default search action
International Journal of Internet Protocol Technology, Volume 5
Volume 5, Numbers 1/2, 2010
- Muhammad Abedin, Syeda Nessa, Latifur Khan, Ehab Al-Shaer, Mamoun Awad:
Analysis of firewall policy rules using traffic mining techniques. 3-22 - Khaled Salah, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam:
Discovering last-matching rules in popular open-source and commercial firewalls. 23-31 - Prasad Calyam, Gregg Trueb, Nathan Howes:
Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems. 32-43 - Zhiyong Huang, Xiaoping Zeng, Yong Liu:
Detecting and blocking P2P botnets through contact tracing chains. 44-54 - Basheer Al-Duwairi, Abdul-Raheem Masoud Mustafa:
Request diversion: a novel mechanism to counter P2P based DDoS attacks. 55-64 - Kuai Xu, Feng Wang, Supratik Bhattacharyya, Zhi-Li Zhang:
Real-time behaviour profiling for network monitoring. 65-80 - S. Malliga, A. Tamilarasi:
A hybrid scheme using packet marking and logging for IP traceback. 81-91 - Zouheir Trabelsi, Wassim El-Hajj:
On investigating ARP spoofing security solutions. 92-100 - Ibrahim Kamel, Hussam Juma:
Simplified watermarking scheme for sensor networks. 101-111
Volume 5, Number 3, 2010
- Nityananda Sarma, Sukumar Nandi:
Service differentiation using priority-based MAC protocol in MANETs. 115-131 - Yan Feng, K. L. Eddie Law, Dongjian He:
Comparisons of channel assignment algorithms for wireless mesh networks. 132-141 - Chakchai So-In, Raj Jain, Subharthi Paul, Jianli Pan:
Virtual ID: ID/locator split in a mobile IP environment for mobility, multihoming and location privacy for the next generation wireless networks. 142-153 - Ibrahim Kamel, Mohamed Saad, Sanaa A. Muhaureq:
Managing multi-priority services in ubiquitous computing applications. 154-165 - Hung-Yu Chien, Chin-Feng Lee, Shih-Bin Liu, Tzong-Chen Wu:
Enhancing convenience and situation-aware intelligence of smart home services using passive RFID and intelligent controls. 166-173
Volume 5, Number 4, 2010
- Emmanuel Lochin, Guillaume Jourjon, Sebastien Ardon, Patrick Sénac:
Promoting the use of reliable rate-based transport protocols: the Chameleon protocol. 175-189 - Ernesto Exposito, Christophe Chassot, Myriam Lamolle, Jorge R. Gomez-Montalvo, Nicolas Van Wambeke:
Open service-oriented architecture for transport protocols. 190-201 - Rung-Shiang Cheng, Ming-Yi Shih, Chih-Chun Yang:
Performance evaluation of threshold-based control mechanism for Vegas TCP in heterogeneous cloud networks. 202-209 - Hsing-Wen Wang:
Finance e-learning and simulation toward the cloud service environment. 210-218 - Lianfen Huang, Zi-Long Gao, Dan Guo, Han-Chieh Chao, Jong Hyuk Park:
A sensing policy based on the statistical property of licensed channel in cognitive network. 219-229
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.