Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems; Detecting local intrusion or implementing counter-measures involving event detection and direct action
ARTIFICIAL INTELLIGENCE DETERRENCE TECHNIQUES FOR SECURITY AND AUTOMATION SYSTEMS
#2METHOD AND SYSTEM FOR FREEDOM FROM INTERFERENCE (FFI)
#3MODIFICATION OF VULNERABLE PODS
#4AUTOMATED THREAT MODELING USING APPLICATION RELATIONSHIPS
#5ADAPTIVE DETECTION OF SECURITY THREATS THROUGH TRAINING OF COMPUTER-IMPLEMENTED MODELS
#6System and Methods for Click-Jacking and Content Redressing Protection
#7SYSTEMS AND METHODS FOR AUTOMATED CYBERSECURITY THREAT TESTING AND DETECTION
#8EXTRACTION METHOD, EXTRACTION DEVICE, AND EXTRACTION PROGRAM
#9STORAGE SYSTEM AND STORAGE SYSTEM MONITORING METHOD
#10SYSTEMS AND METHODS FOR PREVENTING COMMUNICATIONS WITH MALICIOUS CRYPTOGRAPHY-BASED STORAGE APPLICATION ADDRESSES USING CONSENSUS
#11SYSTEMS AND METHODS FOR INDICATING ONLOOKER VULNERABILITY
#12Method and Apparatus for Operating a Computer
#13THREAT MITIGATION SYSTEM AND METHOD
#14DATA COMPRESSION WITH INTRUSION DETECTION
#15Insight Generation Using Personal Identifiable Information (PII) Footprint Modeling
#16Machine Learning Process Detection
#17EXTRACTION METHOD, EXTRACTION DEVICE, AND EXTRACTION PROGRAM
#18ADVERSARY ALERTING AND PROCESSING SYSTEM (ALPS)
#19SPURIOUS-DATA-BASED DETECTION RELATED TO MALICIOUS ACTIVITY
#20FIRMWARE SWITCHING METHOD FOR SYSTEM SECURITY AND ELECTRICAL DEVICE USING THE SAME
#21SYSTEMS AND METHODS FOR ADAPTIVELY DETECTING AND MITIGATING ROWHAMMER ATTACKS AGAINST COMPUTER MEMORIES
#22METHOD AND APPARATUS FOR DETECTING MALWARE VIA ANALYSIS OF A SCREEN CAPTURE
#23INFORMATION VISUALIZATION APPARATUS, INFORMATION VISUALIZATION METHOD, AND COMPUTERREADABLE RECORDING MEDIUM
#24Methods for Managing Software Supply Chain Risk through Declared Intent
#25In-Vehicle System and Electronic Control Device
#26MEMORY DEVICE AND PROTECTION METHOD THEREOF
#27ADVANCED PERSISTENT THREAT DETECTION
#28DYNAMIC CLOUD CONFIGURATION CHANGES BASED ON ADVANCED PERSISTENT THREAT DETECTION
#29AGENT-BASED DEVICE PROTECTION USING DETECTION AND MITIGATION OF MODIFICATIONS TO A PROTECTED STORAGE REGION
#30DEVICE PROTECTION AGAINST UNAUTHORIZED ENCRYPTION USING POPULATION OF AVAILABLE STORAGE
#31Reduction of Security Detection False Positives
#32INTROSPECTION DRIVEN BY INCIDENTS FOR CONTROLLING INFILTRATION
#33DETECTING STACK PIVOTS USING STACK ARTIFACT VERIFICATION
#34APPARATUS AND METHOD FOR CONDUCTING ENDPOINT-NETWORK-MONITORING
#35PROCESS TREE AND TAGS
#36ELECTRONIC LOCK COMPRISING A LOCK-CORE SOFTWARE MODULE
