[1]
|
D. L. Clark, “IT Manger’s Guide to Virtual Private Networks,” McGraw-Hill, New York, 1999.
|
[2]
|
S. Badr, “Security Architecture for Internet Protocols,” Ph.D. Thesis, Military Technical College, Cairo, 2001.
|
[3]
|
A. Farouk, “Intrusion Detection in a War a Game Web Based Application,” Master of Science Thesis, Ain Shams University, Cairo, 2004.
|
[4]
|
A. E. Taha, “Secured Access Control in Web Based War Game Application,” Master of Science Thesis, Ain -Shams University, Cairo, Egypt, October 2002.
|
[5]
|
N. Malheiros, E. Madeira, F. L. Verdi and M. Magalhaesb, “Managing Layer 1 VPN Services,” Optical Switching and Networking, Vol. 5, No. 4, 2008, pp. 196-218. doi:10.1016/j.osn.2008.02.002
|
[6]
|
P. Juste, D. Wolinsky, P. Boykin, M. Covington and R. Figueiredo, “SocialVPN: Enabling Wide-Area Collaboration with Integrated Social and Overlay Networks,” Computer Networks, Vol. 54, No. 12, August 2010, pp. 1926-1938. doi:10.1016/j.comnet.2009.11.019
|
[7]
|
A. G. Yay1ml1, “Selective Survivability with Disjoint Nodes and Disjoint Lightpaths for Layer 1 VPN,” Optical Switching and Networking, Vol. 6, No. 1, 2009, pp. 3-9. doi:10.1016/j.osn.2008.05.002
|
[8]
|
C. Xenakis, C. Ntantogian and I. Stavrakakis, “A Networkassisted Mobile VPN for Securing Users Data in UMTS,” Computer Communications, Vol. 31, No. 14, 2008, pp. 3315-3327. doi:10.1016/j.comcom.2008.05.018
|
[9]
|
M. N. Ismail and M. T. Ismail, “Analyzing of Virtual Private Network over Open Source Application and Hardware Device Performance,” European Journal of Scientific Research, Vol. 28, No. 2, 2009, pp: 215-226.
|
[10]
|
R. Bolla, R. Bruschi, F. Davoli and M. Repetto, “Hybrid Optimization for QoS Control in IP Virtual Private Networks,” Computer Networks, Vol. 52, No. 3, 2008, pp. 563-580. doi:10.1016/j.comnet.2007.10.006
|
[11]
|
S. Gold, “Pirate Bay Develops Anonymous VPN User Protection,” Infosecurity, Vol. 6, No. 3, 2009, pp. 8. doi:10.1016/S1754-4548(09)70045-2
|
[12]
|
D. Forte et al., “SSL VPN and Return on Investment: A Possible Combination,” Network Security, Vol. 10, No. 10, 2009, pp. 17-19. doi:10.1016/S1353-4858(09)70112-6
|
[13]
|
T. Rowan, “VPN Technology: IPSEC vs SSL,” Network Security, Vol. 2007, No. 12, December 2007, pp. 13-17. doi: 10.1016/S1353-4858(07)70104-6
|
[14]
|
J. F. Dunnigan, “Wargames Handbook: How to Play and Design Commercial and Professional Wargames,” Writer’s Club Press, 2000.
|
[15]
|
Y. Dakroury, I. A. El-ghafar and A. Taha, “Secured Web-Based War Game Application Using Combined Smart Certificate and Secure Cookies Techniques,” Proceeding of the 1st IEEE International Symposium on Signal Processing and Information Technology, Cairo, December 2001, pp. 447-453.
|
[16]
|
Downloading rpm’s for VPN, http://sourceforge.net/pro- jects
|
[17]
|
G. F. Luger, “Artificial Intelligence Structures and Strategies for Complex Problem Solving,” 4th Edition, Addison Wesley, New York, 2001.
|
[18]
|
K. Heller, K. Svore, A. Keromytis and S. Stolfo, “One Class Support Vector Machines for Detecting Anomalous Window Registry Accesses,” 3rd IEEE Conference and Data Mining Workshop on Data Mining for Computer Security, Florida, November 2003.
|