1. Barham, P., Hand, S., Isaacs, R., Jardetzky, P., Mortier, R., & Roscoe, T. (2002). Techniques for lightweight concealment and authentication in IP networks. Intel Research Berkeley, Technical Report IRB-TR-02-009. Berkley, CA: Berkley University Press.
2. Bernstein, D. J. (2002). SYN cookies. Retrieved June 13, 2010, from http://cr.yp.to/syncookies.html.
3. DeGraaf, R., Aycock, J., & Jacobson, M. (2005). Port knocking with strong authentication. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), (pp. 409-418). Tucson, AZ: IEEE Press.
4. Doyle, M. (2004). Implementing a port knocking system. MSc Thesis. Little Rock, AR: University of Arkansas.
5. Fedora GNU/Linux Operating System. (2010). Fedoraproject. Retrieved June 13, 2010, from https://fedoraproject.org/wiki/Fedora_Project_Wiki.