| 12124585 |
Risk assessment management |
Lior Schneider, Jacob Ukelson |
2024-10-22 |
| 12032679 |
Apparatus and method for disk attestation |
Avigail Oron, Naor Shlomo, Ayal Baron |
2024-07-09 |
| 11929999 |
Device and method for attesting distributed services |
Avigail Oron |
2024-03-12 |
| 11461132 |
Time based priority queue |
Ayelet Wald, Michael Naaman, Alexander E. Kravtsov, Michael Charny, Max Komm |
2022-10-04 |
| 10951577 |
Device and method for resolving domain names |
Avigail Oron, Itamar Ofek |
2021-03-16 |
| 10484481 |
Fault tolerant, content download system |
Eran Gampel, Adi Molkho |
2019-11-19 |
| 8438241 |
Detecting and protecting against worm traffic on a network |
Anat Bremler Bar, Rami Rivlin |
2013-05-07 |
| 8370937 |
Handling of DDoS attacks from NAT or proxy devices |
Tamir Gal, Keren Horowitz |
2013-02-05 |
| 8156557 |
Protection against reflection distributed denial of service attacks |
Darrel Lewis, Rafi Tzadikario, Karen Horowitz |
2012-04-10 |
| 7979694 |
Using TCP to authenticate IP source addresses |
Guy Pazi, Yehiel Shtein, Rephael Tzadikario |
2011-07-12 |
| 7908480 |
Authenticating an endpoint using a STUN server |
Scott Firestone, Cullen Jennings, Daniel G. Wing |
2011-03-15 |
| 7707305 |
Methods and apparatus for protecting against overload conditions on nodes of a distributed network |
Yehuda Afek, Anat Bremler-Barr |
2010-04-27 |
| 7653938 |
Efficient cookie generator |
Guy Pazi, Yehiel Shtein |
2010-01-26 |
| 7624447 |
Using threshold lists for worm detection |
Keren Horowitz, Dror Karmi, Rami Rivlin, Rephael Tzadikario, Yehiel Stein |
2009-11-24 |
| 7620733 |
DNS anti-spoofing using UDP |
Rephael Tzakikario, Guy Pazi |
2009-11-17 |
| 7610622 |
Supporting options in a communication session using a TCP cookie |
Michael Zayats, Rajan Goyal |
2009-10-27 |
| 7568224 |
Authentication of SIP and RTP traffic |
Cullen Jennings, Daniel G. Wing |
2009-07-28 |
| 7536552 |
Upper-level protocol authentication |
Rafi Zadikario |
2009-05-19 |
| 7342929 |
Weighted fair queuing-based methods and apparatus for protecting against overload conditions on nodes of a distributed network |
Anat Bremler-Barr, Keren Horvitz, Rephael Tzadikario, Yehuda Afek |
2008-03-11 |
| 7313815 |
Protecting against spoofed DNS messages |
Guy Pazi, Alon Golan, Yehuda Afek |
2007-12-25 |
| 7225270 |
Selective diversion and injection of communication traffic |
Anat Bremler Barr, Hank Nussbacher, Roi Hermoni |
2007-05-29 |
| 7171683 |
Protecting against distributed denial of service attacks |
Guy Pazi, Anat Bremler-Bar, Rami Rivlin |
2007-01-30 |
| 6907525 |
Protecting against spoofed DNS messages |
Guy Pazi, Alon Golan, Yehuda Afek |
2005-06-14 |
| 6850969 |
Lock-free file system |
Edya Ladan-Mozes, Ohad Rodeh |
2005-02-01 |
| 5586321 |
Diffracting token router and applications thereof |
Nir N. Shavit, Asaph Zemach |
1996-12-17 |