Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/82039
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorXue, Len_US
dc.creatorLiu, Zen_US
dc.creatorZou, Xen_US
dc.creatorHou, Jen_US
dc.creatorLuo, Xen_US
dc.creatorChan, EWWen_US
dc.creatorTu, Pen_US
dc.creatorShao, Yen_US
dc.date.accessioned2020-05-05T05:58:24Z-
dc.date.available2020-05-05T05:58:24Z-
dc.identifier.urihttp://hdl.handle.net/10397/82039-
dc.language.isoenen_US
dc.rightsAssignee: The Hong Kong Polytechnic Universityen_US
dc.rightsAssignee: Tencent Technology (Shenzhen) Company Limiteden_US
dc.titleNetwork attack detection methoden_US
dc.typePatenten_US
dc.description.otherinformationUS10193910; US10193910 B2; US10193910B2; US10,193,910; US10,193,910 B2; 10193910; Appl. No. 15/836,540en_US
dcterms.abstractIt is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing path. A first probing path contained in the probing path set is probed by using a probing pattern to obtain a performance metric of the first probing path. It is determined whether the first probing path is subjected to network attack according to the performance metric and a control performance metric.-
dcterms.bibliographicCitationUS Patent 10,193,910 B2. Washington, DC: US Patent and Trademark Office, 2019.en_US
dcterms.issued2019-01-29-
dc.description.countryUS-
dc.description.validate202006 bcrc-
dc.description.oaVersion of Recorden_US
Appears in Collections:Patent
Files in This Item:
File Description SizeFormat 
us10193910b2.pdf1.67 MBAdobe PDFView/Open
Show simple item record

Page views

69
Last Week
0
Last month
Citations as of Apr 14, 2024

Downloads

26
Citations as of Apr 14, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.