#37SYSTEMS AND METHODS FOR DYNAMIC VALUATION OF PROTECTION PRODUCTS
#38SMART RECOVERY OF BACKUP COPIES BASED ON THREAT ANALYSIS
#39SYSTEMS AND METHODS FOR SECURITY INTELLIGENCE EXCHANGE
#40SECURITY APPLIANCE EXTENSION
#41DETECTING RANSOMWARE IN MONITORED DATA
#42METHOD AND SYSTEM FOR DETERMINATION OF OUT-OF-DISTRIBUTION SAMPLES AND ATTACK SURFACES FOR ARTIFICIAL NEURAL NETWORKS
#43CONTAINER SECURITY IN A CLOUD ENVIRONMENT
#44PROTECTING DATA AGAINST MALWARE ATTACKS USING CYBER VAULT AND AUTOMATED AIRGAP CONTROL
#45SYSTEM AND METHOD FOR INTRUSION DETECTION IN MODULAR SYSTEMS
#46CONTINUAL LEARNING APPROACH FOR THREAT DETECTION IN ZERO-TRUST ARCHITECTURES
#47TECHNIQUES FOR SECURING VIRTUAL MACHINES
#48ENCRYPTION WITH ENHANCED TWEAK GENERATION
#49RETROSPECTIVE MEMORY ANALYSIS
#50DETERMINATION METHOD, DETERMINATION DEVICE, AND DETERMINATION PROGRAM
#51AUTOMATIC RETENTION LOCK EXTENSIONS
#52SYSTEMS AND METHODS FOR PRIVATE AUTHENTICATION WITH HELPER NETWORKS
#53ELECTRONIC MAIL SECURITY SYSTEM
#54TECHNIQUES FOR CYBERSECURITY INSPECTION BASED ON RUNTIME DATA AND STATIC ANALYSIS FROM CLONED RESOURCES
#55CLASSIFYING CYBERSECURITY THREATS USING MACHINE LEARNING ON NON-EUCLIDEAN DATA
#56MITIGATING POINTER AUTHENTICATION CODE (PAC) ATTACKS IN PROCESSOR-BASED DEVICES
#57PREVENTION OF CONTAINER ESCAPE-BASED ATTACKS OF A HOST SYSTEM
#58SYSTEM AND METHOD FOR DYNAMIC SCORING OF INCIDENTS
#59PREVENTING INSIDER THREAT UTILIZING MACHINE LEARNING
#60SYSTEM AND METHOD FOR MACHINE LEARNING BASED SECURITY INCIDENTS DETECTION AND CLASSIFICATION IN A BLOCKCHAIN ECOSYSTEM
#61MULTIMODE RETAIL SYSTEM
#62MULTI-LEVEL MALWARE CLASSIFICATION MACHINE-LEARNING METHOD AND SYSTEM
#63Detecting and Protecting Against Cybersecurity Attacks Using Unprintable Tracking Characters
#64Attack Detection Method and Apparatus
#65PROTECTION OF MASKED DATA
#66METHODS AND SYSTEMS FOR AUTOMATIC GRADING, IMPACT ANALYSIS AND MAPPING TO THE CIA TRIAD
#67OUT-OF-BAND PAIRING FOR WIRELESS NEURAL IMPLANT
#68SYSTEM AND METHOD FOR ANOMALY DETECTION IN IOT DATA RECORDS
#69SYSTEM AND METHOD FOR THREAT MANAGEMENT IN DISTRIBUTED SYSTEMS
#70SENTINEL SYSTEM FOR AN ONLINE DEVICE
#71COMBINED PROTECTION OF SYMMETRIC-KEY PRIMITIVES AGAINST SIDE-CHANNEL AND FAULT ATTACKS
#72INCIDENT CONFIDENCE LEVEL
#73SYSTEMS AND METHODS FOR SELECTING CLIENT BACKUP FILES FOR MALICIOUSNESS ANALYSIS
#74DEEP LEARNING BASED DETECTION OF MALICIOUS SHELL SCRIPTS
#75SYSTEM AND METHOD FOR MANAGING AI MODELS USING VIEW LEVEL ANALYSIS
#76System and method for threat detection based on stack trace and kernel sensors
#77DNS TUNNELING DETECTION AND PREVENTION
#78METHODS AND APPARATUS FOR DISARMING JAVASCRIPT IN PDF OR HWP
#79SYSTEM AND METHOD FOR DETECTING AGENT SHARING CREDENTIALS
#80APPLICATION FIREWALL
#81FIRMWARE POLICY ENFORCEMENT VIA A SECURITY PROCESSOR
#82METHOD AND SYSTEM FOR INFERRING DOCUMENT SENSITIVITY
#83DATA DETECTION METHOD AND ELECTRONIC DEVICE
#84ASSESSING SECURITY IN INFORMATION AND EVENT MANAGEMENT (SIEM) ENVIRONMENTS
#85ARTIFICIAL INTELLIGENCE DETERRENCE TECHNIQUES FOR SECURITY AND AUTOMATION SYSTEMS
#86SECURE MIL-STD-1553 DATA BUS
#87SYSTEM AND METHOD FOR ROBUST NATURAL LANGUAGE CLASSIFICATION UNDER CHARACTER ENCODING
#88MEMORY DEVICE FOR PERFORMING TARGET REFRESH OPERATION, AND OPERATION METHOD THEREOF
#89APPARATUS FOR CONTROLLING VEHICLE AND METHOD FOR THE SAME
#90Anomaly Detection on MIL-STD-1553 Dataset Using Machine Learning
#91System and Method for Explainable Anomaly Detection
#92SENSOR DEVICE PROTECTION AGAINST ATTACK
#93METHOD AND SYSTEM FOR PROTECTING A MACHINE LEARNING MODEL AGAINST EXTRACTION
#94SYSTEM, METHODS, AND APPARATUS FOR MOBILE DEVICE SECURITY
#95ACCELERATED MACHINE LEARNING
#96CLUSTERING AND CLUSTER TRACKING OF CATEGORICAL DATA
#97THREAT DETECTION AND MITIGATION IN A NETWORKED ENVIRONMENT
#98METHODS AND SYSTEMS FOR CYBER THREAT ANALYSIS
#99System and Methods Involving Features of Hardware Virtualization, Hypervisors, APIs of Interest and/or Other Features
#100INTERACTIVE SHELL EVENT DETECTION
#101DETECTION OF POTENTIAL EXFILTRATION OF AUDIO DATA FROM DIGITAL ASSISTANT APPLICATIONS
#102METHOD FOR DEPLOYING CONTAINERIZED SECURITY TECHNOLOGIES ON EMBEDDED DEVICES
#103MALICIOUS SOFTWARE DETECTION BASED ON API TRUST
#104Ransomware Detection Using Multiple Security Threat Detection Processes
#105SYSTEMS AND METHODS FOR DETECTION AND MITIGATION OF MALICIOUS ENCRYPTION
#106DEVICE SECURITY FOR CABLE THREAT ACTORS
#107A CRITICAL INFRASTRUCTURE SIMULATION AND EMULATION SYSTEM AND METHOD
#108SYSTEM AND METHOD FOR MACHING LEARING-BASED DETECTION OF RANSOMWARE ATTACKS ON A STORAGE SYSTEM
#109MACHINE LEARNING ASSISTED ROOT CAUSE ANALYSIS FOR COMPUTER NETWORKS
#110ADDRESSABLE SMART AGENT DATA TECHNOLOGY TO DETECT UNAUTHORIZED TRANSACTION ACTIVITY
#111SELECTIVE IMPORT/EXPORT ADDRESS TABLE FILTERING
#112PRESERVING DLL HOOKS
#113DYNAMIC, RUNTIME APPLICATION PROGRAMMING INTERFACE PARAMETER LABELING, FLOW PARAMETER TRACKING AND SECURITY POLICY ENFORCEMENT USING API CALL GRAPH
#114Secure Chip-Wide Transmission
#115METHOD AND DEVICE FOR ANALYZING AND PROCESSING MALICIOUS CODE FOR CONTAINER IMAGE, AND COMPUTER-READABLE RECORDING MEDIUM
#116METHOD AND SYSTEM FOR VERIFYING QUICK RESPONSE CODES
#117PREMISES SECURITY SYSTEM WITH WIRELESS ENERGY HARVESTING
