This application claims the benefit of U.S. provisional application Ser. No. 60/093,560, filed Jul. 21, 1998, entitled Information Security Analysis System.
Number | Name | Date | Kind |
---|---|---|---|
5361359 | Tajallie et al. | Nov 1994 | |
5410648 | Pazel | Apr 1995 | |
5414833 | Hershey et al. | May 1995 | |
5440723 | Arnold et al. | Aug 1995 | |
5537540 | Miller et al. | Jul 1996 | |
5555419 | Arsenault | Sep 1996 | |
5608854 | Labedz et al. | Mar 1997 | |
5684945 | Chen et al. | Nov 1997 | |
5794046 | Meier et al. | Aug 1998 | |
5796951 | Hammer et al. | Aug 1998 | |
5819094 | Sato et al. | Oct 1998 | |
5822535 | Takase et al. | Oct 1998 | |
5832208 | Chen et al. | Nov 1998 | |
5845081 | Rangarjan et al. | Dec 1998 | |
5923849 | Venkatraman | Jul 1999 | |
5958010 | Agarwal et al. | Sep 1999 | |
5960170 | Chen et al. | Sep 1999 | |
5960439 | Hamner et al. | Sep 1999 | |
5991881 | Conklin et al. | Nov 1999 | |
6026442 | Lewis et al. | Feb 2000 | |
6043824 | Glenn et al. | Mar 2000 | |
6076106 | Hamner et al. | Jun 2000 | |
6088804 | Hill et al. | Jul 2000 |
Number | Date | Country |
---|---|---|
409171460 | Jun 1997 | JP |
09 171 460 | Jun 1997 | JP |
WO 9842103 | Sep 1998 | WO |
Entry |
---|
Deri L., Mankis D., “VRML: Adding 3D to Network Management”, 4th International Conference on Intelligence in Services and Networks, pp. 469-477, May 27-29, 1997. |
Law A M et al, “Simulation Software for Communications Networks: The State of the Art,” IEEE Communications Magazine, vol. 32, No. 3, pp. 44-50, Mar. 1, 1994. |
Chang C K; Al-Saloan Y Y; Defanti T, Scientific Visualization: A Performance Study of CSMA/CD with Connected Data Links—(Hybrid-Ethernet), Proceedings of the Third Workshop on Future Trends of Distributed Computing Systems, pp. 389-394, Apr. 14-16, 1992. |
Sczepansky, A, “Auf Herz Und Nieren Pruefen”, Elektronik, De, Franzis Verlag GMBH, pp. 78-81, Apr. 2, 1997. |
Yau S S et al, “An Interactive Software Maintenance Environment,” AFIPS Conference Proceedings, pp. 553, 555-561, Jun. 1987. |
Saito T et al, “Protection Against Trojan Horses by Source Code Analysis,” Electronics & Communications in Japan, Part III—Fundamental Electronic Science, pp. 11-18, Jan. 1994. |
Lo R et al, “Towards a Testbed for Malicious Code Detection,” Computer Society Annual Conference, pp. 160-166, 1991. |
Number | Date | Country | |
---|---|---|---|
60/093560 | Jul 1998 | US |