There is currently no text in this page. You can search for this page title in other pages, or search the related logs, but you do not have permission to create this page.
Category:Yevgeni Gehtman of Modi'in (IL)
Appearance
Pages in category "Yevgeni Gehtman of Modi'in (IL)"
The following 47 pages are in this category, out of 47 total.
1
- 17945637. NETWORK-STORAGE-BASED ATTACK DETECTION simplified abstract (Dell Products L.P.)
- 17970457. ANALYZING FILE ENTROPY TO IDENTIFY ADVERSE CONDITIONS simplified abstract (Dell Products L.P.)
- 17970471. PREVENTION OF ELECTROMAGNETIC WAVE DETECTION IN A WIRELESS COMMUNICATION NETWORK simplified abstract (Dell Products L.P.)
- 18122996. DEVICE RECOVERY USING SELECTION OF AN ALTERNATE BIOS simplified abstract (Dell Products L.P.)
- 18122998. DEVICE RECOVERY USING ACTIVATION OF BIOS RECOVERY IMAGE simplified abstract (Dell Products L.P.)
- 18123001. BIOS PROTECTION USING BIOS UPDATE SUPPRESSION simplified abstract (Dell Products L.P.)
- 18123002. BIOS PROTECTION USING AGENT-BASED VALIDATION OF BIOS VERSION simplified abstract (Dell Products L.P.)
- 18123005. BIOS PROTECTION USING REQUEST INTERCEPTION AND APPROVAL OF BIOS MODIFICATIONS simplified abstract (Dell Products L.P.)
- 18188625. DETECTION OF RANSOMWARE ACTIVITY BASED ON OS PAGINATION FUNCTIONALITY simplified abstract (Dell Products L.P.)
- 18188643. DATA-LEAKAGE PREVENTION FOR PRE-RANSOMWARE'S ENCRYPTION ACTIVITY VIA TERMINATION OF NETWORK-SYSCALL COMMANDS USING INTERCEPTION ANALYSIS simplified abstract (Dell Products L.P.)
- 18189554. ZOOM-IN SNAPSHOTS FOR WRITING PROCESSES simplified abstract (Dell Products L.P.)
- 18189928. RANSOMWARE DETECTION USING INODE TRAVERSAL SCORING simplified abstract (Dell Products L.P.)
- 18295338. VAULT OVERWRITING AFTER PLC (PROTECTION LIFECYCLE) DESIGNATION DISALLOWANCE BY TRANSMISSION TO PUBLIC VAULT simplified abstract (Dell Products L.P.)
- 18295364. DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING simplified abstract (Dell Products L.P.)
- 18295366. RANSOMWARE DISCOVERY BY DETECTION OF TRANSMIT/OVERWRITE PROCESSES simplified abstract (Dell Products L.P.)
- 18297118. REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE simplified abstract (Dell Products L.P.)
- 18299373. REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, HASHES OF HASHES simplified abstract (Dell Products L.P.)
- 18299379. LOW-COST DATA DECRYPTION OF ADAPTIVE-PRICING RANSOMWARE WITH HONEYPOT (FOR ASYMMETRIC KEYS MALWARE) simplified abstract (Dell Products L.P.)
- 18299492. PREVENTING THE INTRODUCTION OF MALICIOUS-EDGE-GATEWAY THE EDGE MANAGEMENT'S FLEET VIA NETWORK INTERCEPTOR AND IDENTITY VALIDATION simplified abstract (Dell Products L.P.)
- 18300775. TRACKING OF FILES REQUIRED FOR RUNNING MALWARE PROCESSES simplified abstract (Dell Products L.P.)
