Visualization method for network attack chain graph and storage medium
A network attack and chain graph technology, applied in the field of network security, can solve the problem of network security display disorganized and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The present invention is described below based on examples, but the present invention is not limited to these examples.
[0032] These processes, processes, logic blocks, functions, etc. are generally considered to be a self-consistent sequence of steps or instructions to achieve an ideal or expected result. The steps generally involve physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical, magnetic, optical, or quantum signals capable of being stored, transferred, combined, compared, and otherwise manipulated by a computer or data processing system. It turns out that it is sometimes convenient, for reasons of sharing, to refer to these signals as bits, waves, waveforms, streams, values, elements, symbols, letters, terms, numbers, and similar names, and to refer to them in computer programs or software as It is code (which may be object code, source code or binary code).
[0033] The present inventi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