#118Deterrence devices and techniques
#119MANAGING AND CLASSIFYING COMPUTER PROCESSES
#120On-Demand Trusted Extended Reality Environments
#121SECURE DATA DELIVERY SYSTEM USING AN AUTONOMOUS VEHICLE
#122DATA PROCESSING SYSTEM CAPABLE OF PREVENTING SYSTEM TIME FROM BEING TAMPERED IN OFF-LINE STATUS
#123GRAPH COMPARISON-BASED BEHAVIOR ANALYSIS
#124MEMORY DEVICE, OPERATING METHOD OF MEMORY DEVICE, AND MEMORY SYSTEM
#125PROTECTING COMPUTER SYSTEMS
#126APPARATUSES, COMPUTER-IMPLEMENTED METHODS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING INITIATION OF AN AUTOMATED HEALING PROCESS FOR OPERATIONAL TECHNOLOGY DEVICES IN A NETWORK
#127System and method for remote users activities administration
#128Snapset Restricted Utilization and Preservation
#129Detecting anomalous Application Programming Interface (API) behaviors
#130APPARATUS AND METHOD FOR INJECTING CONTROL FLOW INTEGRITY SECURITY CODE BASED ON LOCATION
#131SYSTEM AND METHOD FOR AUTOMATED SECURITY TOOL INTEGRATION
#132Secure Notification on Networked Devices
#133SECURED INTEGRATION OF THIRD-PARTY LOGIC IN ELECTRONIC TRANSACTION PROCESSING
#134Systems and Methods for Non-Destructive Detection of Hardware Anomalies
#135METHOD OF REMEDIATING OPERATIONS PERFORMED BY A PROGRAM AND SYSTEM THEREOF
#136DETECTION OF RANSOMWARE
#137METHODS AND SYSTEMS FOR DETECTING AND BLOCKING MALICIOUS ACTIONS IN OPERATING SYSTEM
#138EVENT-DRIVEN MONITORING OF RESOURCES IN A CLOUD COMPUTING ENVIRONMENT
#139METHOD FOR SUPPORTING DECISION-MAKING IN SECURITY CONTROL ENVIRONMENT BASED ON ARTIFICIAL INTELLIGENCE
#140DETECTION DEVICE, DETECTION METHOD AND DETECTION PROGRAM
#141LABEL RECOMMENDATION FOR CYBERSECURITY CONTENT
#142BOT ACTIVITY DETECTION FOR EMAIL TRACKING
#143Method, Device, and System of Differentiating Between a Cyber-Attacker and a Legitimate User
#144AUTOMATED USER-ASSISTED WORKFLOWS FOR CLOUD-BASED COMPUTER FORENSIC ANALYSIS
#145APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTION
#146Case Tampering Detection Device and Method for Computer System
#147RANSOMWARE PROTECTION SYSTEMS AND METHODS LEVERAGING SMART NETWORK INTERFACE CONTROLLERS
#148Virtual Machine Image Management System
#149SYSTEM AND METHOD FOR AUTOMATIC BINARY SEGMENTATION
#150CONTEXT AWARE BEHAVIORAL ANOMALY DETECTION IN COMPUTING SYSTEMS
#151ARTIFICIAL INTELLIGENCE-ASSISTED SECURITY DATA EXPLORATION ON A FEDERATED SEARCH ENVIRONMENT
#152SYSTEM AND METHOD FOR COLLABORATIVE SMART EVIDENCE GATHERING AND INVESTIGATION FOR INCIDENT RESPONSE, ATTACK SURFACE MANAGEMENT, AND FORENSICS IN A COMPUTING ENVIRONMENT
