AZ

Alex Zaslavsky

EC Emc Ip Holding Company: 23 patents #151 of 4,608Top 4%
EM Emc: 5 patents #619 of 3,345Top 20%
Disney: 5 patents #1,380 of 6,686Top 25%
RS Rsa Security: 2 patents #16 of 69Top 25%
MI Marconi Medical Systems Israel: 1 patents #4 of 8Top 50%
IN Intel: 1 patents #18,218 of 30,777Top 60%
📍 Brookline, MA: #90 of 3,196 inventorsTop 3%
🗺 Massachusetts: #2,065 of 88,656 inventorsTop 3%
Overall (All Time): #84,852 of 4,157,543Top 3%
38
Patents All Time

Issued Patents All Time

Showing 1–25 of 38 patents

Patent #TitleCo-InventorsDate
12333451 Interpretable supervised anomaly detection for determining reasons for unsupervised anomaly decision Sashka T. Davis 2025-06-17
12019784 Privacy preserving evaluation of sensitive user features for anomaly detection Salah Machani 2024-06-25
11625626 Performance improvement recommendations for machine learning models Arkady Koganov, Anatoly Gendelev 2023-04-11
11486709 Ground distance determination using zone-based location data Guoying Luo, Salah Machani 2022-11-01
11283841 Community-based anomaly detection policy sharing among organizations Salah Machani 2022-03-22
11233796 Data-driven attribute selection for user application entitlement analysis Zhou Li, Kevin D. Bowers 2022-01-25
11222101 User behavior analytics using keystroke analysis of pseudo-random character strings Salah Machani 2022-01-11
11151232 User authentication by endpoint device using local policy engine and endpoint data Salah Machani 2021-10-19
11122438 Map-based techniques for visualizing user access data and for configuring and enforcing location-based access policies Naveen Sunkavally, Leandro E. Diato, Victor Malchikov 2021-09-14
11113650 Automated generation of adaptive policies from organizational data for detection of risk-related events Arkady Koganov, Anatoly Gendelev 2021-09-07
11042880 Authenticating users in the presence of small transaction volumes Alon Hazan, Anatoly Gendelev, Marcelo Blatt, Alon Kaufman 2021-06-22
10965696 Evaluation of anomaly detection algorithms using impersonation data derived from user data Shay Amram 2021-03-30
10902428 Maintaining a risk model using feedback directed to other risk models Shay Amram, Alma Zohar, Anatoly Gendelev, Christina Tkachenko 2021-01-26
10721236 Method, apparatus and computer program product for providing security via user clustering Boris Kronrod, Zohar Duchin 2020-07-21
10515366 Network neighborhood topology as a predictor for fraud and anomaly detection Boris Gorelik, Anatoly Gendelev, Liron Liptz, Marcelo Blatt 2019-12-24
10505963 Anomaly score generation based on adaptive clustering of user location Liron Liptz, Shay Amram, Kevin D. Bowers 2019-12-10
10454939 Method, apparatus and computer program product for identifying excessive access rights granted to users Shay Amram, Carmit Sahar 2019-10-22
10454967 Clustering computer security attacks by threat actor based on attack features Oren Karmi, Uri Fleyder, Lior Ben-Porat, Marcelo Blatt 2019-10-22
10147065 Dynamic generation of risk score thresholds for optimized configuration of policy rules in an adaptive authentication service Peleg Yiftachel, Marcelo Blatt, Alon Kaufman 2018-12-04
10148673 Automatic selection of malicious activity detection rules using crowd-sourcing techniques Zohar Duchin, Alon Kaufman, Oleg Freylafert, Lior Asher 2018-12-04
10142308 User authentication Zohar Duchin, Ika Bar-Menachem, Shachar Israeli 2018-11-27
10115108 Rendering transaction data to identify fraud detection rule strength Anatoly Gendelev, Kineret Raviv, Eyal Kolman, Alma Zohar 2018-10-30
10013694 Open data collection for threat intelligence posture assessment Shachar Israeli, Ereli Eran, Marcelo Blatt 2018-07-03
10013539 Rapid device identification among multiple users Alon Hazan, Marcelo Blatt, Zohar Duchin, Shay Amram 2018-07-03
9690937 Recommending a set of malicious activity detection rules in an automated, data-driven manner Zohar Duchin, Alon Kaufman, Martin Rosa, Luan Nguyen 2017-06-27