1. P. N. Devyanin, Computer systems security models (Hotline – Telecom, Moscow, 2018), p. 338.
2. V. A. Atroshchenko, M. V. Rudenko, R. A. Dyachenko and R. Kh. Baghdasaryan, Modern problems of science and education 3, pp. 82–82 (2013).
3. E. V. Kharitonova, Graphs and networks (UlSTU, Ulyanovsk, 2006), p. 92.
4. T. Nadeau, MPLS Network Management MIBs, Tools, and Techniques (Morgan Kaufmann Publishers, 2002), p. 525.
5. Relying on firewalls? Here's why you'll be hacked