#153Method, system, and apparatus for security assurance, protection, monitoring and analysis of integrated circuits and electronic systems in relation to hardware trojans
#154INTELLIGENT OBFUSCATION OF MOBILE APPLICATIONS
#155METHOD TO IMPROVE ANTI-MALWARE SCAN RESPONSIVENESS AND EFFECTIVENESS USING USER SYMPTOMS FEEDBACK
#156MACHINE LEARNING FOR IDENTITY ACCESS MANAGEMENT
#157TECHNIQUES FOR A MEMORY MODULE PER ROW ACTIVATE COUNTER
#158PROTECTION OF MASKED DATA
#159OPTIMIZING INTELLIGENT THRESHOLD ENGINES IN MACHINE LEARNING OPERATIONS SYSTEMS
#160SENTINEL SYSTEM FOR AN ONLINE DEVICE
#161SYSTEMS AND METHODS FOR CYBER SECURITY THREAT DETECTION AND EXPEDITED GENERATION OF INVESTIGATION STORYBOARDS USING INTELLIGENT CYBER SECURITY AUTOMATIONS
#162SECURITY PROCESSING DEVICE, METHOD AND ELECTRONIC DEVICE FOR HANDLING ATTACKS
#163Endpoint Threat Inoculation Computing System
#164LABELING METHOD FOR INFORMATION SECURITY DETECTION RULES AND TACTIC, TECHNIQUE AND PROCEDURE LABELING DEVICE FOR THE SAME
#165VULNERABILITY ANALYSIS FOR SOFTWARE PRODUCTS
#166AUTONOMOUS REPORT COMPOSER
#167SENSOR FUSION IN SECURITY SYSTEMS
#168SYSTEM AND METHOD FOR CYBERSECURITY THREAT DETECTION UTILIZING STATIC AND RUNTIME DATA
#169THREAT MITIGATION SYSTEM AND METHOD
#170A HYPER-SCALE CLOUD ENVIRONMENT STANDARD CONTROL DEVIATION REMEDIATION APPLICATION
#171Defense Generator, Method for Preventing an Attack on an AI Unit, and Computer-Readable Storage Medium
#172METHOD AND SYSTEM FOR ANALYZING CYBERSECURITY THREATS AND IMPROVING DEFENSIVE INTELLIGENCE
#173ENTERPRISE NETWORK THREAT DETECTION
#174MULTI-MODAL, MODULAR DATA SECURITY AND MONETIZATION SYSTEM AND METHOD
#175DELAYED INFERENCE ATTACK DETECTION FOR IMAGE SEGMENTATION-BASED VIDEO SURVEILLANCE APPLICATIONS
#176A CYBER RECOVERY FORENSICS KIT CONFIGURED TO MAINTAIN COMMUNICATION AND SEND RETURN MALWARE
#177DETECTING AND RESPONDING TO ENVIRONMENTAL CONDITION-INDUCED SECURITY ATTACKS ON SEMICONDUCTOR PACKAGES
#178USING BACKUP META-DATA AND ANALYTICS FOR DETECTING CYBER-ATTACKS
#179Systems and methods for preventing hollowing attack
#180LOG DETERMINATION DEVICE, LOG DETERMINATION METHOD, LOG DETERMINATION PROGRAM, AND LOG DETERMINATION SYSTEM
#181SECURE EXECUTION OF A FILE ON A COPY DEVICE IN A VIRTUALIZED COMPUTING ENVIRONMENT
#182SYSTEM EVENT DETECTION SYSTEM AND METHOD
#183MEMORY DEVICE FOR PERFORMING TARGET REFRESH OPERATION AND OPERATING METHOD THEREOF
#184MALWARE DETECTION BASED ON USER INTERACTIONS
#185System and Method for Operating an Endpoint Agent at an Endpoint Device
#186POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK
#187ANOMALY DETECTION SYSTEM
#188TECHNIQUES FOR IDENTIFYING VETTED SOFTWARE APPLICATIONS THAT PROVIDE UNAUTHORIZED FEATURES
