor; Melchione, Dan; Fallenstedt, Martin, System and method for providing application services with controlled access into privileged processes.
  562. Shetty, Satish; Singh, Harvir; Bacus, Michael, System and method for providing automated low bandwidth updates of computer anti-virus application components.
  563. Libenzi,Davide, System and method for providing dynamic screening of transient messages in a distributed computing environment.
  564. Duncan,William E.; Hwang,Vincent, System and method for providing expandable proxy firewall services.
  565. Libenzi,Davide; Kouznetsov,Victor, System and method for providing passive screening of transient messages in a distributed computing environment.
  566. O'Brien, Darci; Giubileo, John; Rankin, David C., System and method for providing remediation management.
  567. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  568. Boebert,William E.; Rogers,Clyde O.; Andreas,Glenn; Hammond,Scott W.; Gooderum,Mark P., System and method for providing secure internetwork services via an assured pipeline.
  569. Kouznetsov,Victor, System and method for providing telephonic content security service in a wireless network environment.
  570. Eschelbeck, Gerhard; Villa, Andrea, System and method for providing trustworthy network security concern communication in an active security management environment.
  571. Kouznetsov,Victor; Pak,Michael Chin Hwan; Melchione,Daniel J.; Hogle,Nicholas C. W., System and method for providing web browser-based secure remote network appliance configuration in a distributed computing environment.
  572. Huang, Ricky; Kouznetsov, Victor; Fallenstedt, Martin, System and method for providing web-based remote security application client administration in a distributed computing environment.
  573. Gleichauf Robert ; Shanklin Steven, System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment.
  574. Deshmukh, Swati; Kadam, Sunil; Bacus, Mike, System and method for real-time triggered event upload.
  575. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  576. Rupp, Vaughn E.; Robinette, Randall W.; Harvey, Darline A., System and method for remediating a computer.
  577. Cox, Brian R.; Haagensen, Brandt; Kim, Do, System and method for remote maintenance of handheld computers.
  578. Trueba,Luis Ruben Zapien, System and method for restricting access to an enterprise network.
  579. Dinsmore, Peter T; Heyman, Michael; Kruus, Peter; Sherman, Alan T, System and method for reusable efficient key distribution.
  580. Cohen, Gideon; Meiseles, Moshe; Reshef, Eran, System and method for risk detection and analysis in a computer network.
  581. Cohen, Gideon; Meiseles, Moshe; Reshef, Eran, System and method for risk detection and analysis in a computer network.
  582. Gleichauf Robert ; Shanklin Steven ; Waddell Scott ; Ziese Kevin, System and method for rules-driven multi-phase network vulnerability assessment.
  583. Kouznetsov, Victor; Vigue, Charles L.; Fallenstedt, Martin; Melchione, Daniel, System and method for secure and verified sharing of resources in a peer-to-peer network environment.
  584. Hanzlik, Robert Otto; Lowe, Geoffrey A.; Markham, Thomas R.; Meredith, Lynn Marquette, System and method for secure group communications.
  585. Haigh J. Thomas ; Jensen Andrew W., System and method for securing compiled program code.
  586. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Pelly, John; Nakawatase, Ryan Tadashi; Walpole, Thomas Paul, System and method for security information normalization.
  587. Sonnenberg,Glen, System and method for selective communication scanning at a firewall and a network node.
  588. Branstad, Dennis K.; Carman, David W., System and method for selectively authenticating data.
  589. Badger Lee ; Sterne Daniel F. ; Sherman David L. ; Tajalli Homayoon ; Dalva David I., System and method for superimposing attributes on hierarchically organized file systems.
  590. Parish, Sandy; Goostree, Peter, System and method for tracking computer viruses.
  591. Parish,Sandy; Goostree,Peter, System and method for tracking computer viruses.
  592. Watson, Robert N. M.; Gudmundsson, Olafur; Kindred, Darrell, System and method for transacting a validated application session in a networked computing environment.
  593. Markham,Thomas R.; Meredith,Lynn Marquette; Hanzlik,Robert Otto; Lowe,Geoffrey A., System and method for transmitting and receiving secure data in a virtual private group.
