Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/82039
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Computing | - |
| dc.creator | Xue, L | en_US |
| dc.creator | Liu, Z | en_US |
| dc.creator | Zou, X | en_US |
| dc.creator | Hou, J | en_US |
| dc.creator | Luo, X | en_US |
| dc.creator | Chan, EWW | en_US |
| dc.creator | Tu, P | en_US |
| dc.creator | Shao, Y | en_US |
| dc.date.accessioned | 2020-05-05T05:58:24Z | - |
| dc.date.available | 2020-05-05T05:58:24Z | - |
| dc.identifier.uri | http://hdl.handle.net/10397/82039 | - |
| dc.language.iso | en | en_US |
| dc.rights | Assignee: The Hong Kong Polytechnic University | en_US |
| dc.rights | Assignee: Tencent Technology (Shenzhen) Company Limited | en_US |
| dc.title | Network attack detection method | en_US |
| dc.type | Patent | en_US |
| dc.description.otherinformation | US10193910; US10193910 B2; US10193910B2; US10,193,910; US10,193,910 B2; 10193910; Appl. No. 15/836,540 | en_US |
| dcterms.abstract | It is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing path. A first probing path contained in the probing path set is probed by using a probing pattern to obtain a performance metric of the first probing path. It is determined whether the first probing path is subjected to network attack according to the performance metric and a control performance metric. | - |
| dcterms.bibliographicCitation | US Patent 10,193,910 B2. Washington, DC: US Patent and Trademark Office, 2019. | en_US |
| dcterms.issued | 2019-01-29 | - |
| dc.description.country | US | - |
| dc.description.validate | 202006 bcrc | - |
| dc.description.oa | Version of Record | en_US |
| Appears in Collections: | Patent | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| us10193910b2.pdf | 1.67 MB | Adobe PDF | View/Open |
Page views
121
Last Week
2
2
Last month
Citations as of Dec 7, 2025
Downloads
83
Citations as of Dec 7, 2025
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.


