1. Hoffman, C. 2013. Brute-Force Attacks Explained: How All Encryption is vulnerable. Available at: https://www.howtogeek.com/166832/brute-force-attacks-explained-how-all-encryption-is-vulnerable/. Retrieved on March 30, 2018.
2. Lipschutz, S. 2002. Theory and Problems, Data Structures. Tata McGraw-Hill Publishing Company Limited. Pp 27--30, 53--55.
3. Konark, T. D 2013. Brute-force Attack "Seeking but Distressing". International Journal of Innovations in Engineering and Technology (IJIET) Vol. 2
4. Jitendra J., Parashu R.P 2017. Identify Cryptanalytic Brute-Force Attack Using Frequent Pattern Mining. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 5-683 - 686. Available @ http://www.ijritcc.org.
5. Mohammed M. A, Degadzor A. F., Effrim B. F., Appiah K. A. 2017. Brute Force Attack Detection And Prevention On A Network Using Wireshark Analysis. International Journal Of Engineering Sciences & Research Technology