Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Indexing scheme relating to and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity Auditing as a secondary aspect
Electronic Messaging System for Mobile Devices with Reduced Traceability of Electronic Messages
#2Complex Application Attack Quantification, Testing, Detection and Prevention
#3SYSTEM AND METHOD FOR CREATING AND EXECUTING BREACH SCENARIOS UTILIZING VIRTUALIZED ELEMENTS
#4SYSTEMS AND METHODS FOR EVENT-BASED APPLICATION CONTROL
#5SYSTEMS AND METHODS FOR PROVIDING ACCESS TO WIRELESS GAMING DEVICES
#6Security Techniques for Device Assisted Services
#7PROACTIVE SUSPICIOUS ACTIVITY MONITORING FOR A SOFTWARE APPLICATION FRAMEWORK
#8METHODS AND APPARATUS FOR DETECTING A PRESENCE OF A MALICIOUS APPLICATION
#9SYSTEMS AND METHODS FOR CYBERSECURITY RISK ASSESSMENT
#10BLOCK OR PAGE LOCK FEATURES IN SERIAL INTERFACE MEMORY
#11APPLICATION MONITORING PRIORITIZATION
#12METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS
#13SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS
#14METHODS AND SYSTEMS FOR PROCESSING TRANSACTIONS ON A VALUE DISPENSING DEVICE USING A MOBILE DEVICE
#15METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOF
#16TAGGING AND AUDITING SENSITIVE INFORMATION IN A DATABASE ENVIRONMENT
#17METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOF
#18NETWORK RESOURCE ACCESS CONTROL METHODS AND SYSTEMS USING TRANSACTIONAL ARTIFACTS
#19ROUND TRIP TIME (RTT) MEASUREMENT BASED UPON SEQUENCE NUMBER
#20DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING FORENSIC WATERMARKING
#21DATASET LIFECYCLE MANAGEMENT USING MONITORING AND ACL CONTROL FOR CONTENT-BASED DATASETS
#22AUTOMATED GENERATION OF LABELED TRAINING DATA
#23PROVIDING A GRAPHICAL REPRESENTATION OF ANOMALOUS EVENTS
#24DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING DIGITAL CREDENTIAL ACCESS CONTROL
#25DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING NEARBY DEVICE DETECTION
#26DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING SONIC SIGNAL CONFIRMATION
#27METHODS AND SYSTEMS FOR MANAGING DATA IN A DATABASE MANAGEMENT SYSTEM
#28Methods for verifying vector database query results and devices thereof
#29DETECTING UNAUTHORIZED ACCESS TO DIGITAL CONTENT USING USAGE PATTERN DETECTION
#30SUBJECT LOGGING
#31BLOCKCHAIN TECHNOLOGY FOR REGULATORY COMPLIANCE OF DATA MANAGEMENT SYSTEMS
#32AUTOMATED TRUST CENTER FOR REAL-TIME SECURITY AND COMPLIANCE MONITORING
#33USE-BASED SECURITY CHALLENGE AUTHENTICATION
#34DELAYED AND PROVISIONAL USER AUTHENTICATION FOR MEDICAL DEVICES
#35SYSTEMS AND METHODS FOR DIGITAL CERTIFICATE SECURITY
#36SYSTEMS, METHODS, AND APPARATUSES FOR IDENTIFYING UNAUTHORIZED USE OF A USER'S AUTHENTICATION CREDENTIALS TO AN ELECTRONIC NETWORK BASED ON NON-PUBLIC DATA ACCESS
#37SYSTEM FOR FORENSIC TRACING OF MEMORY DEVICE CONTENT ERASURE AND TAMPERING
#38GESTURE RECOGNITION DEVICES AND METHODS
#39PAIRING DEVICES TO PREVENT DIGITAL CONTENT MISUSE
#40POLICY UTILIZATION ANALYSIS
#41SECURE COMPUTING SYSTEMS AND METHODS
#42Methods for verifying database query results and devices thereof
#43IDENTIFICATION OF A USER REQUESTING AN ELECTRONIC DOCUMENT
#44DIGITAL SAFETY AND ACCOUNT DISCOVERY
#45SYSTEMS AND METHODS OF SECURE PROVENANCE FOR DISTRIBUTED TRANSACTION DATABASES
#46CONTEXT-BASED SECURE CONTROLLER OPERATION AND MALWARE PREVENTION
#47SECURE FEATURE AND KEY MANAGEMENT IN INTEGRATED CIRCUITS
#48Sender-correlated reply ID generation in electronic messaging system
#49SYSTEMS AND METHODS FOR SELECTIVE ACCESS TO LOGS
#50METHOD AND APPARATUS FOR PROTECTING COMPUTERS
#51METHODS AND SYSTEMS FOR STORING GENOMIC DATA IN A FILE STRUCTURE COMPRISING AN INFORMATION METADATA STRUCTURE
#52MULTI-MODALITY ATTACK FORENSIC ANALYSIS MODEL FOR ENTERPRISE SECURITY SYSTEMS
#53SYSTEM AND METHOD FOR PERFORMING REMOTE SECURITY ASSESSMENT OF FIREWALLED COMPUTER
#54SYSTEMS AND METHODS FOR DATA CLASSIFICATION AND GOVERNANCE
#55METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED PROCESSOR MODE SWITCHES
#56SELECTIVELY PERMISSIONED DATA ACCESS STORAGE AND METHOD
#57Managing registry access on a computer device
