1. CERT Advisory CA-2002-24, Trojan Horse OpenSSH Distribution, August 1, 2002.
2. W. Diffie and M.E. Hellman, “New Directions in Cryptography”, IEEE Transactions in Information Theory, 22(1976), pp. 644–654.
3. T. Fraser, L. Badger and M. Feldman, “Hardening COTS Software With Generic Software Wrappers”, Proc. of IEEE Symposium on Security and Privacy, 1999, pp. 2–16.
4. John Green, David Marchette, Stephen Northcutt, Bill Ralph, “Analysis Techniques for Detecting Coordinated Attacks and Probes”, in Proc. 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, USA, April 9–12, 1999, available at: <
http://www.usenix.org/publications/library/proceedings/detection99/full_papers/green/green_html/
>
5. Y. Huang, C. Kintala, N. Kolettis, N.D. Fulton, “Software Rejuvenation: Analysis, Module and Applications”, in Proc. 25th IEEE Symposium on Fault Tolerant Computing Conference (FTCS-25), Pasadena, CA, USA, June 1995, pp. 381–390.