85268784
Mar 16, 2011
Apr 24, 2012
Computer software allowing real-time monitoring of global computer networks to detect malicious content; software allowing operators to perform analysis to gain knowledge, topology of networks, hidden nodes, threats, intent, and capabilities; software that has cluster and instance based learning techniques in built to predict activities involved with malicious networks
Electrical and Scientific Apparatus