1. Barford, P., Duffield, N., Ron, A., Sommers, J. (2009). Network performance anomaly detection and localization. Proc. 2009 IEEE INFOCOM.
2. Bertsekas, D., & Gallagher, R. (1991). Data networks (2nd ed.). Englewood Cliffs: Prentice Hall.
3. Bishop, M. (2003). Computer security: Art and science. Boston: Addison Wesley.
4. CERT. Advisory 2001–09: Statistical Weaknesses in TCP/IP Initial Sequence Numbers.
http://www.cert.org/advisories/CA-2001-09.html
5. CERT. Advisory CA-96.21: TCP SYN Flooding and IP Spoofing Attacks.
http://www.cert.org/advisories/CA-1998-01.html