#58TIERED DATA SHARING PRIVACY ASSURANCE
#59SYSTEMS AND METHODS FOR SECURING AND DISSEMINATING TIME SENSITIVE INFORMATION USING A BLOCKCHAIN
#60Open source library security rating
#61Methods and Systems for Implementing Automated Controls Assessment in Computer Systems
#62Virtualized file server user views
#63SYSTEM AND METHOD FOR DETECTING LEAKED DOCUMENTS ON A COMPUTER NETWORK
#64PROTECTING A COMPUTER DEVICE FROM ESCALATION OF PRIVILEGE ATTACKS
#65EVENT DATA PROCESSING
#66STRUCTURED STORAGE OF ACCESS DATA
#67UNIQUE ID GENERATION FOR SENSORS
#68Virtualized file server distribution across clusters
#69SYSTEM AND METHOD FOR DETECTING LEAKED DOCUMENTS ON A COMPUTER NETWORK
#70SELF-HEALING VIRTUALIZED FILE SERVER
#71Electronic messaging system for mobile devices with reduced traceability of electronic messages
#72DATA CONFIDENCE AND SOFTWARE DEVELOPMENT OPERATIONS
#73CONTROLLING ACCESS TO DATASETS DESCRIBED IN A CRYPTOGRAPHICALLY SIGNED RECORD
#74Methods and apparatus to collect distributed user information for media impressions and search terms
#75Systems and methods for event-based application control
#76Data Validation in a Mobile Communication Network
#77RUNTIME RISK ASSESSMENT TO PROTECT STORAGE SYSTEMS FROM DATA LOSS
#78Governed database connectivity (GDBC) through and around data catalog to registered data sources
#79METHOD AND SYSTEM FOR DETECTING AND PREVENTING UNAUTHORIZED ACCESS TO A COMPUTER
#80CALCULATING AND REPORTING COLLABORATION SYSTEM RISKS
#81Systems and methods for unified cyber threat intelligence searching
#82BATCH PROCESSING OF AUDIT RECORDS
#83Systems and methods for artificial model building techniques
#84System and method for creating and executing breach scenarios utilizing virtualized elements
#85Context-based secure controller operation and malware prevention
#86DETERMINING THE TECHNICAL MATURITY OF A SYSTEM USER TO USE AS A RISK INDICATOR WHEN AUDITING SYSTEM ACTIVITY
#87SYSTEM AND METHOD FOR CONTROLLING DATA USING CONTAINERS
#88Computerized system for complying with certain critical infrastructure protection requirements
#89EDGE DAY ZERO SECURE INFRASTRUCTURE PROVISIONING WITH AUTONOMIC METHODS
#90SECURING DATA LAKES VIA OBJECT STORE MONITORING
#91Graphical user interface for presentation of network security risk and threat information
#92SYSTEM & METHOD FOR MANAGING SEGREGATION OF DUTY IN INFORMATION TECHNOLOGY ACCESS MANAGEMENT
#93Technologies for managing compromised sensors in virtualized environments
#94Systems and methods for providing access to wireless gaming devices
#95TRACKING MALICIOUS SOFTWARE MOVEMENT WITH AN EVENT GRAPH
#96IDENTITY TIME MACHINE
#97Providing a graphical representation of anomalous events
#98REFLECTION RUNTIME PROTECTION AND AUDITING SYSTEM
#99Proactive suspicious activity monitoring for a software application framework
#100ARTIFICIAL INTELLIGENCE FOR REAL-TIME E-MAIL SENTIMENT ANALYSIS FOR BRAND PROTECTION
#101DATA MANAGEMENT AND GOVERNANCE SYSTEMS AND METHODS
#102Digital safety and account discovery
#103Enforcing trusted application settings for shared code libraries
#104Round trip time (RTT) measurement based upon sequence number
#105Subject logging
#106Systems and methods of secure provenance for distributed transaction databases
#107Event Based Login And Password History
#108SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION
#109Data Loss Prevention via dual mode Indexed Document Matching
#110Systems and methods for digital certificate security
#111Adaptive trust profile reference architecture
#112Application monitoring prioritization
#113METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS
#114NON-INTRUSIVE TECHNIQUES FOR DISCOVERING AND USING ORGANIZATIONAL RELATIONSHIPS
#115AUDITING OF DATABASE SEARCH QUERIES FOR PRIVILEGED DATA
#116System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack
#117IMAGE STEGANOGRAPHY DETECTION
#118Tagging and auditing sensitive information in a database environment
#119Hiding private user data in public signature chains for user authentication in video conferences
#120SYSTEM FOR AUTHENTICATING VERIFIED PERSONAL CREDENTIALS
