Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John Neystadt is active.

Publication


Featured researches published by John Neystadt.


Archive | 2009

Information protection applied by an intermediary device

Noam Ben-Yochanan; John Neystadt; Nir Nice; Max Uritsky; Rushmi U. Malaviarachchi


Archive | 2006

Authentication delegation based on re-verification of cryptographic evidence

Gennady Medvinsky; Nir Nice; Tomer Shiran; Alexander Teplitsky; Paul J. Leach; John Neystadt


Archive | 2008

Detecting compromised computers by correlating reputation data with web access logs

John Neystadt; Efim Hudis; Yair Helman; Alexandra Faynburd


Archive | 2010

Access control using identifiers in links

John Neystadt; Nir Nice


Archive | 2009

MODEL BASED SYSTEMS MANAGEMENT IN VIRTUALIZED AND NON-VIRTUALIZED ENVIRONMENTS

John Neystadt; Yigal Edery; Yan Belinky; Anders B. Vinberg; Dennis Scott Batchelder; Shimon Yannay


Archive | 2007

Reduction of false positive reputations through collection of overrides from customer deployments

John Neystadt; Efim Hudis


Archive | 2011

Social Marketing Manager

John Neystadt; Ron Karidi; Roy Varshavsky; Avigad Oron; Kira Radinsky; Moshe Tennenholtz


Archive | 2007

Testing Software Applications with Schema-based Fuzzing

John Neystadt; Nissim Natanov


Archive | 2008

Protecting a virtual guest machine from attacks by an infected host

John Neystadt; Noam Ben-Yochanan; Nir Nice


Archive | 2007

Detection of adversaries through collection and correlation of assessments

John Neystadt; Efim Hudis

Collaboration


Dive into the John Neystadt's collaboration.

Researchain Logo
Decentralizing Knowledge