#189FAULT-INJECTION PROTECTION CIRCUIT FOR PROTECTING AGAINST LASER FAULT INJECTION
#190MUTUAL TRANSPORT LAYER SECURITY (TLS) VERIFICATION USING AN AUTHORIZED VIEWER
#191HELPER DATA INTEGRITY CHECK AND TAMPER DETECTION USING SRAM-BASED PHYSICALLY UNCLONABLE FUNCTION
#192METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR SNAPSHOT CLASSIFICATION
#193SYSTEMS AND METHODS FOR MACHINE LEARNING ENHANCED INTELLIGENT BUILDING ACCESS ENDPOINT SECURITY MONITORING AND MANAGEMENT
#194ASSURANCE MODEL FOR AN AUTONOMOUS ROBOTIC SYSTEM
#195SYSTEM AND METHOD FOR DETECTING CYCLIC ACTIVITY IN AN EVENT FLOW FOR DYNAMIC APPLICATION ANALYSIS
#196DETECTING UPLOADS OF MALICIOUS FILES TO CLOUD STORAGE
#197HYPERVISOR-ASSISTED DATA BACKUP AND RECOVERY FOR NEXT GENERATION ANTI-VIRUS (NGAV) SYSTEMS
#198THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS
#199Detecting and mitigating application security threats based on threat change patterns
#200INSTANT DETECTION OF A HOMOGLYPH ATTACK WHEN REVIEWING CODE IN AN AUGMENTED REALITY DISPLAY
#201ANOMALOUS COMMAND LINE ENTRY DETECTION
#202COMPUTER IMPLEMENTED METHOD
#203NODE LEVEL CONTAINER MUTATION DETECTION
#204MEMORY SYSTEM
#205DISCRETE PROCESSOR FEATURE BEHAVIOR COLLECTION
#206Preventing User Interaction Hijacking Attacks By Blocking Interactions With Obscured Components
#207ELECTRONIC DEVICE LOCK ADJUSTMENTS
#208DETECTING POTENTIAL MALWARE IN HOST MEMORY
#209MITIGATING POINTER AUTHENTICATION CODE (PAC) ATTACKS IN PROCESSOR-BASED DEVICES
#210SECURITY BREACH AUTO-CONTAINMENT AND AUTO-REMEDIATION IN A MULTI-TENANT CLOUD ENVIRONMENT FOR BUSINESS CONTINUITY
#211SYSTEM AND METHOD FOR AGENTLESS HOST CONFIGURATION DETECTION IN A COMPUTING ENVIRONMENT
#212Information processing device, display method, and non-transitory computer readable medium
#213Device, System, and Method of Detecting Vishing Attacks
#214INTERFACE INVOCATION REQUEST PROCESSING METHODS AND APPARATUSES
#215ATTACK DETECTION METHOD, ATTACK RESPONSE METHOD, AND STORAGE DEVICE
#216Calendar-Based Device Security
#217CYBER SECURITY APPLIANCE FOR AN OPERATIONAL TECHNOLOGY NETWORK
#218Secure firewall configurations
#219MULTI-LAYERED GRAPH MODELING FOR SECURITY RISK ASSESSMENT
#220METHODS AND APPARATUS TO MITIGATE FIRMWARE MALWARE
#221DETECTING A CURRENT ATTACK BASED ON SIGNATURE GENERATION TECHNIQUE IN A COMPUTERIZED ENVIRONMENT
#222METHODS, SYSTEMS AND COMPUTER PROGRAMS FOR DETECTING POTENTIALLY SUSPICIOUS RESOURCE ACCESS EVENTS
#223GENERATING SECURITY LANGUAGE QUERIES
#224AUTOMATIC SELECTION OF DATA FOR TARGET MONITORING
