| 12001310 |
Approximating activity loads in databases using smoothed time series |
Oded Sofer |
2024-06-04 |
| 11979421 |
Cluster-based outlier scoring of network traffic |
Yair Allouche, Aviad Cohen, Ravid Sagy, Eitan Farchi |
2024-05-07 |
| 11960599 |
Classifying users of a database |
Oded Sofer |
2024-04-16 |
| 11757837 |
Sensitive data identification in real time for data streaming |
Oded Sofer |
2023-09-12 |
| 11645337 |
Classification by optimizing regular expression rules |
Oded Sofer |
2023-05-09 |
| 11599442 |
Detecting abnormal database activity |
Oded Sofer |
2023-03-07 |
| 11196760 |
Detecting unauthorized user actions |
Oded Sofer |
2021-12-07 |
| 11055359 |
Hierarchical objects linkage data visualization |
Peter Bak, Rotem Blinder, Tal Daniel, Adir Even, Oded Sofer +1 more |
2021-07-06 |
| 10708282 |
Unauthorized data access detection based on cyber security images |
Rosa Miroshnikov, David Rozenblat, Oded Sofer |
2020-07-07 |
| 10681073 |
Detecting unauthorized user actions |
Oded Sofer |
2020-06-09 |
| 10171471 |
Evidence-based role based access control |
Oded Sofer, Boris Rozenberg, David Rozenblat |
2019-01-01 |
| 9471797 |
Automatic role tuning in a computer system |
Boris Rozenberg, David Rozenblat, Oded Sofer |
2016-10-18 |