  594. Boebert William E. (Minneapolis MN), System and method for trusted path communications.
  595. Stockwell Edward B. ; Greve Paula Budig, System and method of electronic mail filtering using interconnected nodes.
  596. Andres, Steven G.; Cole, David M.; Cummings, Thomas Gregory; Garcia, Roberto Ramon; Kenyon, Brian Michael; Kurtz, George R.; McClure, Stuart Cartier; Moore, Christopher William; O'Dea, Michael J.; Saruwatari, Ken D., System and method of managing network security risks.
  597. Beddoe, Marshall; Keir, Robin, System and method of operating system identification.
  598. Hussain Tahir ; Bhatia Ranjit, System and method of providing preferential access to subscribers of localized service areas in a radio telecommunications network.
  599. Thomas Henry Ptacek ; Timothy Nakula Newsham ; Oliver Friedrichs, System and method providing custom attack simulation language for testing networks.
  600. Vigue,Charles L.; Fallenstedt,Martin; Melchione,Daniel; Kouznetsov,Victor, System and method to securely confirm performance of task by a peer in a peer-to-peer network environment.
  601. Kouznetsov,Victor; Vigue,Charles L.; Fallenstedt,Martin; Melchione,Daniel, System and method to verify trusted status of peer in a peer-to-peer network environment.
  602. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  603. Mark James McArdle ; Steven Blair Schoenfeld, System and methodology for messaging server-based management and enforcement of crypto policies.
  604. Eschelbeck, Gerhard; Schlemmer, Andreas; Blaimschein, Peter, System and process for brokering a plurality of security applications using a modular framework in a distributed computing environment.
  605. Eschelbeck, Gerhard; Steiner, Thomas; Johannes, Mayr, System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment.
  606. Eschelbeck, Gerhard, System and process for reporting network events with a plurality of hierarchically-structured databases in a distributed computing environment.
  607. Gorman, David B.; Catherine, Gregory J.; Peragine, Richard; Conrad, Beverly; Gearhart, G. Duane; Moy, David, System for intrusion detection and vulnerability analysis in a telecommunications signaling network.
  608. Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
  609. Purtell, Andrew; Knobbe, Roger; Schwab, Stephen, System for sharing network state to enhance network throughput.
  610. Okajo, Sumitaka; Matsuda, Katsushi, System for supporting security administration and method of doing the same.
  611. Beaverton Arthur J. (Maynard MA) Hunt Thomas E. (Brookline NH), System for updating program stored in EEPROM by storing new version into new location and updating second transfer vecto.
  612. Freund, Gregor Paul; Haycock, Keith Allan; Herrmann, Conrad Kamaha'o, System providing internet access management with router-based policy enforcement.
  613. Chen Eva Y. ; Ro Jonny T.,TWX ; Deng Ming M.,TWX ; Chi Leta M.,TWX, System, apparatus and method for the detection and removal of viruses in macros.
  614. Mathur, Saroop; Venkatraman, Rajamadam C.; Kim, Charlie; Warty, Ashish; Liao, Yih-Ming, System, device and method for dynamically securing instant messages.
  615. Mathur, Saroop; Venkatraman, Rajamadam C.; Kim, Charlie; Warty, Ashish; Liao, Yih-Ming M., System, device and method for dynamically securing instant messages.
  616. Pantuso,Joseph J.; Ritter,Christopher D., System, method and computer program product for a firewall summary interface.
  617. Joiner, Herbert V.; Raghuraman, Praveen; Verma, Ravi, System, method and computer program product for a network analyzer business model.
  618. Joiner,Herbert V.; Raghuraman,Praveen; Verma,Ravi, System, method and computer program product for a network analyzer business model.
  619. Barton, Chris A.; Vignoles, James M.; Lawrence, James W., System, method and computer program product for anti-virus scanning in a storage subsystem.
  620. Vignoles,James M.; Hearnden,Stephen Owen; Smithson,Robert Hugh, System, method and computer program product for applying prioritized security policies with predetermined limitations.
  621. Ashoff, Thomas D.; Chew, Steve O.; Graham, Jeffrey J.; Mullican, Andrew J., System, method and computer program product for authenticating users using a lightweight directory access protocol (LDAP) directory server.
  622. Ashoff,Thomas D.; Chew,Steve O.; Graham,Jeffrey J.; Mullican,Andrew J., System, method and computer program product for authenticating users using a lightweight directory access protocol (LDAP) directory server.
