| 12430423 |
Automated generation of labeled training data |
Amos Zamir, Yair Allouche, Aviad Cohen |
2025-09-30 |
| 11979421 |
Cluster-based outlier scoring of network traffic |
Yair Allouche, Aviad Cohen, Ofer Haim Biller, Eitan Farchi |
2024-05-07 |
| 11546366 |
Threat information sharing based on blockchain |
Yair Allouche, Oded Margalit, Tom Weiss |
2023-01-03 |
| 10671733 |
Policy enforcement via peer devices using a blockchain |
Ronald B. Baker |
2020-06-02 |
| 10652256 |
Real-time active threat validation mechanism for vehicle computer systems |
Yair Allouche, Arndt Kohler, Yaron Wolfsthal |
2020-05-12 |
| 10628610 |
Identifying stolen databases |
Oded Margalit |
2020-04-21 |
| 10474843 |
Identifying stolen databases |
Oded Margalit |
2019-11-12 |
| 10068017 |
Stream recognition and filtering |
Norberto Meijome, David Elkind, Kevin Bermeister |
2018-09-04 |
| 10017155 |
Cross correlation between connected vehicles and other online devices |
Yair Allouche, Oded Margalit |
2018-07-10 |
| 10011248 |
Cross correlation between connected vehicles and other online devices |
Yair Allouche, Oded Margalit |
2018-07-03 |
| 9900775 |
On-device authorization of devices for collaboration and association |
Yossi Gilad, Ayman Jarrous, Alexandra Shulman-Peleg |
2018-02-20 |
| 9703869 |
Stream recognition and filtering |
Norberto Meijome |
2017-07-11 |
| 8417942 |
System and method for identifying encrypted conference media traffic |
Chris Dunn, Jawhny Cooke, Zaheer Aziz |
2013-04-09 |
| 7996520 |
Behavioral classification of communication sessions using active session initiation |
Ofer Weil, Ido Feldman |
2011-08-09 |
| 7948910 |
Monitoring quality of a packet flow in packet-based communication networks |
Yuki Arbel, Michael F. Keohane, Oren Shemesh, Clarence Filsfils |
2011-05-24 |
| 7697423 |
Prevention of protocol imitation in peer-to-peer systems |
— |
2010-04-13 |
| 7660889 |
Initialization and acquisition of peers in a peers' list in a peer-to-peer network |
Rony Gotesdyner |
2010-02-09 |
| 7433325 |
NAT and proxy device detection |
Oren Shemesh |
2008-10-07 |