Bibliography
Bibliography
Whenever possible, the bibliography includes stable hypertext links to the references cited.
Whenever possible, the bibliography includes stable hypertext links to the references cited.
LAN/MAN Standards Committee of the IEEE Computer Society. `IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications <http://standards.ieee.org/getieee802/802.11.html>`_. IEEE, 1999.
LAN/MAN Standards Committee of the IEEE Computer Society. `IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications <http://standards.ieee.org/getieee802/802.11.html>`_. IEEE, 1999.
LAN/MAN Standards Committee of the IEEE Computer Society, `IEEE Standard for Local and metropolitan area networks Media Access Control (MAC) Bridges <http://standards.ieee.org/getieee802/download/802.1D-2004.pdf>`_ , IEEE Std 802.1DTM-2004, 2004,
LAN/MAN Standards Committee of the IEEE Computer Society, `IEEE Standard for Local and metropolitan area networks Media Access Control (MAC) Bridges <http://standards.ieee.org/getieee802/download/802.1D-2004.pdf>`_ , IEEE Std 802.1DTM-2004, 2004,
LAN/MAN Standards Committee of the IEEE Computer Society, `IEEE Standard for Local and metropolitan area networks— Virtual Bridged Local Area Networks <http://standards.ieee.org/getieee802/download/802.1Q-2005.pdf>`_, 2005,
LAN/MAN Standards Committee of the IEEE Computer Society, `IEEE Standard for Local and metropolitan area networks— Virtual Bridged Local Area Networks <http://standards.ieee.org/getieee802/download/802.1Q-2005.pdf>`_, 2005,
IEEE 802.2-1998 (ISO/IEC 8802-2:1998), IEEE Standard for Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements--Part 2: Logical Link Control. Available from http://standards.ieee.org/getieee802/802.2.html
IEEE 802.2-1998 (ISO/IEC 8802-2:1998), IEEE Standard for Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements--Part 2: Logical Link Control. Available from http://standards.ieee.org/getieee802/802.2.html
LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 3 : Carrier Sense multiple access with collision detection (CSMA/CD) access method and physical layer specification. IEEE, 2000. Available from http://standards.ieee.org/getieee802/802.3.html
LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information Technology - Telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - Part 3 : Carrier Sense multiple access with collision detection (CSMA/CD) access method and physical layer specification. IEEE, 2000. Available from http://standards.ieee.org/getieee802/802.3.html
LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements--Part 5: Token Ring Access Method and Physical Layer Specification. IEEE, 1998. available from http://standards.ieee.org/getieee802
LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements--Part 5: Token Ring Access Method and Physical Layer Specification. IEEE, 1998. available from http://standards.ieee.org/getieee802
IEEE, Std 802-2001 : IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, Available from http://standards.ieee.org/getieee802/download/802-2001.pdf
IEEE, Std 802-2001 : IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, Available from http://standards.ieee.org/getieee802/download/802-2001.pdf
Augustin, B., Cuvellier, X., Orgogozo, B., Viger, F., Friedman, T., Latapy, M., Magnien, C., Teixeira, R., `Avoiding traceroute anomalies with Paris traceroute <https://dx.doi.org/10.1145/1177080.1177100>`_, Internet Measurement Conference, October 2006, See also http://www.paris-traceroute.net/
Augustin, B., Cuvellier, X., Orgogozo, B., Viger, F., Friedman, T., Latapy, M., Magnien, C., Teixeira, R., `Avoiding traceroute anomalies with Paris traceroute <https://dx.doi.org/10.1145/1177080.1177100>`_, Internet Measurement Conference, October 2006, See also http://www.paris-traceroute.net/
Anderson, B. and McGrew, D., 2019, October. `TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior <https://doi.org/10.1145/3355369.3355601>`_. In Proceedings of the Internet Measurement Conference (pp. 379-392). ACM.
Anderson, B. and McGrew, D., 2019, October. `TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior <https://doi.org/10.1145/3355369.3355601>`_. In Proceedings of the Internet Measurement Conference (pp. 379-392). ACM.
Androutsellis-Theotokis, S. and Spinellis, D.. .. 2004. `A survey of peer-to-peer content distribution technologies <http://doi.acm.org/10.1145/1041680.1041681>`_. ACM Computing Surveys 36, 4 (December 2004), 335-371.
Androutsellis-Theotokis, S. and Spinellis, D.. .. 2004. `A survey of peer-to-peer content distribution technologies <http://doi.acm.org/10.1145/1041680.1041681>`_. ACM Computing Surveys 36, 4 (December 2004), 335-371.
Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, J. and Jahanian, F., `Internet inter-domain traffic <http://doi.acm.org/10.1145/1851182.1851194>`_. In Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM (SIGCOMM '10). ACM, New York, NY, USA, 75-86.
Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, J. and Jahanian, F., `Internet inter-domain traffic <http://doi.acm.org/10.1145/1851182.1851194>`_. In Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM (SIGCOMM '10). ACM, New York, NY, USA, 75-86.
Arlitt, M. and Williamson, C. 2005. `An analysis of TCP reset behaviour on the internet <http://doi.acm.org/10.1145/1052812.1052823>`_. SIGCOMM Computer Communication Review 35, 1 (Jan. 2005), 37-44.
Arlitt, M. and Williamson, C. 2005. `An analysis of TCP reset behaviour on the internet <http://doi.acm.org/10.1145/1052812.1052823>`_. SIGCOMM Computer Communication Review 35, 1 (Jan. 2005), 37-44.
Abramson, N., `THE ALOHA SYSTEM: another alternative for computer communications <http://doi.acm.org/10.1145/1478462.1478502>`_. In Proceedings of the November 17-19, 1970, Fall Joint Computer Conference (Houston, Texas, November 17 - 19, 1970). AFIPS '70 (Fall). ACM, New York, NY, 281-285.
Abramson, N., `THE ALOHA SYSTEM: another alternative for computer communications <http://doi.acm.org/10.1145/1478462.1478502>`_. In Proceedings of the November 17-19, 1970, Fall Joint Computer Conference (Houston, Texas, November 17 - 19, 1970). AFIPS '70 (Fall). ACM, New York, NY, 281-285.
Berners-Lee, T., `Information Management: A Proposal <http://www.w3.org/History/1989/proposal.html>`_, March 1989
Berners-Lee, T., `Information Management: A Proposal <http://www.w3.org/History/1989/proposal.html>`_, March 1989
Biondi, P. and A. Ebalard, `IPv6 Routing Header Security <http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf>`_, CanSecWest Security Conference 2007, April 2007.
Biondi, P. and A. Ebalard, `IPv6 Routing Header Security <http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf>`_, CanSecWest Security Conference 2007, April 2007.
Bonomi, F. and Fendick, K.W., `The rate-based flow control framework for the available bit rate ATM service <https://dx.doi.org/10.1109/65.372653>`_, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages : 25-39
Bonomi, F. and Fendick, K.W., `The rate-based flow control framework for the available bit rate ATM service <https://dx.doi.org/10.1109/65.372653>`_, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages : 25-39
Bhatia, M., Manral, V., Ohara, Y., `IS-IS and OSPF Difference Discussions <http://tools.ietf.org/html/draft-bhatia-manral-diff-isis-ospf-01>`_, work in progress, Internet draft, Jan. 2006
Bhatia, M., Manral, V., Ohara, Y., `IS-IS and OSPF Difference Discussions <http://tools.ietf.org/html/draft-bhatia-manral-diff-isis-ospf-01>`_, work in progress, Internet draft, Jan. 2006
Beech, W., Nielsen, D., Taylor, J., `AX.25 Link Access Protocol for Amateur Packet Radio <http://www.tapr.org/pdf/AX25.2.2.pdf>`_, version 2.2, Revision: July 1998
Beech, W., Nielsen, D., Taylor, J., `AX.25 Link Access Protocol for Amateur Packet Radio <http://www.tapr.org/pdf/AX25.2.2.pdf>`_, version 2.2, Revision: July 1998
Brakmo, L. S., O'Malley, S. W., and Peterson, L. L., `TCP Vegas: new techniques for congestion detection and avoidance <http://doi.acm.org/10.1145/190314.190317>`_. In Proceedings of the Conference on Communications Architectures, Protocols and Applications (London, United Kingdom, August 31 - September 02, 1994). SIGCOMM '94. ACM, New York, NY, 24-35.
Brakmo, L. S., O'Malley, S. W., and Peterson, L. L., `TCP Vegas: new techniques for congestion detection and avoidance <http://doi.acm.org/10.1145/190314.190317>`_. In Proceedings of the Conference on Communications Architectures, Protocols and Applications (London, United Kingdom, August 31 - September 02, 1994). SIGCOMM '94. ACM, New York, NY, 24-35.
Bormann, C., Hoffman, P., `Concise Binary Object Representation (CBOR) <http://tools.ietf.org/html/rfc7049>`_, RFC7049 2013. See also https://cbor.io
Bormann, C., Hoffman, P., `Concise Binary Object Representation (CBOR) <http://tools.ietf.org/html/rfc7049>`_, RFC7049 2013. See also https://cbor.io
Barrett, R. Silverman, R. Byrnes, `SSH: The Secure Shell (The Definitive Guide) <https://books.google.be/books?id=3XzIFG3w8-YC>`_, O'Reilly 2005 (2nd edition).
Barrett, R. Silverman, R. Byrnes, `SSH: The Secure Shell (The Definitive Guide) <https://books.google.be/books?id=3XzIFG3w8-YC>`_, O'Reilly 2005 (2nd edition).
