WO2018005011A1
|
|
Drone assisted mesh network for first responders
|
US2018288052A1
|
|
Trusted remote configuration and operation
|
US2018288074A1
|
|
Identifying malware-suspect end points through entropy changes in consolidated logs
|
US2018191780A1
|
|
Technologies for privacy-preserving security policy evaluation
|
US2018183789A1
|
|
Fabric assisted identity and authentication
|
US2018181761A1
|
|
Method for ransomware impact assessment and remediation assisted by data compression
|
US2018183814A1
|
|
Detecting execution of modified executable code
|
US2018181753A1
|
|
Persistence probing to detect malware
|
US2018181747A1
|
|
Dynamic re-distribution of detection content and algorithms for exploit detection
|
US2018130168A1
|
|
Optical feedback for visual recognition authentication
|
US2018098284A1
|
|
Proximity-based radio advertising activation
|
US2018097808A1
|
|
Distributed authentication with thresholds in IoT devices
|
US2018096140A1
|
|
Detection of return oriented programming attacks in a processor
|
US2018088928A1
|
|
Device-driven auto-recovery using multiple recovery sources
|
US2018091361A1
|
|
Survivable networks that use opportunistic devices to offload services
|
WO2017074626A1
|
|
Synchronous execution of designated computing events using hardware-assisted virtualization
|
CN109983465A
|
|
The safety guidance of enhancing
|
WO2017053802A1
|
|
System and method for detecting whether automatic login of user credentials to a web site has succeeded
|
WO2017053648A1
|
|
Lbr-based rop/jop exploit detection
|
US2018026926A1
|
|
Graymail filtering-based on user preferences
|