| 12265618 |
System and method for efficient malicious code detection and malicious open-source software package detection using large language models |
Eli Shalom, Idan Plotnik, Yonatan Eldar |
2025-04-01 |
| 11818228 |
Establishing user's presence on internal on-premises network over time using network signals |
Tal Arieh Be'ery, Itai Grady, Tom Jurgenson, Idan Plotnik, Sivan Krigsman +1 more |
2023-11-14 |
| 11743265 |
Method and system for delegating control in network connection access rules using multi-factor authentication (MFA) |
Benny Lakunishok, Yossef Jossef Harush |
2023-08-29 |
| 11012433 |
Method and system for modifying network connection access rules using multi-factor authentication (MFA) |
Benny Lakunishok, Yossef Jossef Harush |
2021-05-18 |
| 10333944 |
Detecting impossible travel in the on-premise settings |
Tom Jurgenson, Sivan Krigsman, Michael Dubinsky, Tal Arieh Be'ery, Idan Plotnik |
2019-06-25 |
| 10333953 |
Anomaly detection in dynamically evolving data and systems |
Amir Averbuch, Ronald R. Coifman |
2019-06-25 |
| 10298699 |
Physical location determination of internal network components |
Tom Jurgenson, Tal Arieh Be'ery, Idan Plotnik, Michael Dubinsky, Sivan Krigsman |
2019-05-21 |
| 10187409 |
Anomaly detection in dynamically evolving data and systems |
Amir Averbuch, Ronald R. Coifman |
2019-01-22 |
| 10148639 |
Distinguishing vertical brute force attacks from benign errors |
Idan Plotnik, Michael Dolinsky, Sivan Krigsman, Tal Arieh Be'ery, Marina Simakov |
2018-12-04 |
| 9843596 |
Anomaly detection in dynamically evolving data and systems |
Amir Averbuch, Ronald R. Coifman |
2017-12-12 |
| 8355998 |
Clustering and classification via localized diffusion folders |
Amir Averbuch, Ronald R. Coifman |
2013-01-15 |
| 8225402 |
Anomaly-based detection of SQL injection attacks |
Amir Averbuch, Aviram Shmueli |
2012-07-17 |