#225Aggregate Event Profiles for Detecting Malicious Mobile Applications
#226BACKUP PROTECTION SYSTEM AND METHOD
#227DATA STORAGE DEVICE PERFORMING DATA PROTECTION AND HOST DEVICE SUPPORTING A DATA PROTECTION FUNCTION USING A PROGRAM CONTEXT
#228Serverless computing-based, continuous gateway watch for data change
#229INCORPORATING SOFTWARE-AS-A-SERVICE DATA INTO A CYBER THREAT DEFENSE SYSTEM
#230COMPUTER AUGMENTED THREAT EVALUATION
#231TECHNIQUES FOR MITIGATING MANIPULATIONS OF AN ONBOARD NETWORK OF A VEHICLE
#232Systems and methods for causing nonpredictable environment states for exploit prevention and malicious code neutralization for javascript-enabled applications
#233A Method of Training a Submodule and Preventing Capture of an AI Module
#234EXECUTABLE FILE UNPACKING SYSTEM AND METHOD FOR STATIC ANALYSIS OF MALICIOUS CODE
#235METHODS AND SYSTEMS FOR HARDWARE AND FIRMWARE SECURITY MONITORING
#236REAL-TIME JAVASCRIPT CLASSIFIER
#237CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM
#238COMPUTERIZED SYSTEM FOR AUTONOMOUS DETECTION OF UNAUTHORIZED ACCESS ACCORDING TO OUTBOUND ADDRESSES
#239Security Monitoring at Operating System Kernel Level
#240SYSTEM AND METHOD FOR FILE RECOVERY FROM MALICIOUS ATTACKS
#241ANALYSIS DEVICE
#242Methods and Systems for Analyzing Environment-Sensitive Malware with Coverage-Guided Fuzzing
#243SESSION RECORDING
#244PROTECTION OF NEURAL NETWORKS AGAINST CLONING ATTACKS
#245SECURING DIGITAL DATA BY AUTOMATIC MECHANISM INCAPACITATING DATA STORAGE DEVICE
#246DETECTING WRAPPED ATTACKS ON FACE RECOGNITION
#247Endpoint with remotely programmable data recorder
#248Volume Dependencies in a Storage System
#249REFRESH CONTROL METHOD, REFRESH CONTROL CIRCUIT AND MEMORY
#250Monitoring for Security Threats in a Container System
#251SYSTEMS AND METHODS FOR REAL-TIME CYBER INCIDENT DETECTION IN DATA SPARSE ENVIRONMENTS USING ARTIFICIAL INTELLIGENCE
#252TECHNIQUES FOR SECURING DEPLOYMENT OF INFRASTRUCTURE AS CODE
#253MULTI-TENANT SECURITY
#254PROCESSOR AND ATTACK DETECTION METHOD THEREOF
#255SELECTING ACTIONS RESPONSIVE TO COMPUTING ENVIRONMENT INCIDENTS BASED ON SEVERITY RATING
#256SYSTEMS AND METHODS FOR FACILITATING DETECTION OF A SECURITY EVENT ASSOCIATED WITH AN IOT DEVICE
#257FRAUDULENT HOST DEVICE CONNECTION DETECTION
#258Visual content verification in extended and augmented reality
#259SINGLE-CHIP SYSTEM, METHOD FOR OPERATING A SINGLE-CHIP SYSTEM, AND MOTOR VEHICLE
#260EXPLOIT DETECTION VIA INDUCED EXCEPTIONS
#261SYSTEM AND METHOD FOR HUNT, INCIDENT RESPONSE, AND FORENSIC ACTIVITIES ON AN AGNOSTIC PLATFORM
#262Data Processing Arrangement and Method for Detecting Ransomware in a File Catalog
