| 12265614 |
Label recommendation for cybersecurity content |
Aviv Ron, Anton Puzanov, Bar Haim, Eitan Chertok, Romy Varga |
2025-04-01 |
| 12229640 |
Machine learning model trained using features extracted from n-grams of mouse event data |
Andrey Finkelshtein, Anton Puzanov, Noga Agmon |
2025-02-18 |
| 11563762 |
User flow graph analytics for cyber security |
Yehonatan Bitton, Andrey Finkelshtein |
2023-01-24 |
| 11455364 |
Clustering web page addresses for website analysis |
Andrey Finkelshtein, Noga Agmon, Yehonatan Bitton |
2022-09-27 |
| 11429790 |
Automated detection of personal information in free text |
Andrey Finkelshtein, Bar Haim |
2022-08-30 |
| 11373063 |
System and method for staged ensemble classification |
Andrey Finkelshtein, Oded Margalit |
2022-06-28 |
| 11308077 |
Identifying source datasets that fit a transfer learning process for a target domain |
Bar Haim, Andrey Finkelshtein, Noga Agmon |
2022-04-19 |
| 11222114 |
Time and frequency domain analysis of bytecode for malware detection |
Bar Haim |
2022-01-11 |
| 11095435 |
Keystroke dynamics anonimization |
Itay Hazan |
2021-08-17 |
| 11030312 |
System and method for machine based detection of a malicious executable file |
Gal Steimberg |
2021-06-08 |
| 10846403 |
Detecting malicious executable files by performing static analysis on executable files' overlay |
Andrey Finkelshtein |
2020-11-24 |
| 10599330 |
Challenge generation for verifying users of computing devices |
Ayman Jarrous, Alexandra Shulman-Peleg |
2020-03-24 |
| 10082954 |
Challenge generation for verifying users of computing devices |
Ayman Jarrous, Alexandra Shulman-Peleg |
2018-09-25 |
| 9554273 |
User identification on a touchscreen device |
Ayman Jarrous, Alexandra Shulman-Peleg |
2017-01-24 |
| 8244652 |
Stacking schema for classification tasks |
Lior Rokach, Yuval Elovici |
2012-08-14 |