| 11947694 |
Dynamic virtual honeypot utilizing honey tokens and data masking |
Galia Diamant, Chun-Shuo Lin, Wei-Hsiang Hsiung, Cheng-Ta Lee, Wei-Jie Liau |
2024-04-02 |
| 11847122 |
Unique SQL query transfer for anomaly detection |
Cheng-Ta Lee, Chun-Shuo Lin, Galia Diamant, Leonid Rodniansky |
2023-12-19 |
| 11562095 |
Reinforcing SQL transactions dynamically to prevent injection attacks |
Galia Diamant, Leonid Rodniansky, Cheng-Ta Lee, Chun-Shuo Lin |
2023-01-24 |
| 11502855 |
Certificate mirroring |
Mae Rockar, Galia Diamant |
2022-11-15 |
| 11481508 |
Data access monitoring and control |
Tania Butovsky, Leonid Rodniansky, Mikhail Shpak, Peter Maniatis, Shidong Shan |
2022-10-25 |
| 11334569 |
Unique SQL query transfer for anomaly detection |
Cheng-Ta Lee, Chun-Shuo Lin, Galia Diamant, Leonid Rodniansky |
2022-05-17 |
| 11283880 |
Termination of database connection |
Galia Diamant, Chun-Shuo Lin, Cheng-Ta Lee |
2022-03-22 |
| 11228607 |
Graceful termination of security-violation client connections in a network protection system (NPS) |
Leonid Rodniansky, Viktor Ginzburg, Galia Diamant |
2022-01-18 |
| 10742657 |
Accessing shared resources without system groups |
Paul S. Spencer, Galia Diamant |
2020-08-11 |
| 9069628 |
Spooling system call data to facilitate data transformation |
Ury Segal, Galia Diamant |
2015-06-30 |