| 11188667 |
Monitoring and preventing unauthorized data access |
Yoav Ben-Yair, Gil Fuchs, Ilan D. Prager |
2021-11-30 |
| 11099840 |
Adaptation of a web application for use by a mobile device |
Yoav Ben-Yair, Gil Fuchs, Amitai Madar, Josemina M. Magdalen, Oren Paikowsky |
2021-08-24 |
| 11099839 |
Adaptation of a web application for use by a mobile device |
Yoav Ben-Yair, Gil Fuchs, Amitai Madar, Josemina M. Magdalen, Oren Paikowsky |
2021-08-24 |
| 11062004 |
Emotion-based database security |
Gil Fuchs, Ilan D. Prager, Yoav Ben-Yair, Shlomit Avrahami |
2021-07-13 |
| 11057407 |
Detecting malware attacks using extracted behavioral features |
Shlomit Avrahami, Tali Finelt, Yakir Keisar, Ilan D. Prager, Alexander Pyasik +3 more |
2021-07-06 |
| 11030805 |
Displaying data lineage using three dimensional virtual reality model |
Ilan D. Prager |
2021-06-08 |
| 10958687 |
Generating false data for suspicious users |
Shlomit Avrahami, Yoav Ben-Yair, Gil Fuchs, Ilan D. Prager |
2021-03-23 |
| 10929478 |
Filtering document search results using contextual metadata |
Yoav Ben-Yair, Gil Fuchs, Ilan D. Prager |
2021-02-23 |
| 10891386 |
Dynamically provisioning virtual machines |
Peter Hagelund, Ilan D. Prager |
2021-01-12 |
| 10891391 |
Remote file storage with multiple access levels |
Miriam Nizri, Ilan D. Prager |
2021-01-12 |