1. Hastings, N.E., McLean, P.A.: TCP/IP spoofing fundamentals, Computers and Communications. In: Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference, pp. 218–224 (1996)
2. Ishibashi, H., Yamai, N., Abe, K., Matsuura, T.: A protection method against unauthorized access and address spoofing for open network access systems, Communications, Computers and signal Processing, 2001. In: PACRIM. 2001 IEEE Pacific Rim Conference, pp. 10–13 (2001)
3. Jain, S., Shenoy Ramam, D., Thirumalasetty, S.R., Saddi, M., Summa, F.: A Network Management Framework for Multi-layered Network: an Overview, Integrated Network Management Proceedings. In: IEEE/IFIP International Symposium, pp. 14–18 (2001)
4. Jackson, T., Wlikens, M.: Survivability of Networked Information Systems and Infrastructures: First Deliverable of an explanatory study, European Commission Special Report JRC/ISIS/STA/DAS/Projects/Survivability/Study, pp.1-37 (1998)
5. Oguchi, N., Chen, Y.M., Ogawa, J., Tsuruoka, T., Taniguchi, T., Nojima, S.: RISP: address resolution protocol in network layer. In: Local Computer Networks LCN 1998 Proceeding, pp. 99–108 (1998)