1. Anderson, D.: Splinternet behind the great firewall of china. Queue 10(11), 40 (2012)
2. Google Online Security Blog: An Update on SHA-1 Certificates in Chrome (2015). https://security.googleblog.com/2015/12/an-update-on-sha-1-certificates-in.html
3. Fukuda, K., Sato, S., Mitamura, T.: A technique for counting DNSSEC validators. In: 2013 Proceedings IEEE INFOCOM, pp. 80–84. IEEE (2013)
4. Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.A.: Mining your PS, QS: detection of widespread weak keys in network devices. In: Presented as part of the 21st USENIX Security Symposium (USENIX Security 12), pp. 205–220 (2012)
5. Herzberg, A., Shulman, H.: Fragmentation Considered Poisonous: or one-domain-to-rule-them-all.org. In: The Conference on Communications and Network Security IEEE CNS 2013, Washington, D.C., U.S. IEEE (2013)