Chongqing, China

Qiaoyue Pang


Average Co-Inventor Count = 5.0

ph-index = 1

Forward Citations = 3(Granted Patents)


Company Filing History:


Years Active: 2022

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Innovations in DDoS Attack Mitigation by Qiaoyue Pang

Introduction

Qiaoyue Pang is an accomplished inventor based in Chongqing, China. He has made significant contributions to the field of network security, particularly in the area of DDoS attack detection and mitigation. His innovative approach addresses critical challenges faced by industrial networks.

Latest Patents

Qiaoyue Pang holds a patent for a "DDoS attack detection and mitigation method for industrial SDN network." This invention focuses on enhancing the security of industrial networks by effectively identifying and mitigating DDoS attacks. The method utilizes the cooperation between an east-west interface of an SDN controller and a system manager of an industrial access network. By extending the flow entry matching field of an OpenFlow switch, the invention ensures timely defense against attacking data flows. This approach not only identifies the source of DDoS attacks but also implements mitigation policies to protect normal traffic within industrial networks.

Career Highlights

Qiaoyue Pang is affiliated with the Chongqing University of Posts and Telecommunications, where he continues to advance research in network security. His work has garnered attention for its practical applications in safeguarding industrial systems from cyber threats. With a focus on innovative solutions, he has established himself as a key figure in the field.

Collaborations

Qiaoyue Pang has collaborated with notable colleagues, including Min Wei and Tao Yang. Their combined expertise contributes to the development of cutting-edge technologies in network security.

Conclusion

Qiaoyue Pang's contributions to DDoS attack mitigation represent a significant advancement in network security for industrial applications. His innovative methods ensure the protection of critical infrastructure against cyber threats.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…