2009 |
31 | EE | Sascha Rehbock,
Ray Hunt:
Trustworthy clients: Extending TNC to web-based environments.
Computer Communications 32(5): 1006-1013 (2009) |
2008 |
30 | EE | Andrew Gin,
Ray Hunt:
Performance analysis of evolving wireless IEEE 802.11 security architectures.
Mobility Conference 2008: 101 |
29 | EE | Todd Kennedy,
Ray Hunt:
A review of WPAN security: attacks and prevention.
Mobility Conference 2008: 56 |
28 | EE | Mayank Keshariya,
Ray Hunt:
A new architecture for performance-based policy management in heterogeneous wireless networks.
Mobility Conference 2008: 97 |
27 | EE | Michael Durr,
Ray Hunt:
An analysis of security threats to mobile IPv6.
IJIPT 3(2): 107-118 (2008) |
26 | EE | Isaac Lee,
Ray Hunt:
A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks.
IJIPT 3(2): 128-135 (2008) |
2006 |
25 | EE | Kyeong Yoo,
Ray Hunt:
Implementation of an IPv6 multicast firewall testbed.
Computer Communications 29(16): 3079-3091 (2006) |
24 | EE | James Carpinter,
Ray Hunt:
Tightening the net: A review of current and next generation spam filtering tools.
Computers & Security 25(8): 566-578 (2006) |
2005 |
23 | EE | Simon Hansman,
Ray Hunt:
A taxonomy of network and computer attacks.
Computers & Security 24(1): 31-43 (2005) |
2004 |
22 | EE | Martin van den Nieuwelaar,
Ray Hunt:
Real-time carrier network traffic measurement, visualisation and topology modelling.
Computer Communications 27(1): 128-140 (2004) |
21 | EE | Ray Hunt:
Special issue on security and performance in wireless and mobile networks.
Computer Communications 27(17): 1683 (2004) |
20 | EE | Nilufar Baghaei,
Ray Hunt:
Review of quality of service performance in wireless LANs and 3G multimedia application services.
Computer Communications 27(17): 1684-1692 (2004) |
19 | EE | Nilufar Baghaei,
Ray Hunt:
Security performance of loaded IEEE 802.11b wireless networks.
Computer Communications 27(17): 1746-1756 (2004) |
18 | EE | Allister Cournane,
Ray Hunt:
An analysis of the tools used for the generation and prevention of spam.
Computers & Security 23(2): 154-166 (2004) |
2003 |
17 | EE | Ray Hunt,
Theuns Verwoerd:
Reactive firewalls - a new technique.
Computer Communications 26(12): 1302-1317 (2003) |
2002 |
16 | EE | Ray Hunt:
A review of quality of service mechanisms in IP-based networks - integrated and differentiated services, multi-layer switching, MPLS and traffic engineering.
Computer Communications 25(1): 100-108 (2002) |
15 | EE | Ray Hunt:
Special issue on Intrusion Detection systems.
Computer Communications 25(15): 1355 (2002) |
14 | EE | Theuns Verwoerd,
Ray Hunt:
Intrusion detection techniques and approaches.
Computer Communications 25(15): 1356-1365 (2002) |
13 | EE | Theuns Verwoerd,
Ray Hunt:
Security architecture testing using IDS - a case study.
Computer Communications 25(15): 1402-1412 (2002) |
1999 |
12 | EE | Brendon Harris,
Ray Hunt:
Fairwall certification.
Computers & Security 18(2): 165-177 (1999) |
11 | | Ray Hunt:
Evolving Technologies for New Internet Applications.
IEEE Internet Computing 3(5): 16-26 (1999) |
1998 |
10 | EE | Ray Hunt:
Internet - services, facilities, protocols and architecture.
Computer Communications 20(16): 1397-1411 (1998) |
9 | EE | Ray Hunt:
Internet/Intranet firewall security - policy, architecture and transaction services.
Computer Communications 21(13): 1107-1123 (1998) |
1997 |
8 | EE | Ray Hunt:
SNMP, SNMPv2 and CMIP - the technologies for multivendor network management.
Computer Communications 20(2): 73-88 (1997) |
1996 |
7 | EE | Ray Hunt:
ATM - protocols and architecture.
Computer Communications 19(6-7): 597-611 (1996) |
6 | EE | Ray Hunt:
Frame relay: protocols, architecture, operation and performance.
Computer Communications 19(9-10): 830-847 (1996) |
1992 |
5 | EE | Ray Hunt:
CCITT X.500 Directories - principles and applications.
Computer Communications 15(10): 636-645 (1992) |
1989 |
4 | | Ray Hunt:
A Review of Telecommunication Services Operating in New Zealand up to the Time of Deregulation.
IFIP Congress 1989: 467-472 |
1988 |
3 | EE | Ray Hunt:
Telecommunications development in New Zealand.
Computer Communications 11(5): 253-261 (1988) |
1984 |
2 | EE | Ray Hunt:
Open systems interconnection - the transport layer protocol.
Computer Communications 7(4): 186-197 (1984) |
1 | EE | Ray Hunt:
X.25 protocols in the airline industry.
Computer Communications 7(6): 283-288 (1984) |