System and method for URL fetching retry mechanism

D Shribman, O Vilenski - US Patent 10,963,531, 2021 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
72239417&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

[PDF][PDF] A literature review on classification of phishing attacks

S Chanti, T Chithralekha - International Journal of Advanced …, 2022 - researchgate.net
Phishing is a type of security threat that loots users' personal credentials such as online
banking, credit card numbers, card verification value (CVV) numbers, automated teller …

System and method for improving content fetching by selecting tunnel devices

D Shribman, O Vilenski - US Patent 11,190,374, 2021 - Google Patents
H04L69/168—Implementation or adaptation of Internet protocol [IP], of transmission control
protocol [TCP] or of user datagram protocol [UDP] specially adapted for link layer protocols …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges

T Rathod, NK Jadav, S Tanwar, A Alabdulatif… - Information Processing …, 2025 - Elsevier
Social engineering attacks are inevitable and imperil the integrity, security, and
confidentiality of the information used on social media platforms. Prominent technologies …

System and method for improving content fetching by selecting tunnel devices

D Shribman, O Vilenski - US Patent 11,115,230, 2021 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
65525053&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

System and method for improving internet communication by using intermediate nodes

D Shribman, O Vilenski - US Patent 11,677,856, 2023 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
51483224&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

A novel approach to detect phishing attack using artificial neural networks combined with pharming detection

K Gajera, M Jangid, P Mehta… - 2019 3rd International …, 2019 - ieeexplore.ieee.org
Phishing is the most common yet a major cyber crime. In this fraudulent practice, the
perpetrator sends an e-mail to the target posing as a legitimate organization. This email …

System and method for improving content fetching by selecting tunnel devices

D Shribman, O Vilenski - US Patent 11,902,044, 2024 - Google Patents
A method for fetching a content from a web server to a client device is disclosed, using
tunnel devices serving as intermediate devices. The tunnel device is selected based on an …

System and method for managing non-direct URL fetching service

D Shribman, O Vilenski - US Patent 11,411,922, 2022 - Google Patents
the Internet is a global system of interconnected computer networks that use the
standardized Internet Protocol Suite (TCP/IP), including the Transmission Control Protocol …