| 2009 |
| 31 | EE | Sascha Rehbock,
Ray Hunt:
Trustworthy clients: Extending TNC to web-based environments.
Computer Communications 32(5): 1006-1013 (2009) |
| 2008 |
| 30 | EE | Andrew Gin,
Ray Hunt:
Performance analysis of evolving wireless IEEE 802.11 security architectures.
Mobility Conference 2008: 101 |
| 29 | EE | Todd Kennedy,
Ray Hunt:
A review of WPAN security: attacks and prevention.
Mobility Conference 2008: 56 |
| 28 | EE | Mayank Keshariya,
Ray Hunt:
A new architecture for performance-based policy management in heterogeneous wireless networks.
Mobility Conference 2008: 97 |
| 27 | EE | Michael Durr,
Ray Hunt:
An analysis of security threats to mobile IPv6.
IJIPT 3(2): 107-118 (2008) |
| 26 | EE | Isaac Lee,
Ray Hunt:
A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks.
IJIPT 3(2): 128-135 (2008) |
| 2006 |
| 25 | EE | Kyeong Yoo,
Ray Hunt:
Implementation of an IPv6 multicast firewall testbed.
Computer Communications 29(16): 3079-3091 (2006) |
| 24 | EE | James Carpinter,
Ray Hunt:
Tightening the net: A review of current and next generation spam filtering tools.
Computers & Security 25(8): 566-578 (2006) |
| 2005 |
| 23 | EE | Simon Hansman,
Ray Hunt:
A taxonomy of network and computer attacks.
Computers & Security 24(1): 31-43 (2005) |
| 2004 |
| 22 | EE | Martin van den Nieuwelaar,
Ray Hunt:
Real-time carrier network traffic measurement, visualisation and topology modelling.
Computer Communications 27(1): 128-140 (2004) |
| 21 | EE | Ray Hunt:
Special issue on security and performance in wireless and mobile networks.
Computer Communications 27(17): 1683 (2004) |
| 20 | EE | Nilufar Baghaei,
Ray Hunt:
Review of quality of service performance in wireless LANs and 3G multimedia application services.
Computer Communications 27(17): 1684-1692 (2004) |
| 19 | EE | Nilufar Baghaei,
Ray Hunt:
Security performance of loaded IEEE 802.11b wireless networks.
Computer Communications 27(17): 1746-1756 (2004) |
| 18 | EE | Allister Cournane,
Ray Hunt:
An analysis of the tools used for the generation and prevention of spam.
Computers & Security 23(2): 154-166 (2004) |
| 2003 |
| 17 | EE | Ray Hunt,
Theuns Verwoerd:
Reactive firewalls - a new technique.
Computer Communications 26(12): 1302-1317 (2003) |
| 2002 |
| 16 | EE | Ray Hunt:
A review of quality of service mechanisms in IP-based networks - integrated and differentiated services, multi-layer switching, MPLS and traffic engineering.
Computer Communications 25(1): 100-108 (2002) |
| 15 | EE | Ray Hunt:
Special issue on Intrusion Detection systems.
Computer Communications 25(15): 1355 (2002) |
| 14 | EE | Theuns Verwoerd,
Ray Hunt:
Intrusion detection techniques and approaches.
Computer Communications 25(15): 1356-1365 (2002) |
| 13 | EE | Theuns Verwoerd,
Ray Hunt:
Security architecture testing using IDS - a case study.
Computer Communications 25(15): 1402-1412 (2002) |
| 1999 |
| 12 | EE | Brendon Harris,
Ray Hunt:
Fairwall certification.
Computers & Security 18(2): 165-177 (1999) |
| 11 | | Ray Hunt:
Evolving Technologies for New Internet Applications.
IEEE Internet Computing 3(5): 16-26 (1999) |
| 1998 |
| 10 | EE | Ray Hunt:
Internet - services, facilities, protocols and architecture.
Computer Communications 20(16): 1397-1411 (1998) |
| 9 | EE | Ray Hunt:
Internet/Intranet firewall security - policy, architecture and transaction services.
Computer Communications 21(13): 1107-1123 (1998) |
| 1997 |
| 8 | EE | Ray Hunt:
SNMP, SNMPv2 and CMIP - the technologies for multivendor network management.
Computer Communications 20(2): 73-88 (1997) |
| 1996 |
| 7 | EE | Ray Hunt:
ATM - protocols and architecture.
Computer Communications 19(6-7): 597-611 (1996) |
| 6 | EE | Ray Hunt:
Frame relay: protocols, architecture, operation and performance.
Computer Communications 19(9-10): 830-847 (1996) |
| 1992 |
| 5 | EE | Ray Hunt:
CCITT X.500 Directories - principles and applications.
Computer Communications 15(10): 636-645 (1992) |
| 1989 |
| 4 | | Ray Hunt:
A Review of Telecommunication Services Operating in New Zealand up to the Time of Deregulation.
IFIP Congress 1989: 467-472 |
| 1988 |
| 3 | EE | Ray Hunt:
Telecommunications development in New Zealand.
Computer Communications 11(5): 253-261 (1988) |
| 1984 |
| 2 | EE | Ray Hunt:
Open systems interconnection - the transport layer protocol.
Computer Communications 7(4): 186-197 (1984) |
| 1 | EE | Ray Hunt:
X.25 protocols in the airline industry.
Computer Communications 7(6): 283-288 (1984) |