US2009019121A1
|
|
Message processing
|
US2009013405A1
|
|
Heuristic detection of malicious code
|
US2009013408A1
|
|
Detection of exploits in files
|
US2008134333A1
|
|
Detecting exploits in electronic objects
|
GB0621962D0
|
|
Detection of image spam
|
GB0508296D0
|
|
Detecting and filtering of spam emails
|
GB0506844D0
|
|
Training an anti-spam filter
|
HK1070709A1
|
|
A method of, and system for, replacing external links in electronic documents
|
GB2400932A
|
|
A method of,and system for,heuristically determining that an unknown file is harmless by using traffic heuristics
|
GB2400931A
|
|
A method of, and system for, replacing external links in electronic documents
|
GB2400933A
|
|
A method of, and system for, heuristically detecting viruses in executable code by detecting files which have been maliciously altered
|
GB2400934A
|
|
A method of,and system for detecting mass mailing viruses
|
GB0307736D0
|
|
System for and method of detecting malware in macros and executable scripts
|
GB0229032D0
|
|
Method of and system for heuristically detecting viruses in executable code
|
GB0218993D0
|
|
Heuristically detecting viruses in executable code
|
GB0218990D0
|
|
Method of and system for scanning electronic documents which contain links to external objects
|
GB0116578D0
|
|
Method of, and system for, processing email
|
GB0105375D0
|
|
Method of,and system for,processing email in particular to detect unsolicited bulk email
|