3 | -- | 22 | Muhammad Abedin, Syeda Nessa, Latifur Khan, Ehab Al-Shaer, Mamoun Awad. Analysis of firewall policy rules using traffic mining techniques |
23 | -- | 31 | Khaled Salah, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam. Discovering last-matching rules in popular open-source and commercial firewalls |
32 | -- | 43 | Prasad Calyam, Gregg Trueb, Nathan Howes. Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems |
44 | -- | 54 | Zhiyong Huang, Xiaoping Zeng, Yong Liu. Detecting and blocking P2P botnets through contact tracing chains |
55 | -- | 64 | Basheer Al-Duwairi, Abdul-Raheem Masoud Mustafa. Request diversion: a novel mechanism to counter P2P based DDoS attacks |
65 | -- | 80 | Kuai Xu, Feng Wang 0002, Supratik Bhattacharyya, Zhi-Li Zhang. Real-time behaviour profiling for network monitoring |
81 | -- | 91 | S. Malliga, A. Tamilarasi. A hybrid scheme using packet marking and logging for IP traceback |
92 | -- | 100 | Zouheir Trabelsi, Wassim El-Hajj. On investigating ARP spoofing security solutions |
101 | -- | 111 | Ibrahim Kamel, Hussam Juma. Simplified watermarking scheme for sensor networks |