Growing community of inventors

Hod Hasharon, Israel

Gil Ben Zvi

Average Co-Inventor Count = 3.69

ph-index = 1

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 11

Gil Ben ZviYuval Friedlander (13 patents)Gil Ben ZviRon Shoham (13 patents)Gil Ben ZviTom Hanetz (11 patents)Gil Ben ZviEvgeny Luk-Zilberman (3 patents)Gil Ben ZviRoee Salomon (2 patents)Gil Ben ZviYuval Sarel (2 patents)Gil Ben ZviBen Seri (2 patents)Gil Ben ZviGil Ben Zvi (15 patents)Yuval FriedlanderYuval Friedlander (15 patents)Ron ShohamRon Shoham (13 patents)Tom HanetzTom Hanetz (13 patents)Evgeny Luk-ZilbermanEvgeny Luk-Zilberman (6 patents)Roee SalomonRoee Salomon (12 patents)Yuval SarelYuval Sarel (2 patents)Ben SeriBen Seri (2 patents)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Armis Security Ltd. (13 from 28 patents)

2. Axonius Solutions Ltd. (2 from 12 patents)


15 patents:

1. 12470593 - Malicious lateral movement detection using remote system protocols

2. 12401658 - Management of entities and elements of a network

3. 12388855 - Anomaly detection and mitigation using device subpopulation partitioning

4. 12386947 - Techniques for securing network environments by identifying device attributes based on string field conventions

5. 12375481 - System and method for operating system distribution and version identification using communications security fingerprints

6. 12346487 - System and method for detecting cybersecurity vulnerabilities via device attribute resolution

7. 12328327 - System and method for anomaly detection interpretation

8. 12260228 - Optimizing configuration rules over multiple management domains

9. 12225027 - System and method for detection of abnormal device traffic behavior

10. 12216459 - System and method for inferring device type based on port usage

11. 12052274 - Techniques for enriching device profiles and mitigating cybersecurity threats using enriched device profiles

12. 12026248 - Techniques for securing network environments by identifying device attributes based on string field conventions

13. 11824877 - System and method for anomaly detection interpretation

14. 11526392 - System and method for inferring device model based on media access control address

15. 11102082 - System and method for inferring operating systems using transmission control protocol fingerprints

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/18/2025
Loading…