| 12430428 |
Determining anomalous tool invocations by applications using large generative models |
Ron F. Keller |
2025-09-30 |
| 12401661 |
Detecting network activity from sampled network metadata |
Omer Karin, Roy Levin |
2025-08-26 |
| 12380096 |
Natural language API for security graph exploration |
Lior Ziv, Tamer Salman, Amit Dvir Adani |
2025-08-05 |
| 12373757 |
Using weighted peer groups to selectively trigger a security alert |
Itay Argoety, Dror Cohen |
2025-07-29 |
| 12353547 |
Allow list of container images based on deployment configuration at a container orchestration service |
Eran Goldstein, Dotan Patrich |
2025-07-08 |
| 12355786 |
Machine learning approach for solving the cold start problem in stateful models |
Andrey KARPOVSKY |
2025-07-08 |
| 12282546 |
Abnormal classic authorization detection systems |
Ilay Grossman, Avichai Ben David |
2025-04-22 |
| 12265616 |
Detect anomalous container deployment at a container orchestration service |
Amit MAGEN MEDINA, Dotan Patrich, Josef Weizman |
2025-04-01 |
| 12242600 |
Abnormally permissive role definition detection systems |
Ilay Grossman, Avichai Ben David |
2025-03-04 |