
International Journal of Internet Protocol Technology
2010 Vol.5 No.1/2
Special Issue on Recent Advances in Network Security Attacks and Defences
Guest Editors: Dr. Khaled Salah, Dr. Mohammed Sqalli and Dr. Mohamed Gouda
Pages | Title and author(s) |
3-22 | Analysis of firewall policy rules using traffic mining techniquesMuhammad Abedin, Syeda Nessa, Latifur Khan, Ehab Al-Shaer, Mamoun Awad DOI: 10.1504/IJIPT.2010.032611 |
23-31 | Discovering last-matching rules in popular open-source and commercial firewallsK. Salah, K. Sattar, Z.A. Baig, M.H. Sqalli, P. Calyam DOI: 10.1504/IJIPT.2010.032612 |
32-43 | Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systemsPrasad Calyam, Gregg Trueb, Nathan Howes DOI: 10.1504/IJIPT.2010.032613 |
44-54 | Detecting and blocking P2P botnets through contact tracing chainsZhiyong Huang, Xiaoping Zeng, Yong Liu DOI: 10.1504/IJIPT.2010.032614 |
55-64 | Request diversion: a novel mechanism to counter P2P based DDoS attacksBasheer Al-Duwairi, Abdul-Raheem Masoud Mustafa DOI: 10.1504/IJIPT.2010.032615 |
65-80 | Real-time behaviour profiling for network monitoringKuai Xu, Feng Wang, Supratik Bhattacharyya, Zhi-Li Zhang DOI: 10.1504/IJIPT.2010.032616 |
81-91 | A hybrid scheme using packet marking and logging for IP tracebackS. Malliga, A. Tamilarasi DOI: 10.1504/IJIPT.2010.032617 |
92-100 | On investigating ARP spoofing security solutionsZouheir Trabelsi, Wassim El-Hajj DOI: 10.1504/IJIPT.2010.032618 |
Additional paper |
101-111 | Simplified watermarking scheme for sensor networksIbrahim Kamel, Hussam Juma DOI: 10.1504/IJIPT.2010.032619 |