Real-time network security threat early warning analysis method and apparatus thereof
A network security, real-time network technology, applied in data exchange networks, digital transmission systems, electrical components, etc., to achieve strong accuracy and timeliness effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] Network Attack-Defense: It mainly refers to the process in which both the offensive and defensive parties take certain measures to generate confrontation. The attacker chooses an attack strategy to attack the opponent's network, so as to obtain the opponent's information or even destroy the opponent's network. In response to the attacking behavior of the attacker, the defender will adopt various defensive measures for network security defense to minimize its own losses. Games: In certain environmental conditions, under certain rules, some individuals or organizations select their own strategies from their respective optional strategy sets and implement them at the same time or successively, one or more times, and finally obtain processes with corresponding results. Nash Equilibrium: In the game G={S 1 ,...,S n ; u 1 ,...,u n}, a certain strategy combination composed of each strategy of each player In , the strategy of any player i If the conditions are met: fo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com