YE

Yuval Elovici

DA Deutsche Telekom Ag: 11 patents #18 of 773Top 3%
BA B.G. Negev Technologies And Applications: 5 patents #1 of 91Top 2%
NE Nec: 3 patents #4,195 of 14,502Top 30%
VA Verint Americas: 2 patents #77 of 190Top 45%
ME Medigus: 2 patents #6 of 16Top 40%
M2 Morphisec Information Security 2014: 2 patents #4 of 9Top 45%
NU Nanjing University: 1 patents #249 of 887Top 30%
NA Nec Corporation Of America: 1 patents #39 of 106Top 40%
RU Ramot At Tel-Aviv University: 1 patents #468 of 1,095Top 45%
YC Yeda Research And Development Co.: 1 patents #619 of 1,403Top 45%
ML Metacure Limited: 1 patents #25 of 36Top 70%
📍 Arugot, IL: #1 of 5 inventorsTop 20%
Overall (All Time): #74,209 of 4,157,543Top 2%
41
Patents All Time

Issued Patents All Time

Showing 1–25 of 41 patents

Patent #TitleCo-InventorsDate
12218960 Information collection system, information collection method, medium, and information collection program Yoshiyuki Yamada, Masaki INOKUCHI, Yoshinobu Ohta, Asaf Shabtai, Ron Bitton 2025-02-04
12190242 Methods for detecting phantom projection attacks against computer vision algorithms Ben Nassi, Yisroel Avraham Mirsky, Dudi Nassi, Raz Ben Nethanel 2025-01-07
12126635 Bio-inspired agile cyber-security assurance framework Rami Puzis, Polina Zilberman, Elad Marco, Aviad Elitzur, Thambipillai Srikanthan +3 more 2024-10-22
11995568 Identification and prediction of metabolic pathways from correlation-based metabolite networks David Toubiana, Rami Puzis 2024-05-28
11909754 Security assessment system Masaki INOKUCHI, Yoshinobu Ohta, Ron Bitton, Orly Stan, Asaf Shabtai 2024-02-20
11783048 Security assessment system Masaki INOKUCHI, Yoshinobu Ohta, Ron Bitton, Orly Stan, Tomer Gluck +1 more 2023-10-10
11695794 Method and system for clustering darknet traffic streams with word embeddings Dvir Cohen, Asaf Shabtai, Yisroel Avraham Mirsky, Rami Puzis, Tobias Martin +1 more 2023-07-04
11539743 Echo detection of Man-in-the-Middle LAN attacks Asaf Shabtai, Yisroel Avraham Mirsky, Naor Kalbo 2022-12-27
11416592 Method for online signature verification using wrist-worn devices Ben Nassi, Erez Shmueli, Alona Levy 2022-08-16
11201882 Detection of malicious network activity Yisroel Avraham Mirsky, Oleg BRODT, Asaf Shabtai, Masayuki Nakae 2021-12-14
11195394 Analyzing radio transmission for detecting whether a drone is filming a point of interest Ben Nassi, Adi Shamir 2021-12-07
11086993 System and method for performing on-cloud memory analysis, forensic and security operations on connected devices Mordechai Guri 2021-08-10
10866998 System and method for identifying contacts of a target user in a social network Rami Puzis, Roni Stern, Lior Rokach, Tal Beja, Ariel Felner +2 more 2020-12-15
10817605 System and method for detecting activities within a computerized device based on monitoring of its power consumption Mordechai Guri 2020-10-27
10742603 System and method for monitoring and protecting an untrusted operating system by means of a trusted operating system Mordechai Guri 2020-08-11
10515215 Method and system for protecting computerized systems from malicious code by means of mutable instructions Mordechai Guri, Gabi Kedma 2019-12-24
10296740 System and method for detecting activities within a bootstrap of a computerized device based on monitoring of power consumption Mordechai Guri 2019-05-21
10192057 Misuseability analysis for it infrastructure Asaf Shabtai 2019-01-29
10091220 Platform for protecting small and medium enterprises from cyber security threats Asaf Shabtai, Christoph Peylo, Barak Chizi, Barak Zacharish, David MIMRAN +1 more 2018-10-02
9934388 Method and system for database encryption Ronen Vaisenberg, Erez Shmueli 2018-04-03
9934337 Flexible and scalable simulations of mass participants in real time Dudu Mimran, Barak Chizi, Moshe Bixenshpaner, Tomer Zrihen 2018-04-03
9703954 Method and system for protecting computerized systems from malicious code Mordehai Guri, Gabi Kedma 2017-07-11
9659185 Method for detecting spammers and fake profiles in social networks Michael Fire, Gilad Katz 2017-05-23
9646245 System and method for identifying contacts of a target user in a social network Rami Puzis, Roni Stern, Lior Rokach, Tal Beja, Ariel Felner +2 more 2017-05-09
9609483 System for characterizing geographical locations based on multi sensors anonymous data sources Dudu Mimran, Bark Chizi, Alexander Binun, Moshe BIXENSPANER, Pavel ACKERMAN 2017-03-28