Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/82049
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorXue, Len_US
dc.creatorLiu, Zen_US
dc.creatorZou, XHou, Jen_US
dc.creatorLuo, Xen_US
dc.creatorChan, EWWen_US
dc.creatorTu, Pen_US
dc.creatorShao, Yen_US
dc.date.accessioned2020-05-05T05:58:27Z-
dc.date.available2020-05-05T05:58:27Z-
dc.identifier.urihttp://hdl.handle.net/10397/82049-
dc.language.isoenen_US
dc.rightsAssignee: The Hong Kong Polytechnic Universityen_US
dc.rightsAssignee: Tencent Technology (Shenzhen) Company Limiteden_US
dc.titleNetwork attack detection methoden_US
dc.typePatenten_US
dc.description.otherinformationUS9876807; US9876807 B2; US9876807B2; US9,876,807; US9,876,807 B2; 9876807; Appl. No. 14/688,554en_US
dcterms.abstractIt is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing path. A first probing path contained in the probing path set is probed by using a probing pattern to obtain a performance metric of the first probing path. It is determined whether the first probing path is subjected to network attack according to the performance metric and a control performance metric.-
dcterms.bibliographicCitationUS Patent 9,876,807 B2. Washington, DC: US Patent and Trademark Office, 2018.en_US
dcterms.issued2018-01-23-
dc.description.countryUS-
dc.description.validate202006 bcrc-
dc.description.oaVersion of Recorden_US
Appears in Collections:Patent
Files in This Item:
File Description SizeFormat 
us9876807b2.pdf1.66 MBAdobe PDFView/Open
Show simple item record

Page views

47
Last Week
0
Last month
Citations as of Apr 21, 2024

Downloads

21
Citations as of Apr 21, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.