1. B Möller, T Duong, K Kotowicz, This POODLE bites: exploiting the SSL 3.0 fallback. PDF online. (2014). https://poodlebleed.com/ssl-poodle.pdf . Accessed 12 Jan 2015.
2. P Velan, M Čermák, P Čeleda, M Drašar, A survey of methods for encrypted traffic classification and analysis. Int J Netw Manag. 25(5), 355–374 (2015).
3. T Bujlow, V Carela-Español, J Solé-Pareta, P Barlet-Ros, Web tracking: mechanisms, implications, and defenses. CoRR. abs/1507.07872: (2015). http://arxiv.org/abs/1507.07872 .
4. I Zeifman, Was that really a Google bot crawling my site? (2012). https://www.incapsula.com/blog/was-that-really-a-google-bot-crawling-my-site.html . Accessed 15 October 2015.
5. E Raftopoulos, X Dimitropoulos, in Security and Privacy Workshops (SPW), 2013 IEEE. Understanding network forensics analysis in an operational environment (IEEENew York, 2013), pp. 111–118.