| 12032601 |
Using access logs for network entities type classification |
Yury GEILER |
2024-07-09 |
| 11750627 |
Insider threat detection utilizing user group to data object and/or resource group access analysis |
Guy Shtar |
2023-09-05 |
| 11537734 |
Detecting attacks on databases based on transaction characteristics determined from analyzing database logs |
Itsik Mantin, Guy Shtar, Yury GEILER |
2022-12-27 |
| 11470110 |
Identifying and classifying community attacks |
Amit Leibovitz |
2022-10-11 |
| 11436358 |
Data based web application firewall |
Itsik Mantin, Amichai Shulman, Daniella Goihman-Shuster |
2022-09-06 |
| 11328076 |
Community-based data security |
Doron TZUR, Itsik Mantin |
2022-05-10 |
| 11301496 |
Using access logs for network entities type classification |
Yury GEILER |
2022-04-12 |
| 11146573 |
Insider threat detection utilizing user group to data object and/or resource group access analysis |
Guy Shtar |
2021-10-12 |
| 10803192 |
Detecting attacks on databases based on transaction characteristics determined from analyzing database logs |
Itsik Mantin, Guy Shtar, Yury GEILER |
2020-10-13 |
| 10771496 |
Insider threat detection utilizing user group data object access analysis |
Guy Shtar |
2020-09-08 |
| 10404712 |
Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets |
Itsik Mantin, Amichai Shulman |
2019-09-03 |
| 10382400 |
Techniques for preventing large-scale data breaches utilizing differentiated protection layers |
Itsik Mantin, Amichai Shulman |
2019-08-13 |
| 9674201 |
Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets |
Itsik Mantin, Amichai Shulman |
2017-06-06 |
| 9674202 |
Techniques for preventing large-scale data breaches utilizing differentiated protection layers |
Itsik Mantin, Amichai Shulman |
2017-06-06 |