default search action
Ray Hunt
Person information
- affiliation: University of Canterbury, Christchurch, New Zealand
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c20]Kin Suntana Tep, Ben Martini, Ray Hunt, Kim-Kwang Raymond Choo:
A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management. TrustCom/BigDataSE/ISPA (1) 2015: 1073-1080 - 2013
- [j35]Michael Pearce, Sherali Zeadally, Ray Hunt:
Virtualization: Issues, security threats, and solutions. ACM Comput. Surv. 45(2): 17:1-17:39 (2013) - [c19]Ray Hunt:
Security testing in Android networks - A practical case study. ICON 2013: 1-6 - 2012
- [j34]Ray Hunt, Sherali Zeadally:
Network Forensics: An Analysis of Techniques, Tools, and Trends. Computer 45(12): 36-43 (2012) - [j33]Sherali Zeadally, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, Aamir Hassan:
Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4): 217-241 (2012) - [c18]Ray Hunt:
Emerging Wireless Personal Area Networks (WPANs): - An analysis of techniques, tools and threats. ICON 2012: 274-279 - [c17]Ray Hunt:
New developments in network forensics - Tools and techniques. ICON 2012: 376-381 - 2011
- [c16]Ray Hunt, Jill Slay:
A new approach to developing attack taxonomies for network security - including case studies. ICON 2011: 281-286 - 2010
- [j32]Michael Pearce, Sherali Zeadally, Ray Hunt:
Assessing and Improving Authentication Confidence Management. Inf. Manag. Comput. Secur. 18(2): 124-139 (2010) - [c15]Ray Hunt, Jill Slay:
The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure. NSS 2010: 328-333 - [c14]Ray Hunt, Jill Slay:
Achieving critical infrastructure protection through the interaction of computer security and network forensics. PST 2010: 23-30
2000 – 2009
- 2009
- [j31]Sascha Rehbock, Ray Hunt:
Trustworthy clients: Extending TNC to web-based environments. Comput. Commun. 32(5): 1006-1013 (2009) - 2008
- [j30]Michael Dürr, Ray Hunt:
An analysis of security threats to mobile IPv6. Int. J. Internet Protoc. Technol. 3(2): 107-118 (2008) - [j29]Isaac Lee, Ray Hunt:
A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks. Int. J. Internet Protoc. Technol. 3(2): 128-135 (2008) - [c13]Todd Kennedy, Ray Hunt:
A review of WPAN security: attacks and prevention. Mobility Conference 2008: 56 - [c12]Mayank Keshariya, Ray Hunt:
A new architecture for performance-based policy management in heterogeneous wireless networks. Mobility Conference 2008: 97 - [c11]Andrew Gin, Ray Hunt:
Performance analysis of evolving wireless IEEE 802.11 security architectures. Mobility Conference 2008: 101 - 2006
- [j28]Kyeong Yoo, Ray Hunt:
Implementation of an IPv6 multicast firewall testbed. Comput. Commun. 29(16): 3079-3091 (2006) - [j27]James Carpinter, Ray Hunt:
Tightening the net: A review of current and next generation spam filtering tools. Comput. Secur. 25(8): 566-578 (2006) - [c10]Ray Hunt, James Carpinter:
Current and New Developments in Spam Filtering. ICON 2006: 1-6 - 2005
- [j26]Simon Hansman, Ray Hunt:
A taxonomy of network and computer attacks. Comput. Secur. 24(1): 31-43 (2005) - [r1]Ray Hunt, Jenne Wong:
Security Architectures in Wireless LANs. Handbook of Algorithms for Wireless Networking and Mobile Computing 2005 - 2004
- [j25]Martin van den Nieuwelaar, Ray Hunt:
Real-time carrier network traffic measurement, visualisation and topology modelling. Comput. Commun. 27(1): 128-140 (2004) - [j24]Ray Hunt:
Special issue on security and performance in wireless and mobile networks. Comput. Commun. 27(17): 1683 (2004) - [j23]Nilufar Baghaei, Ray Hunt:
Review of quality of service performance in wireless LANs and 3G multimedia application services. Comput. Commun. 27(17): 1684-1692 (2004) - [j22]Nilufar Baghaei, Ray Hunt:
Security performance of loaded IEEE 802.11b wireless networks. Comput. Commun. 27(17): 1746-1756 (2004) - [j21]Allister Cournane, Ray Hunt:
An analysis of the tools used for the generation and prevention of spam. Comput. Secur. 23(2): 154-166 (2004) - [c9]Nilufar Baghaei, Ray Hunt:
IEEE 802.11 wireless LAN security performance using multiple clients. ICON 2004: 299-303 - 2003
- [j20]Ray Hunt, Theuns Verwoerd:
Reactive firewalls - a new technique. Comput. Commun. 26(12): 1302-1317 (2003) - [c8]Ray Hunt, John Vargo, Jenne Wong:
Impact of Security Architectures on Wireless Network Performance. MWCN 2003 - 2002
- [j19]Ray Hunt:
A review of quality of service mechanisms in IP-based networks - integrated and differentiated services, multi-layer switching, MPLS and traffic engineering. Comput. Commun. 25(1): 100-108 (2002) - [j18]Ray Hunt:
Special issue on Intrusion Detection systems. Comput. Commun. 25(15): 1355 (2002) - [j17]Theuns Verwoerd, Ray Hunt:
Intrusion detection techniques and approaches. Comput. Commun. 25(15): 1356-1365 (2002) - [j16]Theuns Verwoerd, Ray Hunt:
Security architecture testing using IDS - a case study. Comput. Commun. 25(15): 1402-1412 (2002) - [c7]Matt Smith, Ray Hunt:
Network security using NAT and NAPT. ICON 2002: 355-360 - [c6]Theuns Verwoerd, Ray Hunt:
Policy and implementation of an adaptive firewall. ICON 2002: 434-439 - [p4]Ray Hunt, John Vargo:
Network Environments, Managing. Encyclopedia of Information Systems 2002: 279-301 - [p3]Ray Hunt:
Frame Relay. Encyclopedia of Information Systems 2002: 371-390 - [p2]Ray Hunt:
Transmission Control Protocol/Internet Protocol (TCP/IP). Encyclopedia of Information Systems 2002: 489-510 - [p1]John Vargo, Ray Hunt:
Voice Communications. Encyclopedia of Information Systems 2002: 633-647 - 2001
- [j15]Ray Hunt:
Technological infrastructure for PKI and digital certification. Comput. Commun. 24(14): 1460-1471 (2001) - [c5]Theuns Verwoerd, Ray Hunt:
GLOB: generic load balancing. ICON 2001: 70-75 - [c4]Ray Hunt:
PKI and digital certification infrastructure. ICON 2001: 234-239 - [c3]Ray Hunt:
IP quality of service architectures. ICON 2001: 338-343 - 2000
- [j14]A. King, Ray Hunt:
Protocols and architecture for managing TCP/IP network infrastructures. Comput. Commun. 23(16): 1558-1572 (2000)
1990 – 1999
- 1999
- [j13]B. Harris, Ray Hunt:
TCP/IP security threats and attack methods. Comput. Commun. 22(10): 885-897 (1999) - [j12]Brendon Harris, Ray Hunt:
Fairwall certification. Comput. Secur. 18(2): 165-177 (1999) - [j11]Ray Hunt:
Evolving Technologies for New Internet Applications. IEEE Internet Comput. 3(5): 16-26 (1999) - 1998
- [j10]Ray Hunt:
Internet - services, facilities, protocols and architecture. Comput. Commun. 20(16): 1397-1411 (1998) - [j9]Ray Hunt:
Internet/Intranet firewall security - policy, architecture and transaction services. Comput. Commun. 21(13): 1107-1123 (1998) - 1997
- [j8]Ray Hunt:
SNMP, SNMPv2 and CMIP - the technologies for multivendor network management. Comput. Commun. 20(2): 73-88 (1997) - 1996
- [j7]Ray Hunt:
ATM - protocols and architecture. Comput. Commun. 19(6-7): 597-611 (1996) - [j6]Ray Hunt:
Frame relay: protocols, architecture, operation and performance. Comput. Commun. 19(9-10): 830-847 (1996) - 1995
- [c2]Ray Hunt:
Telecommunication Interconnection Services-Linking Local and Wide Area Information Systems. PACIS 1995: 45 - 1994
- [j5]Ray Hunt:
Useful tutorial on OSI applications. Comput. Commun. 17(2): 141 (1994) - 1992
- [j4]Ray Hunt:
CCITT X.500 Directories - principles and applications. Comput. Commun. 15(10): 636-645 (1992)
1980 – 1989
- 1989
- [c1]Ray Hunt:
A Review of Telecommunication Services Operating in New Zealand up to the Time of Deregulation. IFIP Congress 1989: 467-472 - 1988
- [j3]Ray Hunt:
Telecommunications development in New Zealand. Comput. Commun. 11(5): 253-261 (1988) - 1984
- [j2]Ray Hunt:
Open systems interconnection - the transport layer protocol. Comput. Commun. 7(4): 186-197 (1984) - [j1]Ray Hunt:
X.25 protocols in the airline industry. Comput. Commun. 7(6): 283-288 (1984)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint