Personal sensory drones G Raffa, GJ Anderson, LM Durham, R Beckwith, K Yuen, J Ekandem, ... US Patent 10,694,155, 2020 | 161 | 2020 |
Rootkit detection by using HW resources to detect inconsistencies in network traffic O Ben-Shalom, A Nayshtut, I Muttik US Patent 9,197,654, 2015 | 156 | 2015 |
Device, system and method of multicast/broadcast communication EH Qi, O Ben-Shalom, I Tchigevsky US Patent App. 11/476,828, 2008 | 107 | 2008 |
Secure cloud storage and encryption management system A Nayshtut, EV Jimison, O Ben-Shalom, M Raziel US Patent 9,246,678, 2016 | 97 | 2016 |
Personal sensory drones G Raffa, GJ Anderson, LM Durham, R Beckwith, K Yuen, J Ekandem, ... US Patent 11,076,134, 2021 | 54 | 2021 |
Network security elements using endpoint resources O Ben-Shalom, U Blumenthal US Patent 8,949,986, 2015 | 54 | 2015 |
System and method for performing secure communications O Ben-Shalom, A Nayshtut, EV Jimison, A Eldar, A Shaliv US Patent 8,832,783, 2014 | 53 | 2014 |
Techniques for integrated endpoint and network detection and eradication of attacks O Ben-Shalom, I Muttik, A Nayshtut, Y Avidan US Patent 10,469,524, 2019 | 45 | 2019 |
Methods and apparatus to securely share data NM Smith, O Ben-Shalom, A Nayshtut US Patent 9,411,975, 2016 | 42 | 2016 |
Enabling client QoS middle layer based on application recognition O Barkay, O Ben-Shalom US Patent App. 11/444,889, 2007 | 39 | 2007 |
On the structure and application of BGP policy Atoms Y Afek, O Ben-Shalom, A Bremler-Barr Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 209-214, 2002 | 38 | 2002 |
Supervised online identity A Nayshtut, O Ben-Shalom, H Li US Patent 9,614,857, 2017 | 37 | 2017 |
Systems and methods for avoiding interference for a peer-to-peer network connection O Barkay, O Ben-Shalom US Patent 9,565,684, 2017 | 33 | 2017 |
Facilitating varied access based on authentication scoring N Smith, K Shippy, T Kohlenberg, M Dave, O Ben-Shalom, M Mian US Patent 8,955,045, 2015 | 32 | 2015 |
Virtual machine networking using wireless bridge emulation I Tchigevsky, O Ben-Shalom US Patent App. 11/355,829, 2007 | 31 | 2007 |
Peer-to-peer group vigilance O Ben-Shalom, A Nayshtut, O Pogorelik, I Muttik US Patent 10,027,717, 2018 | 29 | 2018 |
Data mining algorithms adopted for trusted execution environment Y Avidan, A Nayshtut, I Muttik, O Ben-Shalom US Patent 10,382,454, 2019 | 27 | 2019 |
Method and apparatus for cloud-assisted cryptography A Nayshtut, O Ben-Shalom, NM Smith, EV Jimison, HM Khosravi US Patent 9,503,433, 2016 | 26 | 2016 |
Method and apparatus for maintaining trusted time at a client computing device A Nayshtut, O Ben-Shalom, A Bailey, A Shaliv US Patent App. 13/631,908, 2014 | 24 | 2014 |
Periodic platform based web session re-validation A Nayshtut, O Ben-Shalom US Patent App. 13/527,371, 2013 | 24 | 2013 |