US2021051176A1
|
|
Systems and methods for protection from phishing attacks
|
US10686836B1
|
|
Host-based deception security technology
|
US10891375B1
|
|
Document behavior analytics—abnormal document flows to identify suspicious exfiltration utility patent
|
US2017104785A1
|
|
Generating highly realistic decoy email and documents
|
US2012084866A1
|
|
Methods, systems, and media for measuring computer security
|
US2010269175A1
|
|
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
|
US2010077483A1
|
|
Methods, systems, and media for baiting inside attackers
|
US2010064369A1
|
|
Methods, media, and systems for detecting attack on a digital processing device
|
US2011214161A1
|
|
Methods, media, and systems for securing communications between a first node and a second node
|
US2006178994A1
|
|
Method and system for private shipping to anonymous users of a computer network
|
WO9641298A1
|
|
Method and apparatus for imaging, image processing and data compression and merge/purge techniques for document image databases
|
US5497486A
|
|
Method of merging large databases in parallel
|