1. Bellovin SM (2002) A technique for counting NATted hosts. In: Proceedings of the 2nd ACM SIGCOMM workshop on internet measurement, IMW 2002. ACM, New York, pp 267–272
2. Straka K, Manes G (2006) In international federation for information processing. In: Oliver M, Shenoi S (eds) Advances in digital forensics II. Springer, Boston, pp 239–246
3. Kohno T, Broido A, Claffy KC (2005) Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2):93–108
4. Rui L, Hongliang Z, Yang X, Yixian Y, Cong W (2009) Remote NAT detect algorithm based on support vector machine. In: International conference on information engineering and computer science, ICIECS 2009, pp 1–4
5. Rui L, Hongliang Z, Yang X, Shoushan L, Yixian Y, Cong W (2009) Passive NATted hosts detect algorithm based on directed acyclic graph support vector machine. In: International conference on multimedia information networking and security, MINES 2009, vol 2, pp 474–477