| 11877152 |
Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
Avi Turgeman, Oren Kedem |
2024-01-16 |
| 11425563 |
Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
Avi Turgeman, Oren Kedem |
2022-08-23 |
| 10897482 |
Method, device, and system of back-coloring, forward-coloring, and fraud detection |
Avi Turgeman |
2021-01-19 |
| 10834590 |
Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
Avi Turgeman, Oren Kedem |
2020-11-10 |
| 10776476 |
System, device, and method of visual login |
Avi Turgeman |
2020-09-15 |
| 10032010 |
System, device, and method of visual login and stochastic cryptography |
Avi Turgeman |
2018-07-24 |
| 9703953 |
Method, device, and system of differentiating among users based on user classification |
Avi Turgeman |
2017-07-11 |
| 9552470 |
Method, device, and system of generating fraud-alerts for cyber-attacks |
Avi Turgeman, Oren Kedem |
2017-01-24 |
| 9450971 |
Device, system, and method of visual login and stochastic cryptography |
Avi Turgeman, Edo Dekel |
2016-09-20 |
| 8856928 |
Protecting electronic assets using false profiles in social networks |
Idan Aharoni |
2014-10-07 |
| 8683592 |
Associating network and storage activities for forensic analysis |
Yedidya Dotan, Assaf Natanzon |
2014-03-25 |