| 4 |
10,416,970 |
 |
Analysis device, analysis method, and analysis program
|
| 5 |
10,284,576 |
 |
Tiered object-related trust decisions
|
| 6 |
10,256,979 |
 |
Assessing application authenticity and performing an action in response to
an evaluation result
|
| 7 |
9,756,074 |
 |
System and method for IPS and VM-based detection of suspicious objects
|
| 8 |
9,754,102 |
 |
Malware management through kernel detection during a boot sequence
|
| 9 |
9,516,032 |
 |
Methods and systems for using derived user accounts
|
| 10 |
9,444,844 |
 |
Malicious mobile code runtime monitoring system and methods
|
| 11 |
9,332,021 |
 |
Methods and systems for preventing security breaches
|
| 12 |
9,294,493 |
 |
Computer security method and system with input parameter validation
|
| 13 |
9,280,391 |
 |
Systems and methods for improving performance of computer systems
|
| 14 |
9,264,378 |
 |
Network monitoring by using packet header analysis
|
| 15 |
9,223,963 |
 |
Systems and methods for behavioral sandboxing
|
| 16 |
9,219,755 |
 |
Malicious mobile code runtime monitoring system and methods
|
| 17 |
9,208,327 |
 |
Tiered object-related trust decisions
|
| 18 |
9,189,621 |
 |
Malicious mobile code runtime monitoring system and methods
|
| 19 |
9,141,786 |
 |
Malicious mobile code runtime monitoring system and methods
|
| 20 |
9,027,121 |
 |
Method and system for creating a record for one or more computer security
incidents
|
| 21 |
8,955,126 |
 |
Tiered object-related trust decisions
|
| 22 |
8,954,581 |
 |
Network monitoring by using packet header analysis
|
| 23 |
8,875,281 |
 |
Methods and systems for using derived user accounts
|
| 24 |
8,707,251 |
 |
Buffered viewing of electronic documents
|
| 25 |
8,701,181 |
 |
Methods and systems for preventing security breaches
|
| 26 |
8,683,578 |
 |
Methods and systems for using derived user accounts
|
| 27 |
8,677,494 |
 |
Malicious mobile code runtime monitoring system and methods
|
| 28 |
RE44,723 |
 |
Regulating file access rates according to file type
|
| 29 |
8,635,438 |
 |
Method and system of file manipulation during early boot time by accessing
user-level data associated with a kernel-level function
|
| 30 |
RE44,686 |
 |
Dynamically modifying the resources of a virtual server
|
| 31 |
8,578,495 |
 |
System and method for analyzing packed files
|
| 32 |
8,489,764 |
 |
Restricting communication of selected processes to a set of specific
network addresses
|
| 33 |
8,479,286 |
 |
Systems and methods for behavioral sandboxing
|
| 34 |
8,468,603 |
 |
Tiered object-related trust decisions
|
| 35 |
8,452,744 |
 |
System and method for analyzing locked files
|
| 36 |
8,448,245 |
 |
Automated identification of phishing, phony and malicious web sites
|
| 37 |
RE44,210 |
 |
Virtualizing super-user privileges for multiple virtual processes
|
| 38 |
8,418,245 |
 |
Method and system for detecting obfuscatory pestware in a computer memory
|
| 39 |
8,387,147 |
 |
Method and system for detecting and removing hidden pestware files
|
| 40 |
8,386,598 |
 |
Network monitoring by using packet header analysis
|
| 41 |
8,381,296 |
 |
Method and system for detecting and removing hidden pestware files
|
| 42 |
8,332,943 |
 |
Tiered object-related trust decisions
|
| 43 |
8,261,095 |
 |
Methods and systems for using derived user accounts
|
| 44 |
8,255,992 |
 |
Method and system for detecting dependent pestware objects on a computer
|
| 45 |
8,245,289 |
 |
Methods and systems for preventing security breaches
|
| 46 |
8,230,507 |
 |
Modular agent for network security intrusion detection system
|
| 47 |
8,225,408 |
 |
Method and system for adaptive rule-based content scanners
|
| 48 |
8,201,243 |
 |
Backwards researching activity indicative of pestware
|
| 49 |
8,190,868 |
 |
Malware management through kernel detection
|
| 50 |
8,181,244 |
 |
Backward researching time stamped events to find an origin of pestware
|