Issued Patents All Time
Showing 1–25 of 41 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12218960 | Information collection system, information collection method, medium, and information collection program | Yoshiyuki Yamada, Masaki INOKUCHI, Yoshinobu Ohta, Asaf Shabtai, Ron Bitton | 2025-02-04 |
| 12190242 | Methods for detecting phantom projection attacks against computer vision algorithms | Ben Nassi, Yisroel Avraham Mirsky, Dudi Nassi, Raz Ben Nethanel | 2025-01-07 |
| 12126635 | Bio-inspired agile cyber-security assurance framework | Rami Puzis, Polina Zilberman, Elad Marco, Aviad Elitzur, Thambipillai Srikanthan +3 more | 2024-10-22 |
| 11995568 | Identification and prediction of metabolic pathways from correlation-based metabolite networks | David Toubiana, Rami Puzis | 2024-05-28 |
| 11909754 | Security assessment system | Masaki INOKUCHI, Yoshinobu Ohta, Ron Bitton, Orly Stan, Asaf Shabtai | 2024-02-20 |
| 11783048 | Security assessment system | Masaki INOKUCHI, Yoshinobu Ohta, Ron Bitton, Orly Stan, Tomer Gluck +1 more | 2023-10-10 |
| 11695794 | Method and system for clustering darknet traffic streams with word embeddings | Dvir Cohen, Asaf Shabtai, Yisroel Avraham Mirsky, Rami Puzis, Tobias Martin +1 more | 2023-07-04 |
| 11539743 | Echo detection of Man-in-the-Middle LAN attacks | Asaf Shabtai, Yisroel Avraham Mirsky, Naor Kalbo | 2022-12-27 |
| 11416592 | Method for online signature verification using wrist-worn devices | Ben Nassi, Erez Shmueli, Alona Levy | 2022-08-16 |
| 11201882 | Detection of malicious network activity | Yisroel Avraham Mirsky, Oleg BRODT, Asaf Shabtai, Masayuki Nakae | 2021-12-14 |
| 11195394 | Analyzing radio transmission for detecting whether a drone is filming a point of interest | Ben Nassi, Adi Shamir | 2021-12-07 |
| 11086993 | System and method for performing on-cloud memory analysis, forensic and security operations on connected devices | Mordechai Guri | 2021-08-10 |
| 10866998 | System and method for identifying contacts of a target user in a social network | Rami Puzis, Roni Stern, Lior Rokach, Tal Beja, Ariel Felner +2 more | 2020-12-15 |
| 10817605 | System and method for detecting activities within a computerized device based on monitoring of its power consumption | Mordechai Guri | 2020-10-27 |
| 10742603 | System and method for monitoring and protecting an untrusted operating system by means of a trusted operating system | Mordechai Guri | 2020-08-11 |
| 10515215 | Method and system for protecting computerized systems from malicious code by means of mutable instructions | Mordechai Guri, Gabi Kedma | 2019-12-24 |
| 10296740 | System and method for detecting activities within a bootstrap of a computerized device based on monitoring of power consumption | Mordechai Guri | 2019-05-21 |
| 10192057 | Misuseability analysis for it infrastructure | Asaf Shabtai | 2019-01-29 |
| 10091220 | Platform for protecting small and medium enterprises from cyber security threats | Asaf Shabtai, Christoph Peylo, Barak Chizi, Barak Zacharish, David MIMRAN +1 more | 2018-10-02 |
| 9934388 | Method and system for database encryption | Ronen Vaisenberg, Erez Shmueli | 2018-04-03 |
| 9934337 | Flexible and scalable simulations of mass participants in real time | Dudu Mimran, Barak Chizi, Moshe Bixenshpaner, Tomer Zrihen | 2018-04-03 |
| 9703954 | Method and system for protecting computerized systems from malicious code | Mordehai Guri, Gabi Kedma | 2017-07-11 |
| 9659185 | Method for detecting spammers and fake profiles in social networks | Michael Fire, Gilad Katz | 2017-05-23 |
| 9646245 | System and method for identifying contacts of a target user in a social network | Rami Puzis, Roni Stern, Lior Rokach, Tal Beja, Ariel Felner +2 more | 2017-05-09 |
| 9609483 | System for characterizing geographical locations based on multi sensors anonymous data sources | Dudu Mimran, Bark Chizi, Alexander Binun, Moshe BIXENSPANER, Pavel ACKERMAN | 2017-03-28 |