Computer Science and
     Software Engineering

Computer Science and Software Engineering

Papers

(Under construction.)

I. Papers in Refereed Journals

  1. Rehbock, S, Hunt, R., Mitchell, C., Trustworthy Clients: Extending TNC to Web-Based Environments. Computer Communications, Elsevier, U.K., 2008 (under review).
  2. Lee, I. and Hunt, R., A Novel Design of a VoIP Firewall Proxy to Mitigate SIP-based Flooding Attacks, International Journal of Internet Protocol Technology, Inderscience, Vol x, 2008 (in process).
  3. Dürr, M, and Hunt, R. An Analysis of Security Threats to Mobile IPv6, International Journal of Internet Protocol Technology, Inderscience, Vol x, 2008 (in process).
  4. Yoo, K. and Hunt, R., Implementation of an IPv6 Multicast Firewall Testbed, Special Issue on IPv6, Computer Communications, Elsevier, U.K., Vol 29. No 16, 2006, pp 3079-3091.
  5. Carpinter, J. and Hunt, R., Tightening the Net: A Review of Current and Next Generation Spam Prevention Tools, Computers and Security, Elsevier, UK, Vol 25 No. 8, 2006, p566-578.
  6. Hansman, S. and Hunt, R., A Taxonomy of Network and Computer Attacks, Computers and Security, Elsevier, U.K., Vol 24, No 1, 2005, pp31-43.
  7. Baghaei, N, and Hunt, R., Security Performance of Loaded IEEE 802.11b Wireless Networks, Computer Communications, Elsevier, U.K., Vol 27, No 17, 2004, pp1746-1756.
  8. Baghaei, N, and Hunt, R., Review of Quality of Service Performance in Wireless LANs and 3G Multimedia Application Services, Computer Communications, Elsevier, U.K., Vol27, No 17, 2004, pp1684-1692.
  9. Cournane, A. and Hunt, R., An Analysis of the Tools used for the Generation and Prevention of Spam, Computers and Security, Elsevier, UK, Vol 23 No 2, March 2004, pp154-166.
  10. van den Nieuwelaar, M. and Hunt, R., Real-time Carrier Network Traffic Measurement, Visualisation and Topology Modelling. Computer Communications, Elsevier, U.K., Vol 27 No 1, January 2004, pp128-140.
  11. Hunt, R. and Verwoerd, T., Reactive Firewalls - A New Technique. Computer Communications, Elsevier, U.K., Vol 26, No 12, July 2003, pp1302-1317.
  12. Verwoerd, T. and Hunt, R., Intrusion Detection Techniques and Approaches. Computer Communications, Elsevier, U.K., Vol 25, No 15, September 2002, pp1356-1365.
  13. Verwoerd, T. and Hunt, R., Security Architecture Testing using IDS - A Case Study. Computer Communications, Elsevier, U.K., Vol 25, No 15, September 2002, pp1402-1412.
  14. Hunt, R., Quality of Service Mechanisms in IP-based Networks - Differentiated Services, Multilayer Switching, MPLS and Traffic Engineering. Computer Communications, Elsevier, U.K., Vol 25, No 1, January 2002, pp100-108.
  15. Hunt, R., Technological Infrastructure for PKI and Digital Certification, Computer Communications, Elsevier, U.K., Vol 24, No 14, September 2001, pp1460 - 1471.
  16. Hunt, R. and King, A., Protocols and Architecture for Managing TCP/IP Network Infrastructures, Computer Communications, Elsevier, U.K., Vol 23, No 16, September 2000, pp1558-1572.

