| 12380223 |
Techniques for risk and constraint-based inspection |
Ami Luttwak, Yaniv Shaked, Shahar Rand, Eric Abramov, Yinon COSTICA |
2025-08-05 |
| 12261877 |
Detecting malware infection path in a cloud computing environment utilizing a security graph |
Yaniv Shaked, Alon SCHINDEL, Roy REZNIK, Ami Luttwak |
2025-03-25 |
| 12219053 |
Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity |
Shahar Rand, Eric Abramov, Yaniv Shaked |
2025-02-04 |
| 12081656 |
Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity |
Shahar Rand, Eric Abramov, Yaniv Shaked |
2024-09-03 |
| 12010139 |
Detecting malware infection path in a cloud computing environment utilizing a security graph |
Yaniv Shaked, Alon SCHINDEL, Roy REZNIK, Ami Luttwak |
2024-06-11 |
| 11706252 |
Detecting malware infection path in a cloud computing environment utilizing a security graph |
Yaniv Shaked, Alon SCHINDEL, Roy REZNIK, Ami Luttwak |
2023-07-18 |