Growing community of inventors

Culver City, CA, United States of America

Mircea Ciubotariu

Average Co-Inventor Count = 1.32

ph-index = 4

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 32

Mircea CiubotariuShane Anil Pereira (2 patents)Mircea CiubotariuShlomo Yehezkel (2 patents)Mircea CiubotariuSandeep Kumar (1 patent)Mircea CiubotariuMuhammad Wasiq (1 patent)Mircea CiubotariuPeter Ferrie (1 patent)Mircea CiubotariuChakravarthi Kalyana Valicherla (1 patent)Mircea CiubotariuPriti Nachiket More (1 patent)Mircea CiubotariuCostin Ionescu (1 patent)Mircea CiubotariuTal Eidelman (1 patent)Mircea CiubotariuDumitru Stama (1 patent)Mircea CiubotariuMircea Ciubotariu (15 patents)Shane Anil PereiraShane Anil Pereira (11 patents)Shlomo YehezkelShlomo Yehezkel (3 patents)Sandeep KumarSandeep Kumar (37 patents)Muhammad WasiqMuhammad Wasiq (20 patents)Peter FerriePeter Ferrie (17 patents)Chakravarthi Kalyana ValicherlaChakravarthi Kalyana Valicherla (7 patents)Priti Nachiket MorePriti Nachiket More (2 patents)Costin IonescuCostin Ionescu (2 patents)Tal EidelmanTal Eidelman (1 patent)Dumitru StamaDumitru Stama (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Amazon Technologies, Inc. (9 from 22,593 patents)

2. Symantec Corporation (2 from 3,063 patents)

3. Ca, Inc. (2 from 1,402 patents)

4. Nortonlifelock Inc. (1 from 191 patents)

5. Ca Technologies, Inc. (1 from 12 patents)


15 patents:

1. 11989161 - Generating readable, compressed event trace logs from raw event trace logs

2. 11868471 - Particle encoding for automatic sample processing

3. 11861007 - Detecting container threats through extracting kernel events to process in reserved scanner containers

4. 11803642 - Optimization of high entropy data particle extraction

5. 11768937 - Hash based flexible threat scanning engine

6. 11704408 - Threat scanning transplanted containers

7. 11403016 - Optimizing snapshot changed blocks metadata querying

8. 11379421 - Generating readable, compressed event trace logs from raw event trace logs

9. 11372811 - Optimizing disk volume scanning using snapshot metadata

10. 10977368 - Detecting malware based on memory allocation patterns

11. 10846405 - Systems and methods for detecting and protecting against malicious software

12. 10645099 - Malware detection facilitated by copying a memory range from an emulator for analysis and signature generation

13. 10621348 - Detecting a malicious application executing in an emulator based on a check made by the malicious application after making an API call

14. 10338943 - Techniques for emulating microprocessor instructions

15. 9170791 - Storing data items with content encoded in storage addresses

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
1/8/2026
Loading…