Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/82039
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorXue, Len_US
dc.creatorLiu, Zen_US
dc.creatorZou, Xen_US
dc.creatorHou, Jen_US
dc.creatorLuo, Xen_US
dc.creatorChan, EWWen_US
dc.creatorTu, Pen_US
dc.creatorShao, Yen_US
dc.date.accessioned2020-05-05T05:58:24Z-
dc.date.available2020-05-05T05:58:24Z-
dc.identifier.urihttp://hdl.handle.net/10397/82039-
dc.language.isoenen_US
dc.rightsAssignee: The Hong Kong Polytechnic Universityen_US
dc.rightsAssignee: Tencent Technology (Shenzhen) Company Limiteden_US
dc.titleNetwork attack detection methoden_US
dc.typePatenten_US
dc.description.otherinformationUS10193910; US10193910 B2; US10193910B2; US10,193,910; US10,193,910 B2; 10193910; Appl. No. 15/836,540en_US
dcterms.abstractIt is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing path. A first probing path contained in the probing path set is probed by using a probing pattern to obtain a performance metric of the first probing path. It is determined whether the first probing path is subjected to network attack according to the performance metric and a control performance metric.-
dcterms.bibliographicCitationUS Patent 10,193,910 B2. Washington, DC: US Patent and Trademark Office, 2019.en_US
dcterms.issued2019-01-29-
dc.description.countryUS-
dc.description.validate202006 bcrc-
dc.description.oaVersion of Recorden_US
Appears in Collections:Patent
Files in This Item:
File Description SizeFormat 
us10193910b2.pdf1.67 MBAdobe PDFView/Open
Show simple item record

Page views

16
Citations as of Jul 3, 2022

Downloads

7
Citations as of Jul 3, 2022

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.