| 12254095 |
Data-flow analysis for computing systems deploying multiple software applications |
Ben Kliger |
2025-03-18 |
| 11783049 |
Automated code analysis tool |
Gal Malka, Pnina Weiss, Efim Hudis |
2023-10-10 |
| 11556630 |
Private password constraint validation |
Gal Malka |
2023-01-17 |
| 11429724 |
Machine learning detection of unused open ports |
Moshe Israel, Ben Kliger, Yotam Livny |
2022-08-30 |
| 11388163 |
Least-privilege resource permission management |
Gal Malka |
2022-07-12 |
| 11297086 |
Correlation-based network security |
Moshe Israel |
2022-04-05 |
| 11263544 |
Similarity based approach for clustering and accelerating multiple incidents investigation |
Yotam Livny, Roy Levin, Ram Haim Pliskin, Ben Kliger, Mathias Abraham Marc Scherman +1 more |
2022-03-01 |
| 11184359 |
Automated access control policy generation for computer resources |
Ben Kliger, Yotam Livny, Ram Haim Pliskin, Roy Levin, Mathias Abraham Marc Scherman +1 more |
2021-11-23 |
| 10944791 |
Increasing security of network resources utilizing virtual honeypots |
Yotam Livny, Mathias Abraham Marc Scherman, Moshe Israel, Ben Kliger, Ram Haim Pliskin +1 more |
2021-03-09 |
| 10911479 |
Real-time mitigations for unfamiliar threat scenarios |
Ben Kliger, Moshe Israel, Dotan Patrich |
2021-02-02 |
| 10848463 |
Listen mode for machine whitelisting mechanisms |
Yotam Livny, Moshe Israel |
2020-11-24 |
| 10826756 |
Automatic generation of threat remediation steps by crowd sourcing security solutions |
Ben Kliger, Moshe Israel, Dotan Patrich |
2020-11-03 |
| 10778645 |
Firewall configuration manager |
Ben Kliger, Gilad Elyashar, Moshe Israel |
2020-09-15 |
| 10623374 |
Automatic network identification for enhanced communications administration |
Moshe Israel, Ben Kliger |
2020-04-14 |