D
- Dell products l.p. (20240095357). NETWORK-STORAGE-BASED ATTACK DETECTION simplified abstract
- Dell products l.p. (20240111855). DEVICE PROTECTION USING PRE-EXECUTION COMMAND INTERCEPTION AND EVALUATION simplified abstract
- Dell products l.p. (20240134976). ANALYZING FILE ENTROPY TO IDENTIFY ADVERSE CONDITIONS simplified abstract
- Dell products l.p. (20240137250). PREVENTION OF ELECTROMAGNETIC WAVE DETECTION IN A WIRELESS COMMUNICATION NETWORK simplified abstract
- Dell products l.p. (20240202295). DEVICE PROTECTION USING PRE-EXECUTION COMMAND INTERCEPTION AND USER AUTHENTICATION simplified abstract
- Dell products l.p. (20240202308). DEVICE PROTECTION USING PRE-EXECUTION MULTI-FACTOR PROCESS AUTHENTICATION simplified abstract
- Dell products l.p. (20240205232). REMOTE ACCESS CONTROL USING VALIDATION OF PHYSICAL LOCATION OF REMOTE USER simplified abstract
- Dell products l.p. (20240205248). MONITORING TOOL FOR DETECTING VIOLATIONS OF DEVICE BEHAVIOR CONSTRAINTS simplified abstract
- Dell products l.p. (20240232347). ANALYZING FILE ENTROPY TO IDENTIFY ADVERSE CONDITIONS simplified abstract
- Dell products l.p. (20240235894). PREVENTION OF ELECTROMAGNETIC WAVE DETECTION IN A WIRELESS COMMUNICATION NETWORK simplified abstract
- Dell products l.p. (20240311242). DEVICE RECOVERY USING SELECTION OF AN ALTERNATE BIOS simplified abstract
- Dell products l.p. (20240311243). DEVICE RECOVERY USING ACTIVATION OF BIOS RECOVERY IMAGE simplified abstract
- Dell products l.p. (20240311484). BIOS PROTECTION USING BIOS UPDATE SUPPRESSION simplified abstract
- Dell products l.p. (20240311485). BIOS PROTECTION USING AGENT-BASED VALIDATION OF BIOS VERSION simplified abstract
- Dell products l.p. (20240311486). BIOS PROTECTION USING REQUEST INTERCEPTION AND APPROVAL OF BIOS MODIFICATIONS simplified abstract
- Dell products l.p. (20240320327). RANSOMWARE DETECTION USING INODE TRAVERSAL SCORING simplified abstract
- Dell products l.p. (20240320335). DETECTION OF RANSOMWARE ACTIVITY BASED ON OS PAGINATION FUNCTIONALITY simplified abstract
- Dell products l.p. (20240320336). ZOOM-IN SNAPSHOTS FOR WRITING PROCESSES simplified abstract
- Dell products l.p. (20240323225). DATA-LEAKAGE PREVENTION FOR PRE-RANSOMWARE'S ENCRYPTION ACTIVITY VIA TERMINATION OF NETWORK-SYSCALL COMMANDS USING INTERCEPTION ANALYSIS simplified abstract
- Dell products l.p. (20240338434). DISCOVERY OF RANSOMWARE PROCESSES USING LAST-INTERACTED METADATA TAGGING simplified abstract
- Dell products l.p. (20240338450). RANSOMWARE DISCOVERY BY DETECTION OF TRANSMIT/OVERWRITE PROCESSES simplified abstract
- Dell products l.p. (20240338472). REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE simplified abstract
- Dell products l.p. (20240340309). VAULT OVERWRITING AFTER PLC (PROTECTION LIFECYCLE) DESIGNATION DISALLOWANCE BY TRANSMISSION TO PUBLIC VAULT simplified abstract
- Dell products l.p. (20240346143). TRACKING OF FILES REQUIRED FOR RUNNING MALWARE PROCESSES simplified abstract
- Dell products l.p. (20240346146). LOW-COST DATA DECRYPTION OF ADAPTIVE-PRICING RANSOMWARE WITH HONEYPOT (FOR ASYMMETRIC KEYS MALWARE) simplified abstract
- Dell products l.p. (20240348451). REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, HASHES OF HASHES simplified abstract
- Dell products l.p. (20240348583). PREVENTING THE INTRODUCTION OF MALICIOUS-EDGE-GATEWAY THE EDGE MANAGEMENT'S FLEET VIA NETWORK INTERCEPTOR AND IDENTITY VALIDATION simplified abstract