Issued Patents All Time
Showing 25 most recent of 49 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12405840 | Estimating and improving residual carbon debt in cloud-based applications | Benny Rochwerger | 2025-09-02 |
| 12355798 | Automated prioritization of cyber risk mitigation by simulating exploits | Gal Engelberg, Dan Klein, Asher Genachowski | 2025-07-08 |
| 12289336 | Ontology-based risk propagation over digital twins | Gal Engelberg, Dan Klein, Adrian Kuboszek | 2025-04-29 |
| 12235995 | System architecture for designing and monitoring privacy-aware services | Dan Klein, Benny Rochwerger | 2025-02-25 |
| 11907407 | Generating attack graphs in agile security platforms | Amin Hassanzadeh, Anup Nayak | 2024-02-20 |
| 11880250 | Optimizing energy consumption of production lines using intelligent digital twins | Gal Engelberg, Laura Mosconi, Stefano Giacco | 2024-01-23 |
| 11838310 | Generating attack graphs in agile security platforms | Amin Hassanzadeh, Lisa O'Connor | 2023-12-05 |
| 11822702 | Generating attack graphs in agile security platforms | Amin Hassanzadeh, Dani Grabois, Gil Fidel, Avraham Dayan | 2023-11-21 |
| 11811816 | Generating attack graphs in agile security platforms | Amin Hassanzadeh, Dani Grabois, Gil Fidel | 2023-11-07 |
| 11757921 | Leveraging attack graphs of agile security platform | Dani Grabois, Asher Genachowski | 2023-09-12 |
| 11750657 | Cyber digital twin simulator for security controls requirements | Alexander Basovskiy, Dmitry Kravchenko, Dan Klein | 2023-09-05 |
| 11695795 | Evaluating effectiveness of security controls in enterprise networks using graph values | Dani Grabois | 2023-07-04 |
| 11483213 | Enterprise process discovery through network traffic patterns | Gal Engelberg, Avraham Dayan, Moshe Hadad | 2022-10-25 |
| 11283825 | Leveraging attack graphs of agile security platform | Dani Grabois, Asher Genachowski | 2022-03-22 |
| 11281806 | Generating attack graphs in agile security platforms | Amin Hassanzadeh, Dani Grabois, Gil Fidel, Avraham Dayan | 2022-03-22 |
| 11232235 | Generating attack graphs in agile security platforms | Amin Hassanzadeh, Anup Nayak | 2022-01-25 |
| 11184385 | Generating attack graphs in agile security platforms | Amin Hassanzadeh, Dani Grabois, Gil Fidel | 2021-11-23 |
| 11159555 | Generating attack graphs in agile security platforms | Amin Hassanzadeh, Lisa O'Connor | 2021-10-26 |
| 11138312 | Cyber range integrating technical and non-technical participants, participant substitution with AI bots, and AI bot training | Daniel Grabois, Naomi Golad, Elad Tapiero | 2021-10-05 |
| 10754939 | System and method for continuous authentication using augmented reality and three dimensional object recognition | Ariel Farkash, Amnon Ribak | 2020-08-25 |
| 10339007 | Agile re-engineering of information systems | Kieron John James Connelly, Olga Lagunova, Mitchell Edward Engel, Peter Anthony Lazzaro | 2019-07-02 |
| 9952958 | Using patterns and anti-patterns to improve system performance | Kieron John James Connelly, Olga Lagunova, Peter Anthony Lazzaro | 2018-04-24 |
| 9626526 | Trusted public infrastructure grid cloud | Michael Kletskin, Nir Barak, Amir Jerbi, Yaacov Bezalel | 2017-04-18 |
| 9589239 | Recommending alternatives for providing a service | Jason Davis | 2017-03-07 |
| 9577894 | System and method for codification and representation of situational and complex application behavioral patterns | Irit Hadar | 2017-02-21 |