1. Aase, N., Crandall, J., Diaz, A., Knockel, J., Molinero, J.O., Saia, J., Wallach, D., Zhu, T.: Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resources and Motivations. In: Proc. USENIX FOCI, Bellevue, WA, USA (August 2012)
2. Auger, R.: Easy method for detecting caching proxies (February 2011),
http://www.cgisecurity.com/2011/02/easy-method-for-detecting-caching-proxies.html
3. CmdrTaco. Mediacom using DPI to Hijack Searches, 404 errors,
http://yro.slashdot.org/story/11/04/27/137210/mediacom-using-dpi-to-hijack-searches-404-errors
4. Lecture Notes in Computer Science;L. DiCioccio,2012
5. EICAR Anti-Malware Test File,
http://www.eicar.org/86-0-Intended-use.html