1. Lecture Notes in Computer Science;K. Kwon,2004
2. J. Koo, S. Ahn, and J. Chung, Network Blocking Algorithm and Architecture for Network Resource and Security Management, Proc. ISPC Comm. 2004, Bishkek, pp.181-186, 2004.
3. Bellovin, S.M.: Security problems in the TCP/IP protocol suite. Computer Communication Review 19(2), 32–48 (1989)
4. Hastings, N.E., McLean, P.A.: TCP/IP spoofing fundamentals, computers and communications. In: Proc. IEEE Fifteenth Annual International Phoenix Conference, pp. 218–224 (1996)
5. Davies, J., Lee, T.: Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference. Microsoft Press (2003)