1. Forensic analysis of social networking applications on mobile devices;Al Mutawa;Digit. Investig.,2012
2. Network security using hybrid port knocking;Al-Bahadili;Int. J. Comput. Sci. Netw. Secur.,2010
3. Albert, Levi, C.M.U., the problem of trusted third party in authentication and digital signature protocols, Turkey Scientific and Technological Research Council.
4. Alessandri, S., Fontanini, M., Macia, N., 2012. Service-knocking communication, Seguridad Informática, WSegI.
5. Simple port knocking method: against TCP replay attack and port scanning;Ali;Cyber Secur. Cyber Warf. Digit. Forensic (Cyber.),2012