首页>
外国专利>
Cyber defense with graph theoretical approach
Cyber defense with graph theoretical approach
展开▼
机译:图论的网络防御
展开▼
页面导航
摘要
著录项
相似文献
摘要
An example process that is performed by one or more processing devices uses one or more system states to detect cyber-attacks. The example process includes the following operations: generating a first graph that models states based on information obtained from an electronic device; and performing a correlation of the first graph with one or more second graphs to detect a possibility of a cyber-attack against the electronic device.
展开▼