Application of ID3 Algorithm in Information Asset Identification
Yong Hua, Yunlong Zhang
Available Online November 2012.
- https://doi.org/10.2991/citcs.2012.38How to use a DOI?
- information Security; decision tree; ID3 algorithm
- In the issue of information security risk evaluation, the asset, the threat and the vulnerability are the three most important elements. Information asset identification is a primary link of information security risk evaluation process. In this paper, the decision tree algorithm was applied into the identification of information assets; the basic process of ID3 algorithm are described; the data of information system property is classified by ID3 algorithm; the decision tree was made; and the rules are extracted for providing basis of information asset recognition.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Yong Hua AU - Yunlong Zhang PY - 2012/11 DA - 2012/11 TI - Application of ID3 Algorithm in Information Asset Identification BT - 2012 National Conference on Information Technology and Computer Science PB - Atlantis Press SP - 138 EP - 140 SN - 1951-6851 UR - https://doi.org/10.2991/citcs.2012.38 DO - https://doi.org/10.2991/citcs.2012.38 ID - Hua2012/11 ER -