| 12124572 |
Anomalous activity detection in container images |
Dotan Patrich, Josef Weizman, Eran Goldstein |
2024-10-22 |
| 11416613 |
Attack detection through exposure of command abuse |
Josef Weizman, Ram Haim Pliskin, Dotan Patrich |
2022-08-16 |
| 11223637 |
Detecting attacks on web applications using server logs |
Hani Hana Neuvirth, Ram Haim Pliskin, Josef Weizman, Karl William Reinsch, Efim Hudis |
2022-01-11 |
| 11196746 |
Whitelisting of trusted accessors to restricted web pages |
Omer Karin, Hani Hana Neuvirth, Dotan Patrich, Ram Haim Pliskin, Josef Weizman +1 more |
2021-12-07 |
| 11159542 |
Cloud view detection of virtual machine brute force attacks |
Tomer Weinberger, Hani Hana Neuvirth, Omer Karin |
2021-10-26 |
| 11089024 |
System and method for restricting access to web resources |
Dotan Patrich, Ram Haim Pliskin, Moshe Israel, Hani Hana Neuvirth, Josef Weizman |
2021-08-10 |
| 10887326 |
Distributed system for adaptive protection against web-service- targeted vulnerability scanners |
Josef Weizman, Ram Haim Pliskin, Hani Hana Neuvirth, Dotan Patrich |
2021-01-05 |
| 10581915 |
Network attack detection |
Mathias Scherman, Daniel Mark Edwards, Royi Ronen |
2020-03-03 |
| 10511615 |
Non-protocol specific system and method for classifying suspect IP addresses as sources of non-targeted attacks on cloud based machines |
Royi Ronen, Hani Hana Neuvirth, Omer Karin |
2019-12-17 |
| 10447525 |
Validating correlation between chains of alerts using cloud view |
Dotan Patrich, Mathias Scherman |
2019-10-15 |