US2014201208A1
|
|
Classifying Samples Using Clustering
|
US9373080B1
|
|
Using historical accuracy of user decision making to improve accuracy of predictive modeling based automatic classification
|
US8997228B1
|
|
Techniques for detecting infected websites
|
US8935154B1
|
|
Systems and methods for determining authorship of an unclassified notification message
|
US8600995B1
|
|
User role determination based on content and application classification
|
US2013085886A1
|
|
Method and system for automatic application recommendation
|
US9621585B1
|
|
Applying functional classification to tune security policies and posture according to role and likely activity
|
US8499354B1
|
|
Preventing malware from abusing application data
|
US8595211B1
|
|
Techniques for managing search engine results
|
US9058492B1
|
|
Techniques for reducing executable code vulnerability
|
US8452848B1
|
|
Facilitating secure 24x7 on-demand service availability while minimizing power consumption and power load spikes
|
US8627476B1
|
|
Altering application behavior based on content provider reputation
|
US2012005750A1
|
|
Systems and methods for alternating malware classifiers in an attempt to frustrate brute-force malware testing
|
US9231969B1
|
|
Determining file risk based on security reputation of associated objects
|
US8955109B1
|
|
Educating computer users concerning social engineering security threats
|
US2011271341A1
|
|
Behavioral signature generation using clustering
|
US8401982B1
|
|
Using sequencing and timing information of behavior events in machine learning to detect malware
|
US8914888B1
|
|
Systems and methods for classifying an unclassified process as a potential trusted process based on dependencies of the unclassified process
|
US8626675B1
|
|
Systems and methods for user-specific tuning of classification heuristics
|
US8918873B1
|
|
Systems and methods for exonerating untrusted software components
|