Hod Hasharon, Israel

Keren Horowitz


Average Co-Inventor Count = 4.0

ph-index = 2

Forward Citations = 102(Granted Patents)


Location History:

  • Tel Aviv, IL (2009)
  • Hod Hasharon, IL (2013)

Company Filing History:


Years Active: 2009-2013

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Keren Horowitz: Innovator in Network Security

Introduction

Keren Horowitz is a prominent inventor based in Hod Hasharon, Israel. She has made significant contributions to the field of network security, particularly in the area of mitigating DDoS attacks and enhancing communication traffic screening. With a total of 2 patents, her work has garnered attention for its innovative approaches to cybersecurity challenges.

Latest Patents

Keren's latest patents include a method for handling DDoS attacks from NAT or proxy devices. This method involves authenticating communication traffic by receiving an initial incoming message and sending an outgoing message containing an encoded token to the client. If a number of further incoming messages from the source address exceed a predetermined threshold, the delivery of these messages to the destination address is inhibited. Another notable patent focuses on using threshold lists for worm detection. This computer-implemented method screens communication traffic by defining threshold pairs and monitoring network traffic from various sources to determine the count of unique destination addresses.

Career Highlights

Keren is currently employed at Cisco Technology, Inc., where she continues to develop innovative solutions in network security. Her expertise and contributions have positioned her as a valuable asset in the tech industry.

Collaborations

Throughout her career, Keren has collaborated with notable colleagues, including Dan Touitou and Dror Karmi. These partnerships have further enhanced her work and impact in the field.

Conclusion

Keren Horowitz is a trailblazer in network security, with her patents reflecting her commitment to advancing technology in this critical area. Her innovative methods for handling DDoS attacks and detecting malicious network traffic demonstrate her significant contributions to the field.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…