US2014188986A1
|
|
Method and Apparatus for Identifying Computing Resource Trajectory
|
WO2014012106A2
|
|
Retroactively detecting malicious or undesirable software
|
WO2013130867A1
|
|
Method and apparatus for retroactively detecting malicious or otherwise undesirable software
|
CA2819832A1
|
|
Detecting malicious software through contextual convictions, generic signatures and machine learning techniques
|
WO2011162879A1
|
|
System and method for resolving operating system or service identity conflicts
|
WO2010045089A1
|
|
Target-based smb and dce/rpc processing for an intrusion detection system or intrusion prevention system
|
WO2009128881A1
|
|
Intrusion detection system (ids) and intrusion prevention system (ips) rule processing
|
WO2008134057A1
|
|
Real-time awareness for a computer network
|
WO2008106084A1
|
|
Timestamp analysis of segments in a transmission control protocol (tcp) session
|
EP2076866A2
|
|
Device, system and method for use of micro-policies in intrusion detection/prevention
|
US2008037587A1
|
|
Device, system and method for analysis of segments in a transmission control protocol (TCP) session
|
US2008127342A1
|
|
Device, system and method for analysis of fragments in a fragment train
|
US2008198856A1
|
|
Systems and methods for modifying network map attributes
|
US2008244741A1
|
|
Intrusion event correlation with network discovery information
|
US2008276316A1
|
|
Intrusion detection strategies for hypertext transport protocol
|
US2006020595A1
|
|
Methods and systems for multi-pattern searching
|
US7801980B1
|
|
Systems and methods for determining characteristics of a network
|
US7317693B1
|
|
Systems and methods for determining the network topology of a network
|
US2005216764A1
|
|
Systems and methods for dynamic threat assessment
|
US7305708B2
|
|
Methods and systems for intrusion detection
|