dblp.uni-trier.dewww.uni-trier.de

Ray Hunt

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
31EESascha Rehbock, Ray Hunt: Trustworthy clients: Extending TNC to web-based environments. Computer Communications 32(5): 1006-1013 (2009)
2008
30EEAndrew Gin, Ray Hunt: Performance analysis of evolving wireless IEEE 802.11 security architectures. Mobility Conference 2008: 101
29EETodd Kennedy, Ray Hunt: A review of WPAN security: attacks and prevention. Mobility Conference 2008: 56
28EEMayank Keshariya, Ray Hunt: A new architecture for performance-based policy management in heterogeneous wireless networks. Mobility Conference 2008: 97
27EEMichael Durr, Ray Hunt: An analysis of security threats to mobile IPv6. IJIPT 3(2): 107-118 (2008)
26EEIsaac Lee, Ray Hunt: A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks. IJIPT 3(2): 128-135 (2008)
2006
25EEKyeong Yoo, Ray Hunt: Implementation of an IPv6 multicast firewall testbed. Computer Communications 29(16): 3079-3091 (2006)
24EEJames Carpinter, Ray Hunt: Tightening the net: A review of current and next generation spam filtering tools. Computers & Security 25(8): 566-578 (2006)
2005
23EESimon Hansman, Ray Hunt: A taxonomy of network and computer attacks. Computers & Security 24(1): 31-43 (2005)
2004
22EEMartin van den Nieuwelaar, Ray Hunt: Real-time carrier network traffic measurement, visualisation and topology modelling. Computer Communications 27(1): 128-140 (2004)
21EERay Hunt: Special issue on security and performance in wireless and mobile networks. Computer Communications 27(17): 1683 (2004)
20EENilufar Baghaei, Ray Hunt: Review of quality of service performance in wireless LANs and 3G multimedia application services. Computer Communications 27(17): 1684-1692 (2004)
19EENilufar Baghaei, Ray Hunt: Security performance of loaded IEEE 802.11b wireless networks. Computer Communications 27(17): 1746-1756 (2004)
18EEAllister Cournane, Ray Hunt: An analysis of the tools used for the generation and prevention of spam. Computers & Security 23(2): 154-166 (2004)
2003
17EERay Hunt, Theuns Verwoerd: Reactive firewalls - a new technique. Computer Communications 26(12): 1302-1317 (2003)
2002
16EERay Hunt: A review of quality of service mechanisms in IP-based networks - integrated and differentiated services, multi-layer switching, MPLS and traffic engineering. Computer Communications 25(1): 100-108 (2002)
15EERay Hunt: Special issue on Intrusion Detection systems. Computer Communications 25(15): 1355 (2002)
14EETheuns Verwoerd, Ray Hunt: Intrusion detection techniques and approaches. Computer Communications 25(15): 1356-1365 (2002)
13EETheuns Verwoerd, Ray Hunt: Security architecture testing using IDS - a case study. Computer Communications 25(15): 1402-1412 (2002)
1999
12EEBrendon Harris, Ray Hunt: Fairwall certification. Computers & Security 18(2): 165-177 (1999)
11 Ray Hunt: Evolving Technologies for New Internet Applications. IEEE Internet Computing 3(5): 16-26 (1999)
1998
10EERay Hunt: Internet - services, facilities, protocols and architecture. Computer Communications 20(16): 1397-1411 (1998)
9EERay Hunt: Internet/Intranet firewall security - policy, architecture and transaction services. Computer Communications 21(13): 1107-1123 (1998)
1997
8EERay Hunt: SNMP, SNMPv2 and CMIP - the technologies for multivendor network management. Computer Communications 20(2): 73-88 (1997)
1996
7EERay Hunt: ATM - protocols and architecture. Computer Communications 19(6-7): 597-611 (1996)
6EERay Hunt: Frame relay: protocols, architecture, operation and performance. Computer Communications 19(9-10): 830-847 (1996)
1992
5EERay Hunt: CCITT X.500 Directories - principles and applications. Computer Communications 15(10): 636-645 (1992)
1989
4 Ray Hunt: A Review of Telecommunication Services Operating in New Zealand up to the Time of Deregulation. IFIP Congress 1989: 467-472
1988
3EERay Hunt: Telecommunications development in New Zealand. Computer Communications 11(5): 253-261 (1988)
1984
2EERay Hunt: Open systems interconnection - the transport layer protocol. Computer Communications 7(4): 186-197 (1984)
1EERay Hunt: X.25 protocols in the airline industry. Computer Communications 7(6): 283-288 (1984)

Coauthor Index

1Nilufar Baghaei [19] [20]
2James Carpinter [24]
3Allister Cournane [18]
4Michael Durr [27]
5Andrew Gin [30]
6Simon Hansman [23]
7Brendon Harris [12]
8Todd Kennedy [29]
9Mayank Keshariya [28]
10Isaac Lee [26]
11Martin van den Nieuwelaar [22]
12Sascha Rehbock [31]
13Theuns Verwoerd [13] [14] [17]
14Kyeong Yoo [25]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)