http://rdf.ncbi.nlm.nih.gov/pubchem/patent/FR-3093837-A1

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_fe01d67a002dfa0f3ac084298142eccd
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/B64U2101-00
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-20
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1425
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1458
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1441
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1466
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W36-12
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W24-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L12-26
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W12-10
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W40-02
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-56
filingDate 2019-03-14^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_d6781846b5fff421e95e9a7db893881e
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_79fcc612ed19727953fdf03ddc76bcd4
publicationDate 2020-09-18^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber FR-3093837-A1
titleOfInvention Mitigation of computer attacks
abstract The invention relates to assistance management for a communication network (NW) capable of carrying traffic characteristic of a computer attack, the method comprising: on detection of a computer attack, identifying at least a first node of the network, requiring mitigation intervention, and identifying a policy for routing traffic in the network, - controlling a movement of at least one mobile object, and comprising at least one communication interface, to connect the mobile object to at least a second network node (R1, R6) determined relative to the first node (R2, R4, etc.) as a function of said traffic routing policy, - control at least part of the traffic routed by the network to redirect said part of traffic to the mobile object via at least said second node of said network (R2, R4,…).n Abstract figure: Figure 17
priorityDate 2019-03-14^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID47346
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID415726514

Showing number of triples: 1 to 25 of 25.