| 11652852 |
Intrusion detection and mitigation in data processing |
Alexandra Shulman-Peleg, Shmuel Regev, Shahar Kohanim, Zohar Basil |
2023-05-16 |
| 10965717 |
Intrusion detection and mitigation in data processing |
Alexandra Shulman-Peleg, Shmuel Regev, Shahar Kohanim, Zohar Basil |
2021-03-30 |
| 10560487 |
Intrusion detection and mitigation in data processing |
Alexandra Shulman-Peleg, Shmuel Regev, Shahar Kohanim, Zohar Basil |
2020-02-11 |
| 10467394 |
Pointing device biometrics for continuous user authentication |
David Asulin, Oded Margalit, Shmulik Regev, Alexandra Shulman-Peleg |
2019-11-05 |
| 9881156 |
Detecting heap spraying on a computer |
Zohar Basil, Amit Klein, Shmuel Regev |
2018-01-30 |
| 9842206 |
Using call stack snapshots to detect anomalous computer behavior |
Amir Ronen, Tamer Salman, Shmuel Regev, Ehud Aharoni |
2017-12-12 |
| 9817971 |
Using call stack snapshots to detect anomalous computer behavior |
Amir Ronen, Tamer Salman, Shmuel Regev, Ehud Aharoni |
2017-11-14 |
| 9372990 |
Detecting heap spraying on a computer |
Zohar Basil, Amit Klein, Shmuel Regev |
2016-06-21 |