  623. Bernhard Thomas ; Escamilla Terry ; Leddy William ; Letsinger Richard ; Marks Crosby ; Smaha Steven E. ; Snapp Steven R., System, method and computer program product for automatic response to computer system misuse using active response modules.
  624. Muttik, Igor G.; Gulletten, Vincent P.; Schmugar, Craig D., System, method and computer program product for conditionally updating a security program.
  625. Kouznetsov,Victor; Libenzi,Davide; Pak,Michael C.; Urakawa,Yasutaka; Ishii,Kenji; Fujita,Masanori, System, method and computer program product for content/context sensitive scanning utilizing a mobile communication device.
  626. Magdych,James S.; Rahmanovic,Tarik; McDonald,John R.; Tellier,Brock E.; Osborne,Anthony C.; Herath,Nishad P., System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device.
  627. Hollander,Yona; Horovitz,Oded, System, method and computer program product for detection of unwanted processes.
  628. Benzinger,Lee; Feiertag,Richard J.; Rho,Jaisook, System, method and computer program product for dynamic system adaptation using contracts.
  629. Hursey,Neil John, System, method and computer program product for eliminating disk read time during virus scanning.
  630. Kouznetsov,Victor; Libenzi,Davide; Fallenstedt,Martin; Palmer,David W.; Pak,Michael C., System, method and computer program product for equipping wireless devices with malware scanning capabilities.
  631. Magdych,James S.; Rahmanovic,Tarik; McDonald,John R.; Tellier,Brock E.; Osborne,Anthony C.; Herath,Nishad P., System, method and computer program product for improved efficiency in network assessment utilizing a port status pre-qualification procedure.
  632. Magdych,James S.; Rahmanovic,Tarik; McDonald,John R.; Tellier,Brock E.; Osborne,Anthony C.; Herath,Nishad P., System, method and computer program product for improved efficiency in network assessment utilizing variable timeout values.
  633. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E., System, method and computer program product for improving computer network intrusion detection by risk prioritization.
  634. Churchyard, Peter J., System, method and computer program product for increasing the performance of a proxy server.
  635. Pantuso,Joseph J., System, method and computer program product for monitoring hacker activities.
  636. Yago, Paul C.; Sangisetti, Ravi; Zhang, Kaiwang, System, method and computer program product for monitoring voice application calls over a network.
  637. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  638. Balasubramaniam,Chandrasekar; Kannan,Ravi; Revashetti,Siddaraya Basappa; Sampath,Srivats; Katchapalayam,Babu, System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  639. Balasubramaniam,Chandrasekar; Kannan,Ravi; Revashetti,Siddaraya Basappa; Sampath,Srivats; Katchapalayam,Babu, System, method and computer program product for performing one or more tasks on a remotely located computer connected to a server computer via a data network.
  640. Tarbotton,Lee Codel Lawson; Wolff,Daniel J.; Cowie,Neil A., System, method and computer program product for precluding writes to critical files.
  641. McIchionc, Daniel Joseph, System, method and computer program product for process-based selection of virus detection actions.
  642. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E., System, method and computer program product for risk assessment scanning based on detected anomalous events.
  643. Minkin, Ilya; Balabine, Igor V.; Eschelbeck, Gerhard, System, method and computer program product for rule based network security policies.
  644. Feiertag, Richard J.; Thomas, Roshan; Rho, Jaisook; Cohen, Eve L.; Rosset, Sebastien T.; Redmond, Timothy, System, method and computer program product for secure communications using a security service provider manager.
  645. Edwards, Jonathan L.; White, Edmund H., System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed.
  646. Badger M. Lee ; Sterne Daniel F. ; Sherman David L. ; Tajalli Homayoon ; Dalva David I., System, method and computer program product for superimposing attributes on hierarchically organized file systems.
  647. Sheth, Chintan H.; Sternin, Jeffrey Y., System, method and computer program product for translating SNMP (ASN.1) protocol decodes.
  648. Lotem, Amnon; Cohen, Gideon; Meiseles, Moshe; Horn, Ilan, System, method and computer readable medium for evaluating potential attacks of worms.
  649. Mangasarian, Jeff, System, method and software for protocol analyzer remote buffer management.
  650. Riordan, James F.; Alessandri, Dominique, System, method and software for supplying activation information to a subsystem.
