| 12386983 |
Data policies for online services |
Arie Friedman, Hadas Bitran, Marc E. Davis, Oded Nahir |
2025-08-12 |
| 10853505 |
Data policies for online services |
Arie Friedman, Hadas Bitran, Marc E. Davis, Oded Nahir |
2020-12-01 |
| 10216734 |
Complementary and shadow calendars |
Shira Weinberg, Haim Somech, Scott V. Fynn, Colleen Elizabeth Hamilton, Robert J. Howard |
2019-02-26 |
| 10089310 |
Complementary and shadow calendars |
Shira Weinberg, Haim Somech, Scott V. Fynn, Colleen Elizabeth Hamilton, Robert J. Howard |
2018-10-02 |
| 9536087 |
Controlling malicious activity detection using behavioral models |
Shai Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Arie Friedman |
2017-01-03 |
| 9098702 |
Controlling malicious activity detection using behavioral models |
Shai Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Arie Friedman |
2015-08-04 |
| 8983859 |
User centric real-time advertisement bidding |
Nir Nice, Ying Li, Michael Goldbach, William H. Gates, III |
2015-03-17 |
| 8959568 |
Enterprise security assessment sharing |
Efim Hudis, Yair Helman, Joseph Malka |
2015-02-17 |
| 8955105 |
Endpoint enabled for enterprise security assessment sharing |
Efim Hudis, Yair Helman, Joseph Malka |
2015-02-10 |
| 8490187 |
Controlling malicious activity detection using behavioral models |
Shai Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Arie Friedman |
2013-07-16 |
| 8413247 |
Adaptive data collection for root-cause analysis and intrusion detection |
Efim Hudis, Yair Helman, Joseph Malka |
2013-04-02 |
| 8312273 |
Privacy vault for maintaining the privacy of user profiles |
Nir Nice, Melissa W. Dunn, Eric Picard, Amit Shaked, Eric Don Van Valkenburg +10 more |
2012-11-13 |
| 6505190 |
Incremental filtering in a persistent query system |
Dov Harel, Yair Helman |
2003-01-07 |