| 12432252 |
Method and system for predicting malicious entities |
Yoni Zukerman, Idan BELAIEV, Dror Cohen, Miriam Weissler |
2025-09-30 |
| 12289321 |
Automated generation and deployment of honey tokens in provisioned resources on a remote computer resource platform |
Tomer Weinberger, Yaniv Zohar, Craig A. Nelson, Andrew Johnson |
2025-04-29 |
| 12026253 |
Determination of likely related security incidents |
Dawn Antonette Burns |
2024-07-02 |
| 11991201 |
Likelihood assessment for security incident alerts |
Ishai Wertheimer, Ely Abramovitch, Yaron David Fruchtmann, Amir KEREN |
2024-05-21 |
| 11888870 |
Multitenant sharing anomaly cyberattack campaign detection |
Yaakov Garyani, Moshe Israel, Ely Abramovitch, Amir KEREN, Timothy William Burrell |
2024-01-30 |
| 11652833 |
Detection of anomalous count of new entities |
Dawn Antonette Burns, Andrey KARPOVSKY, Yotam Livny |
2023-05-16 |
| 11533240 |
Automatic recommendations for deployments in a data center |
Efim Hudis, Daniel Alon, Royi Ronen, Yair Tor, Gilad Elyashar |
2022-12-20 |
| 11405413 |
Anomaly lookup for cyber security hunting |
Gueorgui Chkodrov, Dotan Patrich, Elad Yom-Tov, Dawn Antonette Burns, Yotam Livny |
2022-08-02 |
| 11290473 |
Automatic generation of detection alerts |
Owen Joseph Davis, Scott Elliott Gorlick, Gueorgui Chkodrov, Yotam Livny, Dawn Antonette Burns +2 more |
2022-03-29 |
| 11223637 |
Detecting attacks on web applications using server logs |
Ram Haim Pliskin, Tomer Koren, Josef Weizman, Karl William Reinsch, Efim Hudis |
2022-01-11 |
| 11212298 |
Automated onboarding of detections for security operations center monitoring |
Dawn Antonette Burns |
2021-12-28 |
| 11196746 |
Whitelisting of trusted accessors to restricted web pages |
Omer Karin, Dotan Patrich, Tomer Koren, Ram Haim Pliskin, Josef Weizman +1 more |
2021-12-07 |
| 11159542 |
Cloud view detection of virtual machine brute force attacks |
Tomer Weinberger, Tomer Koren, Omer Karin |
2021-10-26 |
| 11089024 |
System and method for restricting access to web resources |
Dotan Patrich, Ram Haim Pliskin, Tomer Koren, Moshe Israel, Josef Weizman |
2021-08-10 |
| 11038913 |
Providing context associated with a potential security issue for an analyst |
Sangeetha MADDERLA, Larry J. Matuska, William K. Hollis, Gueorgui Chkodrov, Yotam Livny |
2021-06-15 |
| 10922405 |
Data generation for data protection |
Elad Yom-Tov, Ron Matchoro, Nir Rosenfeld |
2021-02-16 |
| 10887326 |
Distributed system for adaptive protection against web-service- targeted vulnerability scanners |
Josef Weizman, Tomer Koren, Ram Haim Pliskin, Dotan Patrich |
2021-01-05 |
| 10771492 |
Enterprise graph method of threat detection |
Efim Hudis, Michal Braverman-Blumenstyk, Daniel Alon, Royi Ronen, Yuri Gurevich |
2020-09-08 |
| 10511615 |
Non-protocol specific system and method for classifying suspect IP addresses as sources of non-targeted attacks on cloud based machines |
Royi Ronen, Tomer Koren, Omer Karin |
2019-12-17 |
| 10397256 |
Spam classification system based on network flow data |
Ori Kashi, Philip Newman, Daniel Alon, Elad Yom-Tov, Royi Ronen |
2019-08-27 |
| 10237300 |
System and method for detecting directed cyber-attacks targeting a particular set of cloud based machines |
Jonathan Gazit, Moshe Israel |
2019-03-19 |
| 10129295 |
Clustering approach for detecting DDoS botnets on the cloud from IPFix data |
Omer Karin, Royi Ronen, Roey Vilnai |
2018-11-13 |
| 8140476 |
Statistical quality monitoring and enhancement |
Ehud Aharoni, Saharon Rosset |
2012-03-20 |