| 11689545 |
Performing cybersecurity operations based on impact scores of computing events over a rolling time interval |
Zhen Mo, Barak Raz, Vijay Ganti |
2023-06-27 |
| 10013694 |
Open data collection for threat intelligence posture assessment |
Shachar Israeli, Alex Zaslavsky, Marcelo Blatt |
2018-07-03 |
| 9722996 |
Partial password-based authentication using per-request risk scores |
Eyal Kolman, Alon Kaufman, Eyal Gruss |
2017-08-01 |
| 9601000 |
Data-driven alert prioritization |
Eyal Gruss, Alex Vaystikh, Eyal Kolman, Alon Kaufman, Yael Villa |
2017-03-21 |
| 9560027 |
User authentication |
Eyal Kolman, Alon Kaufman, Yael Villa, Alex Vaystikh, Liron Liptz |
2017-01-31 |
| 9558346 |
Information processing systems with security-related feedback |
Eyal Kolman, Alon Kaufman, Yael Villa, Alex Vaystikh |
2017-01-31 |
| 9462009 |
Detecting risky domains |
Eyal Kolman, Alex Vaystikh, Alon Kaufman, Eyal Gruss |
2016-10-04 |
| 9426168 |
Fast-flux detection utilizing domain name system information |
Eyal Gruss, Alex Vaystikh, Eyal Kolman, Alon Kaufman |
2016-08-23 |
| 9325733 |
Unsupervised aggregation of security rules |
Eyal Kolman, Eyal Gruss, Alon Kaufman |
2016-04-26 |
| 9154516 |
Detecting risky network communications based on evaluation using normal and abnormal behavior profiles |
Alex Vaystikh, Eyal Kolman |
2015-10-06 |
| 9130985 |
Data driven device detection |
Eyal Kolman, Alon Kaufman, Yael Villa, Alex Vaystikh, Eyal Gruss |
2015-09-08 |