  651. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, System, method, and computer program product for automatically updating software on a client computer system.
  652. Lymer, Brent J.; Kingsbury, Brad; Ritter, Chris, System, method, and computer program product for conveying a status of a plurality of security applications.
  653. Lymer, Brent J.; Kingsbury, Brad; Ritter, Chris, System, method, and computer program product for conveying a status of a plurality of security applications.
  654. Lymer,Brent J.; Kingsbury,Brad; Ritter,Chris, System, method, and computer program product for conveying a status of a plurality of security applications.
  655. Gordon, Bryson P.; Schneider, Ryan L., System, method, and computer program product for interfacing a plurality of related applications.
  656. Gordon, Bryson P.; Schneider, Ryan L., System, method, and computer program product for interfacing a plurality of related applications.
  657. Daub, Jonathan A., System, method, and computer program product for preventing trojan communication.
  658. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, System, method, and computer program product for uninstalling computer software.
  659. Cheng,William; Hwang,Kenneth; Kannan,Ravi; Katchapalayam,Babu; Liu,Bing; Narasimhan,Balaji; Ramanujam,Gopal; Tran,Jonathan, System, method, and computer program product for uninstalling computer software.
  660. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  661. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  662. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  663. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  664. Green, Jeffrey; Gartside, Paul N; Bolin, Chris, Systems and methods for converting infected electronic files to a safe format.
  665. Roesch, Martin; Dempster, Ronald A.; Novak, Judy, Systems and methods for determining characteristics of a network.
  666. Roesch, Martin; Vogel, III, William Andrew; Watchinski, Matt, Systems and methods for determining characteristics of a network and analyzing vulnerabilities.
  667. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  668. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  669. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  670. Kennedy, Scott Cruickshanks; Ayers, II, Carleton Royse; Godinez, Javier; Banks, Susan Fichera; Spencer, Myoki Elizabeth, Systems and methods for implementing and scoring computer network defense exercises.
  671. Green,Jeffrey; Gartside,Paul N; Bolin,Chris, Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient.
  672. Judge, Paul, Systems and methods for message threat management.
  673. Judge, Paul, Systems and methods for message threat management.
  674. Judge, Paul, Systems and methods for message threat management.
  675. Judge, Paul, Systems and methods for message threat management.
  676. Judge,Paul, Systems and methods for message threat management.
  677. Kapoor, Harsh; Akerman, Moisey; Justus, Stephen D.; Ferguson, JC; Korsunsky, Yevgeny; Gallo, Paul S.; Lee, Charles Ching; Martin, Timothy M.; Fu, Chunsheng; Xu, Weidong, Systems and methods for processing data flows.
  678. Kelekar, Samir Gurunath, Systems and methods for real-time network-based vulnerability assessment.
  679. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  680. Judge,Paul, Systems and methods for upstream threat pushback.
  681. Hatfalvi,Emil J.; Noble,James G., Systems and methods that provide external network access from a protected network.
  682. Liang,Yung Chang, Task-based automatic network management system with distributed control and management information base.
  683. Wolff,Daniel Joseph; Spurlock,Joel Robert; Edwards,Jonathan Lewis, Techniques for performing malware scanning of files stored within a file storage device of a computer network.
  684. Vignoles, James Malcolm; Gartside, Paul Nicholas; Tuttle, Barrett, Test driver ordering.
  685. Vignoles, James Malcolm; Gartside, Paul Nicholas; Tuttle, Barrett, Test driver selection.
  686. Harris, Mark; Bolin, Christopher Scott; Emm, David, Testing a computer system.
  687. Joiner, Herbert V., Threat assessment orchestrator system and method.
  688. Church, Christopher A.; Govshteyn, Mikhail; Baker, Christopher D.; Holm, Christopher D., Threat scoring system and method for intrusion detection security networks.
  689. Beebe Todd ; Collier Mark D. ; Conyers Doug ; Hamlett Chris ; Faustino Stephen, Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities.
  690. Fisher,Lee Adam, Token-based authentication for network connection.
  691. Chandrashekhar, Uma; Kim, Eunyoung; Koller, Daniel P.; McGee, Andrew Roy; Picklesimer, David D.; Politowicz, Timothy J.; Richman, Steven H.; Tiller, James S.; Xie, Chen, Tool, method and apparatus for assessing network security.