#121Security techniques for device assisted services
#122Virtualized file server disaster recovery
#123VIRTUALIZED FILE SERVER DEPLOYMENT
#124Protecting a computer device from escalation of privilege attacks
#125METHOD AND SYSTEM FOR PROVIDING ACCESS CONTROL GOVERNANCE
#126IDENTITY QUERY LANGUAGE SYSTEMS AND METHODS
#127INTEGRITY AUDITING FOR MULTI-COPY STORAGE
#128AUDIT LOG ENHANCEMENT
#129Docker container based application licensing method, electronic device and medium
#130Methods and apparatus for detecting a presence of a malicious application
#131INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
#132Similarity analysis for automated disposition of security alerts
#133APPARATUS FOR CUSTOMER AUTHENTICATION OF AN ITEM
#134MAINTENANCE OF ACCESS FOR SECURITY ENABLEMENT ON A HOST SYSTEM
#135METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT OF DOCUMENTS
#136Eye Glasses with Individual User Awareness
#137Managing registry access on a computer device
#138Delayed and provisional user authentication for medical devices
#139FEATURE EXTRACTION AND TIME SERIES ANOMALY DETECTION OVER DYNAMIC GRAPHS
#140Method and system for detecting coordinated attacks against computing resources using statistical analyses
#141SECURE DATA PROCESSING
#142System and method for controlling data using containers
#143TRACKING MALWARE ROOT CAUSES WITH AN EVENT GRAPH
#144TRACKING MALWARE ROOT CAUSES WITH AN EVENT GRAPH
#145ENFORCING SECURITY PARAMETERS SPECIFIED BY AN OWNER ON A BLOCKCHAIN PLATFORM
#146Context Based Privacy Risk Footprint and Incident Protection
#147Context-based secure controller operation and malware prevention
#148Block or page lock features in serial interface memory
#149Client authentication using split key signing on a blockchain platform
#150System and method for implicit authentication
#151SYSTEMS AND METHODS OF DETECTING AND RESPONDING TO RANSOMWARE ON A CLOUD-BASED FILE STORAGE SYSTEM BY IDENTIFYING A VOLUME OF CHANGES IN THE FILES STORED ON THE CLOUD-BASED FILESTORAGESYSTEM
#152CONTROLLING ACCESS TO ELECTRONIC DATA ASSETS
#153Pairing devices to prevent digital content misuse
#154Cybersecurity active defense in a data storage system
#155SYSTEMS AND METHODS OF DETECTING AND RESPONDING TO A RANSOMWARE ATTACK IMPACTING A CLOUD-BASED FILE STORAGE SERVICE
#156Virtualized file server
#157Virtualized file server smart data ingestion
#158IDENTIFYING BOGON ADDRESS SPACES
#159Secure management script deployment
#160SECURE ENCLAVE PATHING CONFIGURATION FOR DATA CONFIDENCE FABRICS
#161Methods and systems for implementing automated controls assessment in computer systems
#162Pairing devices to prevent digital content misuse
#163Notification of access control request and explanation indicative of the access control request on a communication device
#164DATA CENTER TRAFFIC ANALYTICS SYNCHRONIZATION
#165Methods and systems for monitoring a risk of re-identification in a de-identified database
#166METHOD AND SYSTEM FOR PROVIDING BUSINESS INTELLIGENCE BASED ON USER BEHAVIOR
#167SYSTEM AND METHOD FOR USER OPTIMIZED APPLICATION DEPENDENCY MAPPING
#168Confirming receipt of audit records for audited use of a cryptographic key
#169TASK ENGINE
#170Apparatus and Method for Protecting Media Content Rights
#171API and encryption key secrets management system and method
#172Secure transfer of protected application storage keys with change of trusted computing base
#173Ransomware attack monitoring
#174METHOD, DEVICE, APPARATUS OF FEDERATED COMPUTING, AND STORAGE MEDIUM
#175AUDITING SYSTEM
#176Information processing apparatus and non-transitory computer readable medium
#177System and method for scalable file filtering using wildcards
#178Systems and methods of digital content certification and verification using cryptography and blockchain
#179Systems and methods for cybersecurity risk assessment
#180Systems and methods for securing and disseminating time sensitive information using a blockchain
#181Technologies for annotating process and user information for network flows
#182Systems and methods for selective access to logs
#183Virtualized file server
