122 patents
Page 7 of 7
Utility
Techniques for detecting compromises of enterprise end stations utilizing noisy tokens
4 Nov 19
Noisy tokens can be placed in locations of client end stations such that local operations performed upon the noisy tokens generate network traffic.
Amichai Shulman, Sagie Dulce
Filed: 6 Nov 16
Utility
Detecting Attacks on Databases Based on Transaction Characteristics Determined from Analyzing Database Logs
9 Oct 19
A method by a security system implemented by one or more electronic for detecting attacks on one or more databases.
Shiri MARGEL, Itsik MANTIN, Guy SHTAR, Yury GEILER
Filed: 30 May 18