Author:
Park PyungKoo,Ryu HoYong,Hong GyungTae,Yoo SeongMin,Park Jaehyung,Ryou JaeCheol
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Jung, Y., “Tunnel gateway satisfying mobility and security requirements of mobile and IP-based networks”, Communications and Networks, 2011
2. Palomares, D., Palomares, D., Migault, D., Migault, D., Velasquez, W., Velasquez, W., et al., “High Availability for IPsec VPN Platforms: ClusterIP Evaluation”, Availability, Reliability and Security (ARES), 2013
3. Dewan, P., Naidu, D. K. S., & Durham, D. M., “Denial of service attacks Using Internet Key Exchange protocol” Consumer Communications and Networking Conference, 2008
4. Kuboniwa, A., Tamura, T., Huruta, Y., Wada, Y., Satou, H., & Motono, T., “IPsec-GW redundancy method with high reliability”, Information and Telecommunication Technologies (APSITT), 2010
5. Y. Xie and S. Z. Yu, “A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors,” IEEE/ACM Transactions on Networking 2009