| 11533240 |
Automatic recommendations for deployments in a data center |
Efim Hudis, Hani Hana Neuvirth, Royi Ronen, Yair Tor, Gilad Elyashar |
2022-12-20 |
| 10771492 |
Enterprise graph method of threat detection |
Efim Hudis, Michal Braverman-Blumenstyk, Hani Hana Neuvirth, Royi Ronen, Yuri Gurevich |
2020-09-08 |
| 10534925 |
Detection of compromised devices via user states |
Moshe Israel, Royi Ronen, Tomer Teller, Hanan Shteingart |
2020-01-14 |
| 10402244 |
Detection of abnormal resource usage in a data center |
Hani Neuvirth-Telem, Amit Hilbuch, Shay Nahum, Yehuda Finkelstein, Elad Yom-Tov |
2019-09-03 |
| 10397256 |
Spam classification system based on network flow data |
Ori Kashi, Philip Newman, Elad Yom-Tov, Hani Hana Neuvirth, Royi Ronen |
2019-08-27 |
| 9665460 |
Detection of abnormal resource usage in a data center |
Hani Neuvirth-Telem, Amit Hilbuch, Shay Nahum, Yehuda Finkelstein, Elad Yom-Tov |
2017-05-30 |
| 9111079 |
Trustworthy device claims as a service |
Eugene (John) Neystadt, Yair Tor, Mark F. Novak, Khaja E. Ahmed, Yoav Yassour |
2015-08-18 |
| 8528069 |
Trustworthy device claims for enterprise applications |
Mark F. Novak, Yair Tor, Eugene (John) Neystadt, Yoav Yassour, Alexey Efron +2 more |
2013-09-03 |