US2021064747A1
|
|
Classification of executable files using a digest of a call graph pattern
|
US2020042696A1
|
|
Dynamic page similarity measurement
|
US10951583B1
|
|
Methods and apparatus for controlling internet access
|
US10805275B1
|
|
Multi-process architecture for implementing a secure internet service
|
US2020036752A1
|
|
Semi-automatic rule generator
|
US2020045067A1
|
|
Dynamic phishing detection methods and apparatus
|
US2020026969A1
|
|
Image detection methods and apparatus
|
US10771620B1
|
|
Virtualization of smartphone functions in a virtual reality application
|
US2020264752A1
|
|
Automatic credential input to a user interface of a remote mobile app
|
US10938846B1
|
|
Anomalous logon detector for protecting servers of a computer network
|
US10754951B1
|
|
Dynamic evaluation of executable files in a lightweight executor
|
US10805320B1
|
|
Methods and systems for inspecting encrypted network traffic
|
US10834127B1
|
|
Detection of business email compromise attacks
|
US10728268B1
|
|
Methods and apparatus for intrusion prevention using global and local feature extraction contexts
|
US10169628B1
|
|
Scanning image codes in virtual mobile infrastructures
|
US10922386B1
|
|
System and methods for security inspection and protection of software containers at runtime
|
US10530788B1
|
|
Detection and prevention of malicious remote file operations
|
US10521588B1
|
|
Dynamic analysis of malware that has evasion code
|
US10460108B1
|
|
Method and system to identify and rectify input dependency based evasion in dynamic analysis
|
US10243989B1
|
|
Systems and methods for inspecting emails for malicious content
|