1. Althouse, J.: Open Sourcing JA3 SSL/TLS Client Fingerprinting for Malware Detection. Şubat, Erişim (2022). https://engineering.salesforce.com/open-sourcing-ja3-92c9e53c3c41
2. Althouse, J., Atkinson, J. ve Atkins, J.: “Salesforce/ja3”, Şubat, Erişim (2022). https://github.com/salesforce/ja3
3. Eric, R.: RFC 8446 – The Transport Layer Security (TLS) Protocol Version 1.3. Şubat, Erişim (2022). https://datatracker.ietf.org/doc/rfc8446/.
4. Kane, W.A., Vlach, T., Luks, R.: Encrypted traffic analysis. flowmon, 2019D. In: Sarunyagate (ed.), Lasers. McGraw-Hill, New York (1996)
5. Suricata. 6.17. “JA3 Keywords — Suricata 6.0.4 documentation.”, Şubat 2022, Erişim: https://suricata.readthedocs.io/en/suricata-6.0.4/rules/ja3-keywords.html.K. Schwalbe, Information Technology Project Management, 3rd ed. Course Technology, Boston (2004)