Method of remediating operations performed by a program and system thereof
A Cohen, T Weingarten, S Salem, N Izraeli… - US Patent …, 2022 - Google Patents
There is provided a method for generating a representation for behavior similarity
comparison by generating a program level stateful model of one or more entities in a …
comparison by generating a program level stateful model of one or more entities in a …
Automatic and adaptive fault detection and classification limits
J Iskandar, JR Moyne - US Patent 11,610,076, 2023 - Google Patents
Train a machine learning model using training data including the features of the historical
trace data and the product datato generate atrained machine learning model that uses a …
trace data and the product datato generate atrained machine learning model that uses a …
Systems and methods for executable code detection, automatic feature extraction and position independent code detection
2022-12-27 Assigned to Sentinel Labs Israel Ltd. reassignment Sentinel Labs Israel Ltd.
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
Malware sequence detection
R Agrawal, JW Stokes III, K Selvaraj… - US Patent …, 2021 - Google Patents
Implementations described herein disclose a malware sequence detection system for
detecting presence of mal ware in a plurality of events. An implementation of the malware …
detecting presence of mal ware in a plurality of events. An implementation of the malware …
Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach
N Montag, I Kotler, M Mates, MV Petronaci… - US Patent …, 2023 - Google Patents
2021-10-12 Assigned to Sentinel Labs Israel Ltd. reassignment Sentinel Labs Israel Ltd.
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
T Weingarten, A Cohen - US Patent 11,522,894, 2022 - Google Patents
H04L63/205—Network architectures or network communication protocols for network
security for managing network security; network security policies in general involving …
security for managing network security; network security policies in general involving …
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
T Weingarten, A Cohen - US Patent 11,876,819, 2024 - Google Patents
Various embodiments described herein disclose an endpoint modeling and grouping
management system that can collect data from endpoint computer devices in a network. In …
management system that can collect data from endpoint computer devices in a network. In …
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
T Weingarten, A Cohen - US Patent 11,973,781, 2024 - Google Patents
Various embodiments described herein disclose an endpoint modeling and grouping
management system that can collect data from endpoint computer devices in a network. In …
management system that can collect data from endpoint computer devices in a network. In …
Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking
T Weingarten, A Cohen - US Patent 11,716,342, 2023 - Google Patents
Various embodiments described herein disclose an endpoint modeling and grouping
management system that can collect data from endpoint computer devices in a network. In …
management system that can collect data from endpoint computer devices in a network. In …
Methods, systems, articles of manufacture and apparatus for producing generic IP reputation through cross-protocol analysis
A Wosotowsky, Y Huang, E Peterson… - US Patent …, 2021 - Google Patents
Methods, apparatus, systems and articles of manufacture for producing generic Internet
Protocol (IP) reputation through cross-protocol analysis are disclosed. An example …
Protocol (IP) reputation through cross-protocol analysis are disclosed. An example …