Growing community of inventors

Tel Aviv, Israel

Shir Tamari

Average Co-Inventor Count = 4.79

ph-index = 1

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 2

Shir TamariAmi Luttwak (5 patents)Shir TamariAlon Schindel (4 patents)Shir TamariRon Cohen (4 patents)Shir TamariYaniv Shaked (3 patents)Shir TamariGeorge Pisha (3 patents)Shir TamariAmitai Cohen (3 patents)Shir TamariBarak Sharoni (3 patents)Shir TamariItay Arbel (3 patents)Shir TamariAssaf Segal (3 patents)Shir TamariDaniel Velikanski (3 patents)Shir TamariAmir Lande Blau (2 patents)Shir TamariArnon Trabelsi (2 patents)Shir TamariShir Tamari (10 patents)Ami LuttwakAmi Luttwak (104 patents)Alon SchindelAlon Schindel (21 patents)Ron CohenRon Cohen (4 patents)Yaniv ShakedYaniv Shaked (36 patents)George PishaGeorge Pisha (16 patents)Amitai CohenAmitai Cohen (11 patents)Barak SharoniBarak Sharoni (9 patents)Itay ArbelItay Arbel (8 patents)Assaf SegalAssaf Segal (5 patents)Daniel VelikanskiDaniel Velikanski (3 patents)Amir Lande BlauAmir Lande Blau (12 patents)Arnon TrabelsiArnon Trabelsi (5 patents)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. Wiz, Inc. (10 from 143 patents)


10 patents:

1. 12483632 - API discovery techniques utilizing a managed router service

2. 12483581 - System and method for exposed software service detection

3. 12401683 - Techniques for detecting artificial intelligence model cybersecurity risk in a computing environment

4. 12284195 - Techniques for detecting cloud identity misuse leveraging runtime context

5. 12273258 - System and method for determining code reachability in a networked computing environment

6. 12273372 - Techniques for detecting artificial intelligence model cybersecurity risk in a computing environment

7. 12229257 - Techniques for preventing cloud identity misuse leveraging runtime context

8. 12225037 - Techniques for cybersecurity investigation of cloud entity misuse leveraging runtime context

9. 12189774 - Techniques for detecting cloud identity misuse based on runtime context and static analysis

10. 12003529 - Techniques for detecting artificial intelligence model cybersecurity risk in a computing environment

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
1/2/2026
Loading…