1. Sharpe, R., & Warnicke, E. (2014). Capturing live network of data, Wireshark user’s guide: For Wireshark 1.99.
https://www.wireshark.org/docs/
2. Mittal, H., Jain, M., & Banda, L. (2013). Monitoring local area network using remote method invocation. International Journal of Computer Science and Mobile Computing, 5(2), 50–55.
3. Moraes, D. M., & Duarte, E. P. (2011). A failure detection service for internet-based multi-as distributed systems. In Proceedings of IEEE 17th International Conference on Parallel and Distributed Systems (pp. 260–267).
4. Aredo, D., & Yildirim, S. (2006). Security issues in adaptive distributed systems. In Proceedings of the Fourteenth European Conference on Information Systems (ECIS) (pp. 2206–2215).
5. Kotenko, I., & Doynikova, E. (2014). Evaluation of computer network security based on attack graphs and security event processing. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(5), 14–29.