Method and system for adaptive rule-based content scanners for desktop computers

M Rubin, M Matitya, A Melnick, S Touboul… - US Patent …, 2011 - Google Patents
(57) ABSTRACT A security system for Scanning content within a computer, including a
network interface, housed within a computer, for receiving content from the Internet on its …

Malicious mobile code runtime monitoring system and methods

YM Edery, NI Vered, DR Kroll, S Touboul - US Patent 8,677,494, 2014 - Google Patents
Protection systems and methods provide for protecting one or more personal computers
(“PCs”) and/or other intermittently or persistently network accessible devices or processes …

Malicious mobile code runtime monitoring system and methods

YM Edery, NI Vered, DR Kroll, S Touboul - US Patent 9,444,844, 2016 - Google Patents
Protection systems and methods provide for protecting one or more personal computers
(“PCs”) and/or other intermittently or persistently network accessible devices or processes …

Malicious mobile code runtime monitoring system and methods

YM Edery, NI Vered, DR Kroll, S Touboul - US Patent 7,647,633, 2010 - Google Patents
Protection systems and methods provide for protecting one or more personal computers
(“PCs”) and/or other intermittently or persistently network accessible devices or processes …

Method and system for protecting a computer and a network from hostile downloadables

YM Edery, NI Vered, DR Kroll, S Touboul - US Patent 7,613,926, 2009 - Google Patents
Protection systems and methods provide for protecting one or more personal computers
(“PCs”) and/or other intermittently or persistently network accessible devices or processes …

Recovering variability information from source code of clone-and-own software systems

A Schlie, S Schulze, I Schaefer - Proceedings of the 14th International …, 2020 - dl.acm.org
Clone-and-own prevails as an ad-hoc reuse strategy that addresses changing requirements
by copying and modifying existing system variants. Proper documentation is typically not …

Malicious mobile code runtime monitoring system and methods

S Touboul - US Patent 9,219,755, 2015 - Google Patents
Protection systems and methods provide for protecting one or more personal computers
(“PCs”) and/or other intermittently or persistently network accessible devices or processes …

Efficient deterministic finite automata minimization based on backward depth information

D Liu, Z Huang, Y Zhang, X Guo, S Su - PloS one, 2016 - journals.plos.org
Obtaining a minimal automaton is a fundamental issue in the theory and practical
implementation of deterministic finite automatons (DFAs). A minimization algorithm is …

[PDF][PDF] Minimization of Acyclic DFAs.

J Bubenzer - Stringology, 2011 - stringology.org
There exists a linear time algorithm for the minimization of acyclic deterministic finite-state
automata (ADFA) due to Dominique Revuz [17]. The algorithm has different phases …

Malicious mobile code runtime monitoring system and methods

YM Edery, NI Vered, DR Kroll, S Touboul - US Patent 9,141,786, 2015 - Google Patents
Protection systems and methods provide for protecting one or more personal computers
(“PCs”) and/or other intermittently or persistently network accessible devices or processes …