#184Dynamic configuration in cloud computing environments
#185System and method for securing data through proctored working environment
#186Smart contract mapping to trusted hardware in a data confidence fabric
#187AUTO UPDATE OF SENSOR CONFIGURATION
#188System and method for performing remote security assessment of firewalled computer
#189Controlling access to datasets described in a cryptographically signed record
#190System and method of assigning reputation scores to hosts
#191System and method for embedding a data analytics system in a third party native environment
#192VIRTUALIZED FILE SERVER DATA SHARING
#193Methods and systems for processing transactions on a value dispensing device using a mobile device
#194Using a secure enclave to satisfy retention and expungement requirements with respect to private data
#195COMMUNICATION NETWORK BASED NON-FUNGIBLE TOKEN CREATION PLATFORM WITH INTEGRATED CREATOR BIOMETRIC AUTHENTICATION
#196System for authenticating verified personal credentials
#197Allowing restricted external access to devices
#198APPLICATION PROTECTION ENFORCEMENT IN THE CLOUD
#199Computerized system for complying with certain critical infrastructure protection requirements
#200METHOD AND SYSTEM FOR INFLUENCING AUCTION BASED ADVERTISING OPPORTUNITIES BASED ON USER CHARACTERISTICS
#201Open source library security rating
#202Method and apparatus for implementing a release automation dashboard module
#203Risk adaptive protection
#204RANSOMWARE DETECTION AND DATA PRUNING MANAGEMENT
#205System and method for detecting leaked documents on a computer network
#206Gesture recognition devices and methods
#207Anticipation and warning of potential loss/theft for portable personal items
#208Method and system for preventing unauthorized processor mode switches
#209Methods and systems for implementing automated controls assessment in computer systems
#210Virtualized file server user views
#211Round trip time (RTT) measurement based upon sequence number
#212Systems and methods for managing content
#213Systems and methods for analyzing, assessing and controlling trust and authentication in applications and devices
#214Methods and apparatus for detecting a presence of a malicious application
#215Systems and methods for providing access to wireless gaming devices
#216ONLINE PLATFORM FOR PREDICTING CONSUMER INTEREST LEVEL
#217METHOD AND SYSTEM FOR CREATING AN AUDIENCE LIST BASED ON USER BEHAVIOR DATA
#218Methods and apparatus for control and detection of malicious content using a sandbox environment
#219Systems and methods for creating a verified digital association
#220Cyber-security presence monitoring and assessment
#221In-vehicle network system, fraud-detection electronic control unit, and fraud-detection method
#222Method for secure enrollment of devices in the industrial internet of things
#223MDL-based clustering for dependency mapping
#224System and method for creating and executing breach scenarios utilizing virtualized elements
#225Technologies for annotating process and user information for network flows
#226DETERMINING AN AUDIT LEVEL FOR DATA
#227Technologies for annotating process and user information for network flows
#228Method and system for storage-based intrusion detection and recovery
#229Tagging and auditing sensitive information in a database environment
#230Policy utilization analysis
#231Virtualized file server distribution across clusters
#232Systems and methods of electronic lock control and audit
#233Systems and methods for artificial model building techniques
#234Block device signature-based integrity protection for containerized applications
#235Audit log enrichment
#236Privacy-Preserving Log Analysis
#237Using a story when generating inferences using an adaptive trust profile
#238Systems and methods for digital certificate security
#239Digital safety and account discovery
#240Protecting sensitive information from an authorized device unlock
#241Maintenance of access for security enablement on a host system
#242Concurrent enablement of encryption on an operational path at a host port