II. Chapters in Books

  1. Baghaei, N, and Hunt, R., Quality of Service Support in Mobile Multimedia Networks (Maode Ma – editor, 2008) Auerbach Publications.
  2. Hunt, R. and Wong, J. (Contributing Authors), Handbook of Algorithms for Wireless Networking and Mobile Computing, Chapter 40, pp905-936, Chapman and Hall Publishing, ISBN 1-58488-465-7, 2006.
  3. Hunt, R. and Vargo, J., Voice Communication, Encyclopedia of Information Systems, Bidgoli, H. (editor), Academic Press, June 2002, ISBN 0-12-227240-4.
  4. Hunt, R. and Vargo, J., Managing Network Environments, Encyclopedia of Information Systems, Bidgoli, H. (editor), Academic Press, June 2002.
  5. Hunt, R., TCP/IP (Transmission Control Protocol/Internet Protocol), Encyclopedia of Information Systems, Bidgoli, H. (editor), Academic Press, June 2002.
  6. Hunt, R., Frame Relay, Encyclopedia of Information Systems, Bidgoli, H. (editor), Academic Press, June 2002.

III. Papers Published in Refereed Conference Proceedings

  1. Kennedy, T. and Hunt, R. A Review of WPAN Security: Attacks and Prevention, Proc. of the International Conference on Mobile Technology, Applications and Systems (ACM Digital Library), Ilan, Taiwan, 2008.
  2. Gin, A. and Hunt, R. Performance Analysis of Evolving Wireless IEEE 802.11 Security Architectures, ACM International Workshop on Performance and Analysis of Wireless Networks, Ilan, Taiwan, 2008. [Best paper award].
  3. Keshariya, M. and Hunt, R. A New Architecture for Performance-based Policy Management in Heterogeneous Wireless Networks, ACM International Workshop on Performance and Analysis of Wireless Networks, Ilan, Taiwan, 2008.
  4. Keshariya, M. and Hunt, R., Extended Policy-Based Management Framework to Provide Always Best Connected Services in Heterogeneous Mobile Environments, Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks, AsiaCSN2007, 2-4 April, 2007, Thailand.
  5. Mathews, M, and Hunt, R., Evolution of Wireless LAN Security Architecture to IEEE 802.11i (WPA2), The Fourth IASTED Asian Conference on Communication Systems and Networks, AsiaCSN2007, 2-4 April, 2007, Thailand.
  6. Hunt, R. and Carpinter, J. Current and New Developments in Spam Filtering. Proc. 14th IEEE International Conference on Networks (ICON2006), Singapore, 14-15 September 2006.
  7. Carpinter, J. and Hunt, R., Tightening the Net: A Review of Current and Next Generation Spam Filtering Tools. Proceedings of the 11th Asia Pacific Internet Service Providers Conference, Perth 1-2 March, 2006.
  8. Hunt, R. and Keshariya, M., Optimised Transparent and Automated Handoff Between Wireless LANs and 3G Networks, Proceeding of the 3G World Congress, Hong Kong, 14-18 November 2005.
  9. Keshariya, M. and Hunt, R., Implementation of an Integrated Secure Mobile Wireless Architecture, Proc. of IASTED NCS2005 - Networks and Communication Systems, 18-20 April, 2005, Krabi, Thailand.
  10. Hunt, R. and Keshariya, M., Proposal For An Automated Algorithm For Optimised Handoff In Integrated Wireless Networks, Proc. of IASTED NCS2005 - Networks and Communication Systems, 18-20 April, 2005, Krabi, Thailand.
  11. Gu, X. and Hunt, R., Wireless LAN Attacks And Vulnerabilities, Proc. of IASTED NCS2005 - Networks and Communication Systems, 18-20 April, 2005, Krabi, Thailand.
  12. Hunt, R., New Developments in Wireless Security, Proc. of 2nd Information Security Summit, InfoSec 2004, 11-12 November, 2004, Hong Kong.
  13. Baghaei, N, and Hunt, R., IEEE 802.11 Wireless LAN Security Performance Using Multiple Clients, Proceedings of the 12th IEEE International Conference on Networks, National University of Singapore, 17-18 November 2004.
  14. Baghaei, N, and Hunt, R., Quality of Service in Wireless and Mobile Networks, Proc. 4th Wireless and Optical Communications Conference, Banff, Canada, 8-10 July, 2004.
