1. Acunetix scanner. Accessed 16 Feb 2017. [Online]. Available: https://www.acunetix.com/
2. Allen, J.M.: OS and application fingerprinting techniques, 2007. [Online]. Available: https://www.giac.org/paper/gsec/8496/os-application-fingerprinting-techniques/113048
3. Alsa’Deh, A., Meinel, C.: Secure neighbor discovery: review, challenges, perspectives, and recommendations, IEEE Secur. Priv. 10(4): 26–34 (2012). [Online]. Available: https://doi.org/10.1109/MSP.2012.27
4. Arkko, J., Nikander, P.: Limitations of IPsec policy mechanisms. Lecture notes in computer science (Including subseries, 2005). [Online]. Available: https://doi.org/10.1007/11542322_29
5. Atlasis, A.: Attacking ipv6 implementation using fragmentation. BlackHat Europe, 2012. [Online]. Available: http://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf