| 12001310 |
Approximating activity loads in databases using smoothed time series |
Ofer Haim Biller |
2024-06-04 |
| 11960599 |
Classifying users of a database |
Ofer Haim Biller |
2024-04-16 |
| 11941135 |
Automated sensitive data classification in computerized databases |
Guy Gonen, Benazeer Daruwalla |
2024-03-26 |
| 11757837 |
Sensitive data identification in real time for data streaming |
Ofer Haim Biller |
2023-09-12 |
| 11645337 |
Classification by optimizing regular expression rules |
Ofer Haim Biller |
2023-05-09 |
| 11599442 |
Detecting abnormal database activity |
Ofer Haim Biller |
2023-03-07 |
| 11425156 |
Dynamic gathering of attack symptoms |
Zamir Paltiel |
2022-08-23 |
| 11416631 |
Dynamic monitoring of movement of data |
Guy Galil |
2022-08-16 |
| 11403577 |
Assisting and automating workflows using structured log events |
Oded Margalit, Yair Allouche |
2022-08-02 |
| 11297105 |
Dynamically determining a trust level of an end-to-end link |
— |
2022-04-05 |
| 11196760 |
Detecting unauthorized user actions |
Ofer Haim Biller |
2021-12-07 |
| 11057407 |
Detecting malware attacks using extracted behavioral features |
Shlomit Avrahami, Tali Finelt, Itai Gordon, Yakir Keisar, Ilan D. Prager +3 more |
2021-07-06 |
| 11055359 |
Hierarchical objects linkage data visualization |
Peter Bak, Ofer Haim Biller, Rotem Blinder, Tal Daniel, Adir Even +1 more |
2021-07-06 |
| 10831785 |
Identifying security breaches from clustering properties |
Allon Adir, Ehud Aharoni, Lev Greenberg, Oded Margalit, Rosa Miroshnikov +1 more |
2020-11-10 |
| 10708282 |
Unauthorized data access detection based on cyber security images |
Ofer Haim Biller, Rosa Miroshnikov, David Rozenblat |
2020-07-07 |
| 10681073 |
Detecting unauthorized user actions |
Ofer Haim Biller |
2020-06-09 |
| 10530787 |
Detecting malware attacks using extracted behavioral features |
Shlomit Avrahami, Tali Finelt, Itai Gordon, Yakir Keisar, Ilan D. Prager +3 more |
2020-01-07 |
| 10397259 |
Cyber security event detection |
Allon Adir, Ehud Aharoni, Lev Greenberg, Rosa Miroshnikov, Boris Rozenberg |
2019-08-27 |
| 10171494 |
Scarecrow for data security |
Roza Miroshnikov, David Rozenblat |
2019-01-01 |
| 10171471 |
Evidence-based role based access control |
Ofer Haim Biller, Boris Rozenberg, David Rozenblat |
2019-01-01 |
| 9779254 |
Detection and prevention of sensitive information leaks |
Guy Galil, Leonid Gorelik, Alexander Pyasik, Yifat Yulevich |
2017-10-03 |
| 9734343 |
Detection and prevention of sensitive information leaks |
Guy Galil, Leonid Gorelik, Alexander Pyasik, Yifat Yulevich |
2017-08-15 |
| 9471797 |
Automatic role tuning in a computer system |
Ofer Haim Biller, Boris Rozenberg, David Rozenblat |
2016-10-18 |