Please use this identifier to cite or link to this item:
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorXue, Len_US
dc.creatorLiu, Zen_US
dc.creatorZou, XHou, Jen_US
dc.creatorLuo, Xen_US
dc.creatorChan, EWWen_US
dc.creatorTu, Pen_US
dc.creatorShao, Yen_US
dc.rightsAssignee: The Hong Kong Polytechnic Universityen_US
dc.rightsAssignee: Tencent Technology (Shenzhen) Company Limiteden_US
dc.titleNetwork attack detection methoden_US
dc.description.otherinformationUS9876807; US9876807 B2; US9876807B2; US9,876,807; US9,876,807 B2; 9876807; Appl. No. 14/688,554en_US
dcterms.abstractIt is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing path. A first probing path contained in the probing path set is probed by using a probing pattern to obtain a performance metric of the first probing path. It is determined whether the first probing path is subjected to network attack according to the performance metric and a control performance metric.-
dcterms.bibliographicCitationUS Patent 9,876,807 B2. Washington, DC: US Patent and Trademark Office, 2018.en_US
dc.description.validate202006 bcrc-
dc.description.oaVersion of Recorden_US
Appears in Collections:Patent
Files in This Item:
File Description SizeFormat 
us9876807b2.pdf1.66 MBAdobe PDFView/Open
Show simple item record

Page views

Citations as of Jun 26, 2022


Citations as of Jun 26, 2022

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.