The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ray Hunt: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ray Hunt
    A Review of Telecommunication Services Operating in New Zealand up to the Time of Deregulation. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1989, pp:467-472 [Conf]
  2. Nilufar Baghaei, Ray Hunt
    Review of quality of service performance in wireless LANs and 3G multimedia application services. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:17, pp:1684-1692 [Journal]
  3. Nilufar Baghaei, Ray Hunt
    Security performance of loaded IEEE 802.11b wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:17, pp:1746-1756 [Journal]
  4. Ray Hunt
    A review of quality of service mechanisms in IP-based networks - integrated and differentiated services, multi-layer switching, MPLS and traffic engineering. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:1, pp:100-108 [Journal]
  5. Ray Hunt
    Special issue on Intrusion Detection systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:15, pp:1355- [Journal]
  6. Ray Hunt
    Special issue on security and performance in wireless and mobile networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:17, pp:1683- [Journal]
  7. Ray Hunt
    Open systems interconnection - the transport layer protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1984, v:7, n:4, pp:186-197 [Journal]
  8. Ray Hunt
    X.25 protocols in the airline industry. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1984, v:7, n:6, pp:283-288 [Journal]
  9. Ray Hunt
    Telecommunications development in New Zealand. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1988, v:11, n:5, pp:253-261 [Journal]
  10. Ray Hunt
    CCITT X.500 Directories - principles and applications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1992, v:15, n:10, pp:636-645 [Journal]
  11. Ray Hunt
    ATM - protocols and architecture. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:6-7, pp:597-611 [Journal]
  12. Ray Hunt
    Frame relay: protocols, architecture, operation and performance. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:830-847 [Journal]
  13. Ray Hunt
    SNMP, SNMPv2 and CMIP - the technologies for multivendor network management. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:2, pp:73-88 [Journal]
  14. Ray Hunt
    Internet/Intranet firewall security - policy, architecture and transaction services. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:13, pp:1107-1123 [Journal]
  15. Ray Hunt
    Internet - services, facilities, protocols and architecture. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:20, n:16, pp:1397-1411 [Journal]
  16. Ray Hunt, Theuns Verwoerd
    Reactive firewalls - a new technique. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:12, pp:1302-1317 [Journal]
  17. Martin van den Nieuwelaar, Ray Hunt
    Real-time carrier network traffic measurement, visualisation and topology modelling. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:1, pp:128-140 [Journal]
  18. Theuns Verwoerd, Ray Hunt
    Intrusion detection techniques and approaches. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:15, pp:1356-1365 [Journal]
  19. Theuns Verwoerd, Ray Hunt
    Security architecture testing using IDS - a case study. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:15, pp:1402-1412 [Journal]
  20. Kyeong Yoo, Ray Hunt
    Implementation of an IPv6 multicast firewall testbed. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:16, pp:3079-3091 [Journal]
  21. Allister Cournane, Ray Hunt
    An analysis of the tools used for the generation and prevention of spam. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:2, pp:154-166 [Journal]
  22. Simon Hansman, Ray Hunt
    A taxonomy of network and computer attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:1, pp:31-43 [Journal]
  23. Brendon Harris, Ray Hunt
    Fairwall certification. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:2, pp:165-177 [Journal]
  24. James Carpinter, Ray Hunt
    Tightening the net: A review of current and next generation spam filtering tools. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:8, pp:566-578 [Journal]
  25. Ray Hunt
    Evolving Technologies for New Internet Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1999, v:3, n:5, pp:16-26 [Journal]

  26. A new architecture for performance-based policy management in heterogeneous wireless networks. [Citation Graph (, )][DBLP]


  27. Performance analysis of evolving wireless IEEE 802.11 security architectures. [Citation Graph (, )][DBLP]


  28. A review of WPAN security: attacks and prevention. [Citation Graph (, )][DBLP]


  29. Trustworthy clients: Extending TNC to web-based environments. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002