Journal: IJIPT

Volume 5, Issue 4

175 -- 189Emmanuel Lochin, Guillaume Jourjon, Sebastien Ardon, Patrick Sénac. Promoting the use of reliable rate-based transport protocols: the Chameleon protocol
190 -- 201Ernesto Exposito, Christophe Chassot, Myriam Lamolle, Jorge R. Gomez-Montalvo, Nicolas Van Wambeke. Open service-oriented architecture for transport protocols
202 -- 209Rung-Shiang Cheng, Ming-Yi Shih, Chih-Chun Yang. Performance evaluation of threshold-based control mechanism for Vegas TCP in heterogeneous cloud networks
210 -- 218Hsing-Wen Wang. Finance e-learning and simulation toward the cloud service environment
219 -- 229Lianfen Huang, Zi-Long Gao, Dan Guo, Han-Chieh Chao, Jong Hyuk Park. A sensing policy based on the statistical property of licensed channel in cognitive network

Volume 5, Issue 3

115 -- 131Nityananda Sarma, Sukumar Nandi. Service differentiation using priority-based MAC protocol in MANETs
132 -- 141Yan Feng, K. L. Eddie Law, Dong Jian He. Comparisons of channel assignment algorithms for wireless mesh networks
142 -- 153Chakchai So-In, Raj Jain, Subharthi Paul, Jianli Pan. Virtual ID: ID/locator split in a mobile IP environment for mobility, multihoming and location privacy for the next generation wireless networks
154 -- 165Ibrahim Kamel, Mohamed Saad, Sanaa A. Muhaureq. Managing multi-priority services in ubiquitous computing applications
166 -- 173Hung-Yu Chien, Chin-Feng Lee, Shih-Bin Liu, Tzong-Chen Wu. Enhancing convenience and situation-aware intelligence of smart home services using passive RFID and intelligent controls

Volume 5, Issue 1/2

3 -- 22Muhammad Abedin, Syeda Nessa, Latifur Khan, Ehab Al-Shaer, Mamoun Awad. Analysis of firewall policy rules using traffic mining techniques
23 -- 31Khaled Salah, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam. Discovering last-matching rules in popular open-source and commercial firewalls
32 -- 43Prasad Calyam, Gregg Trueb, Nathan Howes. Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems
44 -- 54Zhiyong Huang, Xiaoping Zeng, Yong Liu. Detecting and blocking P2P botnets through contact tracing chains
55 -- 64Basheer Al-Duwairi, Abdul-Raheem Masoud Mustafa. Request diversion: a novel mechanism to counter P2P based DDoS attacks
65 -- 80Kuai Xu, Feng Wang 0002, Supratik Bhattacharyya, Zhi-Li Zhang. Real-time behaviour profiling for network monitoring
81 -- 91S. Malliga, A. Tamilarasi. A hybrid scheme using packet marking and logging for IP traceback
92 -- 100Zouheir Trabelsi, Wassim El-Hajj. On investigating ARP spoofing security solutions
101 -- 111Ibrahim Kamel, Hussam Juma. Simplified watermarking scheme for sensor networks