1. M. H. DeGroot. Probability and Statistics. Addison-Wesley, 1989.
2. H. Jung, et al. Caller Identification System in the Internet Environment. In Proceedings of 4th USENIX Security Symposium, 1993.
3. S. Kent, R. Atkinson. Security Architecture for the Internet Protocol. IETF RFC 2401, September 1998.
4. S. C. Lee and C. Shields. Tracing the Source of Network Attack: A Technical, Legal and Social Problem. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, June 2000.
5. NLANR Trace Archive.
http://pma.nlanr.net/Traces/long/
.