85257294
Mar 3, 2011
Mar 27, 2012
Computer software allowing real-time monitoring of global computer networks to detect malicious content; software allowing operators to perform analysis to gain knowledge, topology of networks, hidden nodes, threats, intent, and capabilities; software that has cluster and instance based learning techniques inbuilt to predict activities involved with malicious networks
Electrical and Scientific Apparatus