Ray Hunt

Affiliations:
  • University of Canterbury, Christchurch, New Zealand


According to our database1, Ray Hunt authored at least 60 papers between 1984 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2013
Virtualization: Issues, security threats, and solutions.
ACM Comput. Surv., 2013

Security testing in Android networks - A practical case study.
Proceedings of the 19th IEEE International Conference on Networks, 2013

2012
Vehicular ad hoc networks (VANETS): status, results, and challenges.
Telecommun. Syst., 2012

Network Forensics: An Analysis of Techniques, Tools, and Trends.
Computer, 2012

New developments in network forensics - Tools and techniques.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Emerging Wireless Personal Area Networks (WPANs): - An analysis of techniques, tools and threats.
Proceedings of the 18th IEEE International Conference on Networks, 2012

2011
A new approach to developing attack taxonomies for network security - including case studies.
Proceedings of the 17th IEEE International Conference on Networks, 2011

2010
Assessing and Improving Authentication Confidence Management.
Inf. Manag. Comput. Secur., 2010

Achieving critical infrastructure protection through the interaction of computer security and network forensics.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure.
Proceedings of the Fourth International Conference on Network and System Security, 2010

2009
Trustworthy clients: Extending TNC to web-based environments.
Comput. Commun., 2009

2008
A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks.
Int. J. Internet Protoc. Technol., 2008

An analysis of security threats to mobile IPv6.
Int. J. Internet Protoc. Technol., 2008

A new architecture for performance-based policy management in heterogeneous wireless networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

A review of WPAN security: attacks and prevention.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Performance analysis of evolving wireless IEEE 802.11 security architectures.
Proceedings of the 5th International Conference on Mobile Technology, 2008

2006
Tightening the net: A review of current and next generation spam filtering tools.
Comput. Secur., 2006

Implementation of an IPv6 multicast firewall testbed.
Comput. Commun., 2006

Current and New Developments in Spam Filtering.
Proceedings of the 14th IEEE International Conference on Networks, 2006

2005
Security Architectures in Wireless LANs.
Proceedings of the Handbook of Algorithms for Wireless Networking and Mobile Computing., 2005

A taxonomy of network and computer attacks.
Comput. Secur., 2005

2004
An analysis of the tools used for the generation and prevention of spam.
Comput. Secur., 2004

Real-time carrier network traffic measurement, visualisation and topology modelling.
Comput. Commun., 2004

Special issue on security and performance in wireless and mobile networks.
Comput. Commun., 2004

Security performance of loaded IEEE 802.11b wireless networks.
Comput. Commun., 2004

Review of quality of service performance in wireless LANs and 3G multimedia application services.
Comput. Commun., 2004

IEEE 802.11 wireless LAN security performance using multiple clients.
Proceedings of the 12th IEEE International Conference on Networks, 2004

2003
Reactive firewalls - a new technique.
Comput. Commun., 2003

Impact of Security Architectures on Wireless Network Performance.
Proceedings of the Mobile and Wireless Communications Networks, 2003

2002
Voice Communications.
Proceedings of the Encyclopedia of Information Systems, 2002

Network Environments, Managing.
Proceedings of the Encyclopedia of Information Systems, 2002

Transmission Control Protocol/Internet Protocol (TCP/IP).
Proceedings of the Encyclopedia of Information Systems, 2002

Frame Relay.
Proceedings of the Encyclopedia of Information Systems, 2002

Security architecture testing using IDS - a case study.
Comput. Commun., 2002

Intrusion detection techniques and approaches.
Comput. Commun., 2002

Special issue on Intrusion Detection systems.
Comput. Commun., 2002

A review of quality of service mechanisms in IP-based networks - integrated and differentiated services, multi-layer switching, MPLS and traffic engineering.
Comput. Commun., 2002

Policy and implementation of an adaptive firewall.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

Network security using NAT and NAPT.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

2001
Technological infrastructure for PKI and digital certification.
Comput. Commun., 2001

GLOB: generic load balancing.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

IP quality of service architectures.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

PKI and digital certification infrastructure.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

2000
Protocols and architecture for managing TCP/IP network infrastructures.
Comput. Commun., 2000

1999
Evolving Technologies for New Internet Applications.
IEEE Internet Comput., 1999

Fairwall certification.
Comput. Secur., 1999

TCP/IP security threats and attack methods.
Comput. Commun., 1999

1998
Internet - services, facilities, protocols and architecture.
Comput. Commun., 1998

Internet/Intranet firewall security - policy, architecture and transaction services.
Comput. Commun., 1998

1997
SNMP, SNMPv2 and CMIP - the technologies for multivendor network management.
Comput. Commun., 1997

1996
Frame relay: protocols, architecture, operation and performance.
Comput. Commun., 1996

ATM - protocols and architecture.
Comput. Commun., 1996

1995
Telecommunication Interconnection Services-Linking Local and Wide Area Information Systems.
Proceedings of the Second Pacific Asia Conference on Information Systems, 1995

1994
Useful tutorial on OSI applications.
Comput. Commun., 1994

1992
CCITT X.500 Directories - principles and applications.
Comput. Commun., 1992

1989
A Review of Telecommunication Services Operating in New Zealand up to the Time of Deregulation.
Proceedings of the Information Processing 89, Proceedings of the IFIP 11th World Computer Congress, San Francisco, USA, August 28, 1989

1988
Telecommunications development in New Zealand.
Comput. Commun., 1988

1984
X.25 protocols in the airline industry.
Comput. Commun., 1984

Open systems interconnection - the transport layer protocol.
Comput. Commun., 1984


  Loading...