Dynamic cybersecurity detection of sequence anomalies N Kraus, R Levin, A Karpovsky, T Salman US Patent 11,106,789, 2021 | 227 | 2021 |
Data security classification sampling and labeling N Kraus, T Salman, S Bashir US Patent 11,704,431, 2023 | 36 | 2023 |
Test data generation utilizing analytics R Levy, T Salman US Patent 9,836,389, 2017 | 31 | 2017 |
Using call stack snapshots to detect anomalous computer behavior R Peleg, A Ronen, T Salman, S Regev, E Aharoni US Patent 9,817,971, 2017 | 26 | 2017 |
Adaptive severity functions for alerts Y Livny, T Salman US Patent 11,756,404, 2023 | 24 | 2023 |
Method, system and product for using a predictive model to predict if inputs reach a vulnerability of a program F Copty, A Jarrous, S Keidar-Barner, T Salman US Patent 10,387,655, 2019 | 21 | 2019 |
Automatic generation of security rules for network micro and nano segmentation T Salman, B Kliger, B AbuJaber US Patent 11,005,893, 2021 | 15 | 2021 |
Transaction authentication based on metadata O Edelstein, S Keidar-Barner, T Salman US Patent 10,380,590, 2019 | 15 | 2019 |
Method and apparatus for generating questions A Adir, I Jaeger, R Levy, T Salman US Patent App. 13/360,808, 2013 | 14 | 2013 |
Quantum set intersection and its application to associative memory T Salman, Y Baram The Journal of Machine Learning Research 13 (1), 3177-3206, 2012 | 14 | 2012 |
Intercepting sensitive data using hashed candidates A Farkash, A Jarrous, M Moffie, G Peretz, T Salman US Patent 10,360,402, 2019 | 13 | 2019 |
Unit-level formal verification for vehicular software systems A Adir, F Copty, D Pidan, T Salman US Patent 9,588,877, 2017 | 13 | 2017 |
Dynamic test data generation for data intensive applications A Adir, R Levy, T Salman Haifa Verification Conference, 219-233, 2011 | 12 | 2011 |
Protecting computer code against ROP attacks E Farchi, A Jarrous, T Salman US Patent 10,223,527, 2019 | 9 | 2019 |
Unit-level formal verification for vehicular software systems A Adir, F Copty, D Pidan, T Salman US Patent 9,870,313, 2018 | 9 | 2018 |
Identifying malicious activities from system execution traces E Aharoni, R Peleg, S Regev, T Salman IBM Journal of Research and Development 60 (4), 5: 1-5: 7, 2016 | 7 | 2016 |
Dimensionality reduction based on functionality F Copty, A Jarrous, T Salman, M Shudrak US Patent 11,295,013, 2022 | 6 | 2022 |
Feature vector aggregation for malware detection F Copty, C Eisner, D Murik, T Salman US Patent 10,657,257, 2020 | 6 | 2020 |
Rule guided fabrication of structured data and messages A Bitar, O Blinder, R Levy, T Salman US Patent App. 14/983,807, 2017 | 6 | 2017 |
Database table data fabrication A Bitar, O Blinder, R Levy, T Salman US Patent 10,031,936, 2018 | 5 | 2018 |