1. Shankar, U.: Active Mapping: Resisting NIDS Evasion Without Altering Traffic (2003), http://www.cs.berkeley.edu/~ushankar/research/active/activemap.pdf
2. Spitzner, L.: Know Your Enemy: Passive Fingerprinting, Identifying remote hosts, without them knowing, http://project.honeynet.org/papers/finger/
3. Ptacek, T.H., Newsham, T.N.: Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection. Secure Networks, Inc. (1998), http://www.aciri.org/vern/Ptacek-Newsham-Evasion-98.ps
4. Handley, M., Paxson, V.: Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In: Proc. 10th USENIX Security Symposium (2001), http://www.icir.org/vern/papers/norm-usenix-sec-01-html/norm.html
5. Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks (1999)