首页> 外国专利> Cyber defense with graph theoretical approach

Cyber defense with graph theoretical approach

机译:图论的网络防御

摘要

An example process that is performed by one or more processing devices uses one or more system states to detect cyber-attacks. The example process includes the following operations: generating a first graph that models states based on information obtained from an electronic device; and performing a correlation of the first graph with one or more second graphs to detect a possibility of a cyber-attack against the electronic device.
机译:由一个或多个处理设备执行的示例过程使用一个或多个系统状态来检测网络攻击。该示例过程包括以下操作:基于从电子设备获得的信息,生成对状态进行建模的第一图形;以及以及执行第一图与一个或多个第二图的相关以检测对电子设备的网络攻击的可能性。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号