#243Concurrent enablement of encryption on an operational path at a storage port
#244Authentication logging using circuitry degradation
#245Secure feature and key management in integrated circuits
#246Cloud architecture to secure privacy of personal data
#247Electronic messaging system for mobile devices with reduced traceability of electronic messages
#248Systems and methods for customizing a learning experience of a user
#249Universal operating system
#250Data correlation using file object cache
#251Enforcing trusted application settings for shared code libraries
#252Dynamic access control to network resources using federated full domain logon
#253Tracking malicious software movement with an event graph
#254Notification of access control request and explanation indicative of the access control request on a communication device
#255Methods and apparatus to collect distributed user information for media impressions and search terms
#256Apparatus for customer authentication of an item
#257Secure computing systems and methods
#258Method, system and computer readable medium for creating a profile of a user based on user behavior
#259Method and system for digital rights management of documents
#260Complex application attack quantification, testing, detection and prevention
#261Systems and methods for event-based application control
#262Delayed and provisional user authentication for medical devices
#263Unique ID generation for sensors
#264Controlling access to datasets described in a cryptographically signed record
#265Open source library security rating
#266Complex application attack quantification, testing, detection and prevention
#267Complex application attack quantification, testing, detection and prevention
#268Hierarchichal sharding of flows from sensors to collectors
#269Display apparatus, terminal apparatus, and methods of controlling at least one peripheral device using same
#270Reply ID generator for electronic messaging system
#271Anomaly detection through header field entropy
#272Method, apparatus, and system for detecting terminal security status
#273Synthetic data for determining health of a network security system
#274Information processing device, information processing method, and recording medium
#275Tagging and auditing sensitive information in a database environment
#276Method for detecting, blocking and reporting cyber-attacks against automotive electronic control units
#277Internal controls engine and reporting of events generated by a network or associated applications
#278System and method for performing remote security assessment of firewalled computer
#279Information processing apparatus, information processing method, and non-transitory computer readable medium
#280Application monitoring prioritization
#281Cross-domain content-lifecycle management
#282Embedded data protection and forensics for physically unsecure remote terminal unit (RTU)
#283Providing control to tenants over user access of content hosted in cloud infrastructures
#284Security control method and computer system
#285Digital identity social graph
#286System and method of detecting hidden processes by analyzing packet flows
#287Flexible controls for certificates
#288API and encryption key secrets management system and method
#289Methods and apparatus for control and detection of malicious content using a sandbox environment
#290Data protection automatic optimization system and method
#291Data processing systems and methods for auditing data request compliance
#292POLICY MANAGEMENT FOR DATA MIGRATION
#293Data center traffic analytics synchronization
#294Blockchain technology for regulatory compliance of data management systems
#295System and method for detecting leaked documents on a computer network
#296Authentication system and authentication method for executing a work process on an object
#297Systems and methods of secure provenance for distributed transaction databases
#298Data processing systems for measuring privacy maturity within an organization
#299APPARATUS, METHOD, AND PROGRAM FOR VALIDATING USER
#300Data validation in a mobile communication network