Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/82039
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | - |
dc.creator | Xue, L | en_US |
dc.creator | Liu, Z | en_US |
dc.creator | Zou, X | en_US |
dc.creator | Hou, J | en_US |
dc.creator | Luo, X | en_US |
dc.creator | Chan, EWW | en_US |
dc.creator | Tu, P | en_US |
dc.creator | Shao, Y | en_US |
dc.date.accessioned | 2020-05-05T05:58:24Z | - |
dc.date.available | 2020-05-05T05:58:24Z | - |
dc.identifier.uri | http://hdl.handle.net/10397/82039 | - |
dc.language.iso | en | en_US |
dc.rights | Assignee: The Hong Kong Polytechnic University | en_US |
dc.rights | Assignee: Tencent Technology (Shenzhen) Company Limited | en_US |
dc.title | Network attack detection method | en_US |
dc.type | Patent | en_US |
dc.description.otherinformation | US10193910; US10193910 B2; US10193910B2; US10,193,910; US10,193,910 B2; 10193910; Appl. No. 15/836,540 | en_US |
dcterms.abstract | It is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing path. A first probing path contained in the probing path set is probed by using a probing pattern to obtain a performance metric of the first probing path. It is determined whether the first probing path is subjected to network attack according to the performance metric and a control performance metric. | - |
dcterms.bibliographicCitation | US Patent 10,193,910 B2. Washington, DC: US Patent and Trademark Office, 2019. | en_US |
dcterms.issued | 2019-01-29 | - |
dc.description.country | US | - |
dc.description.validate | 202006 bcrc | - |
dc.description.oa | Version of Record | en_US |
Appears in Collections: | Patent |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
us10193910b2.pdf | 1.67 MB | Adobe PDF | View/Open |
Page views
96
Last Week
0
0
Last month
Citations as of May 11, 2025
Downloads
65
Citations as of May 11, 2025

Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.