1. Gong, X., Kiyavash, N., & Borisov, N. (2010). Fingerprinting websites using remote traffic analysis. In Proceedings of the 17th ACM conference on computer and communications (vol. 1(1), p. 684).
2. Thomas, K., Grier, C., Ma, J., Paxson, V., & Song, D. (2011). Monarch: Providing real-time URL spam filtering as a service. In Proceedings of the IEEE symposium on security and privacy, Oakland, CA, USA.
3. Hamade, S. (2008). Internet filtering and censorship. In 5th International conference on information technology: New generations (vol. 1(1), p. 1081).
4. Murdoch, S., & Anderson, R. (2008). Tools and technology of Internet filtering. Access Denied: The Practice and Policy of Global Internet Filtering, 1(1), 58.
5. Caloyannides, M., Memon, N., & Venema, W. (2009). Digital forensics. IEEE Security & Privacy, 7(2), 16–17.