  692. Ivory, Christopher J., Top-down network analysis system and method with adaptive filtering capabilities.
  693. Chen,Eva; Sun,Jimmy; Chou,Terrence; Deutsch,Steven; Havran,Mark, Tracking and reporting of computer virus information.
  694. Barton,Christopher Andrew; Clarke,Graham Andrew; Crowe,Simon, Transferring data via a secure network connection.
  695. Hammond Scott ; Young Jeffery ; Stockwell Edward B., Transparent security proxy for unreliable message exchange protocols.
  696. Hursey, Neil John; McEwan, William Alexander, Tree pattern system and method for multiple virus signature recognition.
  697. Boebert William E. ; Hanson Mark H. ; Markham Thomas R., Trusted path subsystem for workstations.
  698. Balasubramaniam,Chandrasekar; Kannan,Ravi; Revashetti,Siddaraya Basappa; Sampath,Srivats; Katchapalayam,Babu, Uniform resource locator (URL)-based secure download system and method.
  699. Hart, Matthew Thomas, Unwanted e-mail filtering system including voting feedback.
  700. Vignoles, James Malcolm; Tuttle, Barrett, Update status alerting for a malware scanner.
  701. Kouznetsov,Victor; Libenzi,Davide; Pak,Michael C.; Urakawa,Yasutaka; Ishii,Kenji; Fujita,Masanori, Update system and method for updating a scanning subsystem in a mobile communication framework.
  702. Barton,Christopher Andrew; Pine,Kristian John; Gartside,Paul Nicholas, Updating computer files.
  703. Muttik,Igor; Gullotto,Vincent Paul; Pham,Khai, Updating computer files on wireless data processing devices.
  704. Hinchliffe,Alexander James; Howard,Fraser Peter; Rai,Bobby; Kemp,Andrew, Updating data from a source computer to groups of destination computers.
  705. Hursey,Neil John; McEwan,William Alexander, Updating malware definition data for mobile data processing devices.
  706. Tarbotton,Lee Codel Lawson; Moore,Robert Edward; Wolff,Daniel Joseph, User alerts in an anti computer virus system.
  707. Agrawal, Amreesh; Kansal, Amit; Mohammed, Monis; Schmitz, Peter O., User-configurable network analysis digest system and method.
  708. Muttik, Igor Garrievich; Hinchliffe, Alexander James; Kollberg, Dirk, Validating components of a malware scanner.
  709. Gupta,Ramesh M.; Jain,Parveen K.; Amidon,Keith E.; Gong,Fengmin; Vissamsetti,Srikant; Haeffele,Steve M.; Raman,Ananth, Virtual intrusion detection system and method of using same.
  710. Kuo,Chengi Jimmy; Muttik,Igor G.; Gryaznov,Dmitry O., Virtual opened share mode system with virus protection.
  711. Smith,Lawrence; Levenberg,Richard, Virtual smart card system and method.
  712. Cox, Brian R.; Kim, Do; Haagensen, Brandt, Virus detection system, method and computer program product for handheld computers.
  713. Cox, Brian R.; Kim, Do; Haagensen, Brandt, Virus detection system, method and computer program product for handheld computers.
  714. Cambridge,Rodney D.; Ali,Fearuz, Virus prediction system and method.
  715. Pak, Michael C.; Kouznetsov, Victor; Palmer, David W., Virus scanning on thin client devices using programmable assembly language.
  716. Edwards,Jonathan; White,Edmund; Turner,Shawna, Virus scanning prioritization using pre-processor checking.
  717. Sajina, Anna; Zhang, Kaiwang, Voice protocol filtering system and method.
  718. Schlueter, Robert; Minshall, Benjamin Ashton; Hunt, Ryan Joseph, Voltage collapse diagnostic and ATC system.
  719. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  720. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  721. Kouznetsov, Victor; Libenzi, Davide; Fallenstedt, Martin; Palmer, David W.; Pak, Michael C., Wireless architecture with malware scanning component manager and associated API.
  722. Kouznetsov,Victor; Libenzi,Davide; Fallenstedt,Martin; Palmer,David W.; Pak,Michael C., Wireless malware scanning back-end system and method.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로