1. J. Levine, R. LaBella, H. Owen, D. Contis, B. Culver, “The use of Honeynets to detect exploited systems across large enterprise networks ”, IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, 2003, 0-7803-7808-3
2. Gatta Sambasiva Rao, P.Naveen Kumar, P. Swetha, G. Bhanu Kiran, “Security assessment of computer networks –an ethical hacker's perspective ”, International Conference on Computing and Communication Technologies, 11-13 Dec. 2014, Publisher: IEEE
3. Aysar AbdulKhaleq Abdulrahman, “Multi-Level Windows Exploitation Using Linux Operating System ”, Asian Journal of Natural & Applied Sciences Vol. 5(2) June 2016.
4. Paul Willmann, Scott Rixner, and Alan L. Cox, “An Evaluation of Network Stack Parallelization Strategies in Modern Operating Systems ”, USENIX 2006 Annual Technical Conference Refereed Paper