Growing community of inventors

Rosh HaAyim, Israel

Moshe Hadad

Average Co-Inventor Count = 4.41

ph-index = 2

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 47

Moshe HadadGal Engelberg (5 patents)Moshe HadadAlexander Basovskiy (3 patents)Moshe HadadAvraham Dayan (3 patents)Moshe HadadDan Klein (2 patents)Moshe HadadDmitry Kravchenko (2 patents)Moshe HadadHodaya Binyamini (2 patents)Moshe HadadRoei Levi (2 patents)Moshe HadadEitan Hadar (1 patent)Moshe HadadLouis William DiValentin (1 patent)Moshe HadadDan Klein (1 patent)Moshe HadadDaniel Voicu (1 patent)Moshe HadadYossef Tahar (1 patent)Moshe HadadVictor Daniel Corvalan (1 patent)Moshe HadadDaniel Nahmias (1 patent)Moshe HadadLior Bass (1 patent)Moshe HadadPetra Genc (1 patent)Moshe HadadMoshe Hadad (7 patents)Gal EngelbergGal Engelberg (13 patents)Alexander BasovskiyAlexander Basovskiy (5 patents)Avraham DayanAvraham Dayan (5 patents)Dan KleinDan Klein (12 patents)Dmitry KravchenkoDmitry Kravchenko (3 patents)Hodaya BinyaminiHodaya Binyamini (3 patents)Roei LeviRoei Levi (2 patents)Eitan HadarEitan Hadar (49 patents)Louis William DiValentinLouis William DiValentin (17 patents)Dan KleinDan Klein (3 patents)Daniel VoicuDaniel Voicu (1 patent)Yossef TaharYossef Tahar (1 patent)Victor Daniel CorvalanVictor Daniel Corvalan (1 patent)Daniel NahmiasDaniel Nahmias (1 patent)Lior BassLior Bass (1 patent)Petra GencPetra Genc (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Accenture Global Solutions Limited (7 from 1,547 patents)


7 patents:

1. 12476998 - Automated prioritization of cyber risk to digital identities

2. 12348552 - Automated prediction of cyber-security attack techniques using knowledge mesh

3. 12335296 - Automated cyber-security attack method prediction using detected vulnerabilities

4. 11895150 - Discovering cyber-attack process model based on analytical attack graphs

5. 11838307 - Resource-efficient generation of analytical attack graphs

6. 11483213 - Enterprise process discovery through network traffic patterns

7. 11411976 - Resource-efficient generation of analytical attack graphs

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
1/1/2026
Loading…