Journal: IJIPT

Volume 5, Issue 1/2

3 -- 22Muhammad Abedin, Syeda Nessa, Latifur Khan, Ehab Al-Shaer, Mamoun Awad. Analysis of firewall policy rules using traffic mining techniques
23 -- 31Khaled Salah, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam. Discovering last-matching rules in popular open-source and commercial firewalls
32 -- 43Prasad Calyam, Gregg Trueb, Nathan Howes. Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems
44 -- 54Zhiyong Huang, Xiaoping Zeng, Yong Liu. Detecting and blocking P2P botnets through contact tracing chains
55 -- 64Basheer Al-Duwairi, Abdul-Raheem Masoud Mustafa. Request diversion: a novel mechanism to counter P2P based DDoS attacks
65 -- 80Kuai Xu, Feng Wang 0002, Supratik Bhattacharyya, Zhi-Li Zhang. Real-time behaviour profiling for network monitoring
81 -- 91S. Malliga, A. Tamilarasi. A hybrid scheme using packet marking and logging for IP traceback
92 -- 100Zouheir Trabelsi, Wassim El-Hajj. On investigating ARP spoofing security solutions
101 -- 111Ibrahim Kamel, Hussam Juma. Simplified watermarking scheme for sensor networks