| 12411825 |
Expanding database column names |
Yehoshua Sagron, Ariel Farkash, Igor Gokhman, Micha Moffie |
2025-09-09 |
| 11763132 |
Detecting non-anomalous and anomalous sequences of computer-executed operations |
Guy Lev, Yehoshua Sagron |
2023-09-19 |
| 10831785 |
Identifying security breaches from clustering properties |
Allon Adir, Ehud Aharoni, Lev Greenberg, Oded Margalit, Rosa Miroshnikov +1 more |
2020-11-10 |
| 10831869 |
Method for watermarking through format preserving encryption |
Abigail Goldsteen, Lev Greenberg, Ariel Farkash, Omri Soceanu |
2020-11-10 |
| 10397259 |
Cyber security event detection |
Allon Adir, Ehud Aharoni, Lev Greenberg, Rosa Miroshnikov, Oded Sofer |
2019-08-27 |
| 10171471 |
Evidence-based role based access control |
Ofer Haim Biller, Oded Sofer, David Rozenblat |
2019-01-01 |
| 9722780 |
Complex format-preserving tokenization scheme |
Muhammad Barham, Ariel Farkash |
2017-08-01 |
| 9699145 |
Masking data within JSON-type documents |
Ron Ben-Natan, Tamar Domany, Ariel Farkash, Igor Gorkhman, Abigail Goldsteen |
2017-07-04 |
| 9634838 |
Complex format-preserving encryption scheme |
Mor Weiss |
2017-04-25 |
| 9471797 |
Automatic role tuning in a computer system |
Ofer Haim Biller, David Rozenblat, Oded Sofer |
2016-10-18 |
| 8966359 |
Web application content mapping |
Igor Gokhman |
2015-02-24 |
| 8898796 |
Managing network data |
Ron Ben-Natan, Tamar Domany, Ariel Farkash, Igor Gokhman, Abigail Goldsteen +3 more |
2014-11-25 |
| 8332944 |
System and method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences |
Ehud Gudes, Yuval Elovici |
2012-12-11 |
| 7941853 |
Distributed system and method for the detection of eThreats |
Ehud Gudes, Yuval Elovici |
2011-05-10 |