System and method for detecting malicicous code
A malicious code, code technology, applied in the field of detecting malicious code, can solve heavy and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] In describing the preferred embodiments of the invention illustrated in the drawings, specific terminology will be employed for the sake of clarity. However, the invention is not to be limited only by the specific terms so chosen, and each specific element should be considered to include all technical equivalents that work in a similar manner.
[0015] figure 1 An example of a computer system capable of implementing the methods and systems of the present invention is described. The systems and methods of the present invention can be implemented in the form of software running on a computer system such as a mainframe, personal computer (PC), laptop, server, and the like. Application software can be stored in a recording medium locally accessible to the computer system, such as a floppy disk, CD, hard disk, etc., or it can be accessed remotely from the computer system through a hardwired or wireless connection to a network, such as a local area network or the Internet. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 