  15. Shore, M. and Keshariya A. Cryptographic Modes of Operation with Bit Loss Resynchronisation. Proceedings of the 1st International Conference on Information and Communications Technologies: From Theory to Applications, Damascus, Syria, April 19-23, 2004.
  16. Hunt, R., New Developments in Wireless Security, Proc. 9th Annual IT Security Summit, Auckland, N.Z., 5-6 April 2004, (Invited Paper).
  17. Hansman, S. and Hunt, R., A Classification of Attack Methodologies for Use by CERTs, Proceedings of the 9th Asia Pacific Internet Service Providers Conference, Kuala Lumpur, Malaysia, 23-26 February, 2004.
  18. Shore, M., Cyberwar Target Acquisition and Identification, Proceedings of the 4th Australian Information Warfare and Security Conference, Adelaide, Australia, November 20-21, 2003.
  19. Shore, M. and Fea N., Automated Matching of Cyber Targets and Attacks, Proceedings of the 4th Australian Information Warfare and Security Conference, Adelaide, Australia, November 20-21, 2003.
  20. Hunt, R. Multimedia Delivery over 3G and WLAN-based IP Networks. Proceedings of the 3G World Congress, Bangkok, 3-7 November 2003 (Invited Paper).
  21. Hunt, R., Vargo, J., Wong, J., Impact of Security Architectures on Wireless Network Performance, 5th IEEE International Conference on Mobile and Wireless Communications Networks (MWCN 2003), Singapore 27-29 October, 2003.
  22. Hunt, R. Security Architectures in Wireless and Mobile Networks, Proceedings of Networks 2003. The European Conference on Computer-Communications, NEC, Birmingham, U.K., June 2003.
  23. Hunt, R., and Wong, J., Policy Based Network Management, Proceedings of the 8th Asia Pacific Internet Service Providers Conference, Taipei 26-27 February, 2003.
  24. Hunt, R., and Wong, J., Security Architectures in Mobile and Wireless Networks, Proceedings of the 8th Asia Pacific Internet Service Providers Conference, Taipei 26-27 February, 2003.
  25. Hunt, R., and Verwoerd, T., Policy and Implementation of an Adaptive Firewall, Proceedings of the 10th IEEE International Conference on Networks, National University of Singapore, 27-30 August, 2002.
  26. Hunt, R., and Smith, M., Network Security using NAT and NAPT, Proceedings of the 10th IEEE International Conference on Networks, National University of Singapore, 27-30 August, 2002.
  27. Hunt, R., Public Key Infrastructure – Protection Through Encryption and Key Management, Proceeding of the Conference on Information Security, Sydney Convention Centre, 19-21 August 2002.
  28. Hunt, R., Security and Quality of Service in Wireless and Mobile Network Architectures, Proceedings of the 3G World Congress, June 10-14, 2002, Hong Kong.
  29. Hunt, R., Security Weaknesses in Modern TCP/IP Networks, Proceedings of the Conference on Security Strategies for E-Government, 8-10 May 2002, Singapore.
  30. Hunt, R., IP Mobility and QoS Provisioning in Wireless Networks, Proceedings of the Conference on Wireless LANs, Singapore 20-22 May, 2002.
  31. Hunt, R., QoS Mechanisms in IP Networks, Proceedings of the Asia Pacific Regional Internet Conference on Operational Technologies, Queen Sirikit National Convention Center, Bangkok, Thailand, 5-7 March, 2002.
  32. Hunt, R., IP Quality of Service Architectures, Proceedings of the 9th IEEE International Conference on Networks, Bangkok, 10-12 October, 2001.
  33. Hunt, R., PKI and Digital Certification Infrastructure, Proceedings of the 9th IEEE International Conference on Networks, Bangkok, 10-12 October, 2001.
  34. Verwoerd, T. and Hunt, R., GLOB: Generic LOad Balancing, Proceedings of the 9th IEEE International Conference on Networks, Bangkok, 10-12 October, 2001.