| 9536087 |
Controlling malicious activity detection using behavioral models |
Shai Rubin, Yosef Dinerstein, Efim Hudis, Uri Barash, Arie Friedman |
2017-01-03 |
| 9098702 |
Controlling malicious activity detection using behavioral models |
Shai Rubin, Yosef Dinerstein, Efim Hudis, Uri Barash, Arie Friedman |
2015-08-04 |
| 8990947 |
Analytics engine |
Efim Hudis, Eyal Zangi, Moshe Sapir, Tomer Weisberg, Shai Rubin +2 more |
2015-03-24 |
| 8959568 |
Enterprise security assessment sharing |
Efim Hudis, Joseph Malka, Uri Barash |
2015-02-17 |
| 8955105 |
Endpoint enabled for enterprise security assessment sharing |
Efim Hudis, Joseph Malka, Uri Barash |
2015-02-10 |
| 8839419 |
Distributive security investigation |
Efim Hudis, Tomer Weisberg, Oren Yossef, Ziv Rafalovich |
2014-09-16 |
| 8689335 |
Mapping between users and machines in an enterprise security assessment sharing system |
Efim Hudis, Lior Arzi |
2014-04-01 |
| 8490187 |
Controlling malicious activity detection using behavioral models |
Shai Rubin, Yosef Dinerstein, Efim Hudis, Uri Barash, Arie Friedman |
2013-07-16 |
| 8424094 |
Automated collection of forensic evidence associated with a network security incident |
John Neystadt, Efim Hudis, Alexandra Faynburd |
2013-04-16 |
| 8413247 |
Adaptive data collection for root-cause analysis and intrusion detection |
Efim Hudis, Joseph Malka, Uri Barash |
2013-04-02 |
| 8402546 |
Estimating and visualizing security risk in information technology systems |
Adar Greenshpon, Ron Karidi, Shai Rubin |
2013-03-19 |
| 8136164 |
Manual operations in an enterprise security assessment sharing system |
Efim Hudis |
2012-03-13 |
| 7882542 |
Detecting compromised computers by correlating reputation data with web access logs |
John Neystadt, Efim Hudis, Alexandra Faynburd |
2011-02-01 |
| 6505190 |
Incremental filtering in a persistent query system |
Dov Harel, Uri Barash |
2003-01-07 |