1. Exploit database. http://www.exploit-db.com/shellcode/, accessed: 2017-11-30.
2. D. Stiawan, A.H. Abdullah, M.Y. Idris, The trends of intrusion prevention system network, in: 2010 2nd International Conference on Education Technology and Computer, Vol. 4, June 2010, pp. V4–217–V4–221.
3. J. Shin, J.J. Lambert, J. Lackey, Evaluating shellcode findings, Apr. 2 2013. US Patent 8,413,246.
4. M. Polychronakis, K.G. Anagnostakis, E.P. Markatos, An empirical study of real-world polymorphic code injection attacks, in: LEET, 2009.
5. Internet attacks and intrusion detection system: A review of the literature;Singh;Online Inform. Rev.,2017