Period of time: 2013年1-2期
Publisher: Inderscience Publishers
Founded in: 2005
Total resources: 24
ISSN: 1743-8209
Subject: TP Automation Technology , Computer Technology
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
International Journal of Internet Protocol Technology,volume 5,issue 1-2
Menu
Analysis of firewall policy rules using traffic mining techniques
By Abedin Muhammad,Nessa Syeda,Khan Latifur,Al-Shaer Ehab,Awad Mamoun in (2010)
International Journal of Internet Protocol Technology,volume 5,issue 1-2 , Vol. 5, Iss. 1-2, 2010-04 , pp.Discovering last-matching rules in popular open-source and commercial firewalls
By Salah K.,Sattar K.,Baig Z.A.,Sqalli M.H.,Calyam P. in (2010)
International Journal of Internet Protocol Technology,volume 5,issue 1-2 , Vol. 5, Iss. 1-2, 2010-04 , pp.Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems
By Calyam Prasad,Trueb Gregg,Howes Nathan in (2010)
International Journal of Internet Protocol Technology,volume 5,issue 1-2 , Vol. 5, Iss. 1-2, 2010-04 , pp.Detecting and blocking P2P botnets through contact tracing chains
By Huang Zhiyong,Zeng Xiaoping,Liu Yong in (2010)
International Journal of Internet Protocol Technology,volume 5,issue 1-2 , Vol. 5, Iss. 1-2, 2010-04 , pp.Request diversion: a novel mechanism to counter P2P based DDoS attacks
By Al-Duwairi Basheer,Mustafa Abdul-Raheem Masoud in (2010)
International Journal of Internet Protocol Technology,volume 5,issue 1-2 , Vol. 5, Iss. 1-2, 2010-04 , pp.Real-time behaviour profiling for network monitoring
By Xu Kuai,Wang Feng,Bhattacharyya Supratik,Zhang Zhi-Li in (2010)
International Journal of Internet Protocol Technology,volume 5,issue 1-2 , Vol. 5, Iss. 1-2, 2010-04 , pp.A hybrid scheme using packet marking and logging for IP traceback
By Malliga S.,Tamilarasi A. in (2010)
International Journal of Internet Protocol Technology,volume 5,issue 1-2 , Vol. 5, Iss. 1-2, 2010-04 , pp.On investigating ARP spoofing security solutions
By Trabelsi Zouheir,El-Hajj Wassim in (2010)
International Journal of Internet Protocol Technology,volume 5,issue 1-2 , Vol. 5, Iss. 1-2, 2010-04 , pp.Simplified watermarking scheme for sensor networks
By Kamel Ibrahim,Juma Hussam in (2010)
International Journal of Internet Protocol Technology,volume 5,issue 1-2 , Vol. 5, Iss. 1-2, 2010-04 , pp.