메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 518-521

Research and realization of security policy in IPSec based on ID3 algorithm

Author keywords

Decision tree; ID3 algorithm; IPSec; Security policy

Indexed keywords

CASE ANALYSIS; DYNAMIC GENERATION; ID3 ALGORITHM; IMPROVED MECHANISM; IPSEC; POLICY DRIVEN; POLICY ENGINE; SECURITY MECHANISM; SECURITY POLICY; SECURITY POLICY MANAGEMENT; SECURITY POLICY MODEL;

EID: 77649321963     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MINES.2009.87     Document Type: Conference Paper
Times cited : (3)

References (12)
  • 1
    • 77649322792 scopus 로고    scopus 로고
    • S. Kent R. Atkinson. Security Architecture for the Internet Protocol. RFC2401. 1998.11
    • S. Kent R. Atkinson. Security Architecture for the Internet Protocol. RFC2401. 1998.11
  • 3
    • 77649288255 scopus 로고    scopus 로고
    • Design and implementation of IPv4 IPv6 adaptive QoS enabled VPN[J]
    • Zhang Jing, Wang Wendong. Design and implementation of IPv4 IPv6 adaptive QoS enabled VPN[J] Computer Engineering and Applications, 2008.6:131-135
    • (2008) Computer Engineering and Applications , vol.6 , pp. 131-135
    • Jing, Z.1    Wang, W.2
  • 4
    • 77649289814 scopus 로고    scopus 로고
    • Yang Lishen. Research on Application of IPSec to IPv6[J] Computer Development & Applications [J]. 2009.5:21-22
    • Yang Lishen. Research on Application of IPSec to IPv6[J] Computer Development & Applications [J]. 2009.5:21-22
  • 5
    • 77649323421 scopus 로고    scopus 로고
    • A Study of Automatic Generation of IPSec Security Policies [J]
    • Deng Lei, Ai Jisong. A Study of Automatic Generation of IPSec Security Policies [J]. Computer Security, 2009.1 :4-8
    • (2009) Computer Security , vol.1 , pp. 4-8
    • Lei, D.1    Jisong, A.2
  • 6
    • 77649283422 scopus 로고    scopus 로고
    • Liu Yunling,Yang Lu. The research of IPsec systemand its policy managementmechanism[J]. Network Security Technology & Application, 2006.2:17-19
    • Liu Yunling,Yang Lu. The research of IPsec systemand its policy managementmechanism[J]. Network Security Technology & Application, 2006.2:17-19
  • 7
    • 77649299178 scopus 로고    scopus 로고
    • Chen Zhuo, Zhang Zhengwen. Research of IPSec Security Policy[J]. Network & Computer Securit, 2008.10:60-62
    • Chen Zhuo, Zhang Zhengwen. Research of IPSec Security Policy[J]. Network & Computer Securit, 2008.10:60-62
  • 8
    • 33744584654 scopus 로고
    • Induction of decision trees [J]
    • Kluwer Academic Press
    • Quinlan J R, Induction of decision trees [J]. Machine Learning,, Kluwer Academic Press, 1986, 81-106
    • (1986) Machine Learning , pp. 81-106
    • Quinlan, J.R.1
  • 10
    • 81255167037 scopus 로고    scopus 로고
    • Research on Decision Tree Learning Algorithm of ID3 [J]. Microcomputer
    • Yang Ming, Zhang Zaihong. Research on Decision Tree Learning Algorithm of ID3 [J]. Microcomputer Development, 2002.5 :6-8
    • (2002) Development , vol.5 , pp. 6-8
    • Ming, Y.1    Zhang, Z.2
  • 11
    • 77649287923 scopus 로고    scopus 로고
    • Research on the Practice of Risk Governance in North America Telecom[JJ. Telecommunications
    • Yang Ming, Guo Shuxu. Research on the Practice of Risk Governance in North America Telecom[JJ. Telecommunications Science, 2009.6 :86-89
    • (2009) Science , vol.6 , pp. 86-89
    • Ming, Y.1    Guo, S.2
  • 12
    • 77649304943 scopus 로고    scopus 로고
    • Improved ID3 algorithm based on attribute values[J]
    • Sun Aidong, Zhu Meijie. Improved ID3 algorithm based on attribute values[J]. Computer Engineering and Design, 2008.6:3011-3012
    • (2008) Computer Engineering and Design , vol.6 , pp. 3011-3012
    • Sun, A.1    Zhu, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.