Special issue: Recent advances in network security attacks and defences
International Journal of Internet Protocol Technology 5(1/2) 2010- Analysis of firewall policy rules using traffic mining techniques
- Discovering last-matching rules in popular open-source and commercial firewalls
- Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems
- Detecting and blocking P2P botnets through contact tracing chains
- Request diversion: a novel mechanism to counter P2P based DDoS attacks
- Real-time behaviour profiling for network monitoring
- A hybrid scheme using packet marking and logging for IP traceback
- On investigating ARP spoofing security solutions
Additional paper- Simplified watermarking scheme for sensor networks
No comments:
Post a Comment