US9083527B1
|
|
Using mobile data to establish a shared secret in second-factor authentication
|
US8806644B1
|
|
Using expectation measures to identify relevant application analysis results
|
US8726392B1
|
|
Systems and methods for combining static and dynamic code analysis
|
US8726386B1
|
|
Systems and methods for detecting malware
|
US8503636B1
|
|
Systems and methods for blocking an outgoing request associated with an outgoing telephone number
|
US2012240181A1
|
|
Techniques for securing a checked-out virtual machine in a virtual desktop infrastructure
|
US8413146B1
|
|
Hypervisor assisted single instance data access by multiple virtual machines
|
US8938508B1
|
|
Correlating web and email attributes to detect spam
|
US8170549B1
|
|
Use of physical location and application state information in routing preferences for electronic communications
|
US8977842B1
|
|
Hypervisor enabled secure inter-container communications
|
US8281058B1
|
|
Systems and methods for using USB device descriptors to identify computing environments
|
US8281366B1
|
|
Systems and methods for using guardian proximity to control computing activities of children
|
US2013091570A1
|
|
Short-range mobile honeypot for sampling and tracking threats
|
US9734037B1
|
|
Mobile application sampling for performance and network behavior profiling
|
US8880048B1
|
|
Method and apparatus for managing calls for call-related calendar entries stored on a device
|
US8402458B1
|
|
Methods and systems for converting non-layered-software-application installations into layered installations
|
US9450960B1
|
|
Virtual machine file system restriction system and method
|
US8504215B1
|
|
Systems and methods for using alternate power sources to manage the power draw on a power grid
|
US2010058431A1
|
|
Agentless enforcement of application management through virtualized block I/O redirection
|
US2010064340A1
|
|
Systems and methods for controlling access to data through application virtualization layers
|