EH

Efim Hudis

Microsoft: 44 patents #430 of 40,388Top 2%
📍 Bellevue, WA: #206 of 6,950 inventorsTop 3%
🗺 Washington: #1,405 of 76,902 inventorsTop 2%
Overall (All Time): #67,755 of 4,157,543Top 2%
44
Patents All Time

Issued Patents All Time

Showing 26–44 of 44 patents

Patent #TitleCo-InventorsDate
8839419 Distributive security investigation Yair Helman, Tomer Weisberg, Oren Yossef, Ziv Rafalovich 2014-09-16
8812411 Domains for knowledge-based data quality solution Joseph Malka, Elad Ziklik, Meir Raviv, Gadi Peleg, David Faibish 2014-08-19
8719236 Selecting candidate rows for deduplication Yaron Zinar, Yifat Orlin, Gal Novik, Yuri Gurevich, Gad Peleg 2014-05-06
8689335 Mapping between users and machines in an enterprise security assessment sharing system Yair Helman, Lior Arzi 2014-04-01
8677479 Detection of adversaries through collection and correlation of assessments John Neystadt 2014-03-18
8538934 Contextual gravitation of datasets and data services Christopher Eakins 2013-09-17
8516576 Network intrusion detection with distributed correlation Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Jennifer LeMond, Robert Eric Fitzgerald +3 more 2013-08-20
8516583 Aggregating the knowledge base of computer systems to proactively protect a computer from malware Anil Thomas, Michael Kramer, Mihai Costea, Pradeep Bahl, Rajesh Dadhia +1 more 2013-08-20
8510276 Comparing and selecting data cleansing service providers Neta Haiby, Elad Ziklik, Gad Peleg 2013-08-13
8490187 Controlling malicious activity detection using behavioral models Shai Rubin, Yosef Dinerstein, Yair Helman, Uri Barash, Arie Friedman 2013-07-16
8424094 Automated collection of forensic evidence associated with a network security incident John Neystadt, Yair Helman, Alexandra Faynburd 2013-04-16
8413247 Adaptive data collection for root-cause analysis and intrusion detection Yair Helman, Joseph Malka, Uri Barash 2013-04-02
8296178 Services using globally distributed infrastructure for secure content management Yigal Edery, Oleg Ananiev, John Wohlfert, Nir Nice 2012-10-23
8181250 Personalized honeypot for detecting information leaks and security breaches Ziv Rafalovich, Lior Arzi, Ron Karidi 2012-05-15
8136164 Manual operations in an enterprise security assessment sharing system Yair Helman 2012-03-13
8117659 Malicious code infection cause-and-effect analysis Gregory D. Hartrell, David Steeves 2012-02-14
8095979 Analysis of event information to perform contextual audit Ellen McDermott 2012-01-10
7953969 Reduction of false positive reputations through collection of overrides from customer deployments John Neystadt 2011-05-31
7882542 Detecting compromised computers by correlating reputation data with web access logs John Neystadt, Yair Helman, Alexandra Faynburd 2011-02-01