K
Kevin Overcash
Publications - 7
Citations - 611
Kevin Overcash is an academic researcher. The author has contributed to research in topics: Web application & Web server. The author has an hindex of 6, co-authored 7 publications receiving 611 citations.
Papers
More filters
Patent
System and method of securing web applications across an enterprise
Kevin Overcash,Kate Delikat,Rami Mizrahi,Galit Efron (Nitzan),Doron Kolton,Asaf Wexler,Netta Gavrieli,Yoram Zahavi +7 more
TL;DR: In this article, a system and method for protection of Web based applications is described, which provides an enterprise wide approach to preventing attacks of Web-based applications by comparing the traffic to a profile of acceptable user traffic when interacting with the application.
Patent
A method and apparatus for detection of information transmission abnormalities
TL;DR: In this paper, a method for securing a network application is described, which is based on a verification of the independent aspect of the information against a profile of acceptable behavior against a set of acceptable behaviors.
Patent
System and method of preventing web applications threats
Kevin Overcash,Kate Delikate,Rami Mizrahi,Galit Efron (Nitzan),Doron Kolton,Asaf Wexler,Netta Gavrieli,Yoram Zahavi +7 more
TL;DR: In this paper, a system and method for protection of Web based applications is described, where an agent is included in a web server such that traffic is routed through the agent, and a security module is also in communication with the agent.
Patent
System and method of securing networks against applications threats
Kate Delikat,Galit Efron (Nitzan),Netta Gavrieli,Doron Kolton,Rami Mizrahi,Kevin Overcash,Asaf Wexler,Yoram Zahavi +7 more
TL;DR: In this paper, a Web application security system is described, which monitors web traffic in a non-inline configuration and identifies any anomalous traffic against a profile that identifies acceptable behavior of a user of the application.
Patent
System and method for detecting security defects in applications
TL;DR: In this paper, a system and method for detecting vulnerabilities in a deployed web application includes developing a profile of acceptable behavior for inbound communication and outbound communication of a web application.