#263Deception-Based Responses to Security Attacks
#264SYSTEMS AND METHODS FOR INTELLIGENT CYBER SECURITY THREAT DETECTION AND INTELLIGENT VERIFICATION-INFORMED HANDLING OF CYBER SECURITY EVENTS THROUGH AUTOMATED VERIFICATION WORKFLOWS
#265TRUST-BASED WORKSPACE INSTANTIATION
#266METHOD FOR SHARING CYBERSECURITY THREAT ANALYSIS AND DEFENSIVE MEASURES AMONGST A COMMUNITY
#267ELECTRONICS IN HIERARCHICAL CIRCUIT ARCHITECTURES THAT CONTROL HIGH VOLTAGES AND PROVIDE CYBER INTRUSION DETECTIONS
#268DETERMINING LINKED SPAM CONTENT
#269DETECTING MALICIOUS SCRIPTS IN A WEB PAGE
#270SYSTEM AND METHOD FOR CRYPTOGRAPHIC SECURITY THROUGH PROCESS DIVERSITY
#271METHOD AND APPARATUS FOR PRODUCING RECORDING MEDIUM AND COMPUTER PROGRAM
#272DATA BREACH SYSTEM AND METHOD
#273SYSTEMS AND METHODS FOR MACHINE LEARNING ENHANCED INTELLIGENT BUILDING ACCESS ENDPOINT SECURITY MONITORING AND MANAGEMENT
#274SCREEN CAPTURE DATA PROTECTION FOR MANAGED DEVICES
#275Cyberanalysis workflow acceleration
#276SYSTEM AND METHOD FOR COMBINING CYBER-SECURITY THREAT DETECTIONS AND ADMINISTRATOR FEEDBACK
#277Method for protecting a machine learning model from a side channel attack
#278MALWARE DETECTION IN CONTAINERIZED ENVIRONMENTS
#279RESOURCE PROTECTION
#280EXECUTION PROTECTION USING DATA COLOURING
#281MALICIOUS SITE DETECTION FOR A CYBER THREAT RESPONSE SYSTEM
#282SECURITY SUBSYSTEM FOR REMOTE ATTESTATION
#283GENERATING CUSTOMIZED POLICY DECISION POINT SERVICES FOR CONTROLLING ACCESS TO COMPUTING RESOURCES
#284PRE-BOOT CONTEXT-BASED SECURITY MITIGATION
#285ANTIVIRUS SCANNING ARCHITECTURE FOR UPLOADED FILES
#286ATTACK KILL CHAIN GENERATION AND UTILIZATION FOR THREAT ANALYSIS
#287Privileged Firmware Mode Protection
#288SECURITY SUBSYSTEM FOR EXECUTION VERIFICATION
#289DETECTING TAMPERING IN DATA PROCESSING PIPELINES
#290SEARCHABLE INVESTIGATION HISTORY FOR EVENT DATA STORE
#291System and method for data compression with intrusion detection
#292ALLOW LIST OF CONTAINER IMAGES BASED ON DEPLOYMENT CONFIGURATION AT A CONTAINER ORCHESTRATION SERVICE
#293STORAGE SYSTEM AND UNAUTHORIZED ACCESS DETECTION METHOD
#294Ransomware-based data protection parameter modification
#295SEMICONDUCTOR MEMORY DEVICE AND METHOD FOR GENERATING MESSAGE AUTHENTICATION CODE THEREOF
#296CONTROL SYSTEM HAVING ISOLATED USER COMPUTING UNIT AND CONTROL METHOD THEREFOR
#297Prediction model selection for cyber security
#298BROWSER SIGNAL COLLECTION FOR DETECTION OF AUTOMATED ACTIVITY IN BROWSER SESSION
#299Using orchestrators for false positive detection and root cause analysis
#300METHOD FOR REMEDIATING VULNERABILITIES OF A DATA PROCESSING SYSTEM