Bush, V. `As we may think <http://www.theatlantic.com/magazine/archive/1969/12/as-we-may-think/3881/>`_ The Atlantic Monthly 176 (July 1945), pp. 101–108
Bush, V. `As we may think <http://www.theatlantic.com/magazine/archive/1969/12/as-we-may-think/3881/>`_ The Atlantic Monthly 176 (July 1945), pp. 101–108
Bush, R., `FidoNet: technology, tools, and history <http://doi.acm.org/10.1145/163381.163383>`_. Communications ACM 36, 8 (Aug. 1993), 31-35.
Bush, R., `FidoNet: technology, tools, and history <http://doi.acm.org/10.1145/163381.163383>`_. Communications ACM 36, 8 (Aug. 1993), 31-35.
Bux, W., `Token-ring local-area networks and their performance <http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=18625>`_, Proceedings of the IEEE, Vol 77, No 2, p. 238-259, Feb. 1989
Bux, W., `Token-ring local-area networks and their performance <http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=18625>`_, Proceedings of the IEEE, Vol 77, No 2, p. 238-259, Feb. 1989
Buford, J., Yu, H., Lua, E.K., `P2P Networking and Applications <http://books.google.com/books?id=O9NkAaY9YxMC>`_, Morgan Kaufmann, 2008
Buford, J., Yu, H., Lua, E.K., `P2P Networking and Applications <http://books.google.com/books?id=O9NkAaY9YxMC>`_, Morgan Kaufmann, 2008
Cardwell, N., Cheng, Y., Brakmo, L., Mathis, M., Raghavan, B., Dukkipati, N., Chu, H., Terzis, A., and Herbert, T., `packetdrill: scriptable network stack testing, from sockets to packets <https://www.usenix.org/conference/atc13/packetdrill-scriptable-network-stack-testing-sockets-packets>`_. In Proceedings of the 2013 USENIX conference on Annual Technical Conference (USENIX ATC'13). USENIX Association, Berkeley, CA, USA, 213-218.
Cardwell, N., Cheng, Y., Brakmo, L., Mathis, M., Raghavan, B., Dukkipati, N., Chu, H., Terzis, A., and Herbert, T., `packetdrill: scriptable network stack testing, from sockets to packets <https://www.usenix.org/conference/atc13/packetdrill-scriptable-network-stack-testing-sockets-packets>`_. In Proceedings of the 2013 USENIX conference on Annual Technical Conference (USENIX ATC'13). USENIX Association, Berkeley, CA, USA, 213-218.
Cardwell, N., Cheng, Y., Gunn, S., Hassas Yeganeh, S. and Jacobson, J., `BBR: Congestion-Based Congestion Control <https://doi.org/10.1145/3012426.3022184>`_. Queue 14, 5, Pages 50 (October 2016)
Cardwell, N., Cheng, Y., Gunn, S., Hassas Yeganeh, S. and Jacobson, J., `BBR: Congestion-Based Congestion Control <https://doi.org/10.1145/3012426.3022184>`_. Queue 14, 5, Pages 50 (October 2016)
Calvert, K., Donahoo, M., `TCP/IP Sockets in Java : Practical Guide for Programmers <http://books.google.com/books?id=lfHo7uMk7r4C>`_, Morgan Kaufman, 2008
Calvert, K., Donahoo, M., `TCP/IP Sockets in Java : Practical Guide for Programmers <http://books.google.com/books?id=lfHo7uMk7r4C>`_, Morgan Kaufman, 2008
Chiu, D., Jain, R., `Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks <https://dx.doi.org/10.1016/0169-7552(89)90019-6>`_, Computer Networks and ISDN Systems Vol 17, pp 1-14, 1989
Chiu, D., Jain, R., `Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks <https://dx.doi.org/10.1016/0169-7552(89)90019-6>`_, Computer Networks and ISDN Systems Vol 17, pp 1-14, 1989
Gont, F., `Security Assessment of the Transmission Control Protocol (TCP) <http://tools.ietf.org/html/draft-ietf-tcpm-tcp-security-02>`_,Security Assessment of the Transmission Control Protocol (TCP), Internet draft, work in progress, Jan. 2011
Gont, F., `Security Assessment of the Transmission Control Protocol (TCP) <http://tools.ietf.org/html/draft-ietf-tcpm-tcp-security-02>`_,Security Assessment of the Transmission Control Protocol (TCP), Internet draft, work in progress, Jan. 2011
Chi, Y., Oliveira, R., Zhang, L., `Cyclops: The Internet AS-level Observatory <https://dx.doi.org/10.1145/1452335.1452337>`_, ACM SIGCOMM Computer Communication Review (CCR), October 2008
Chi, Y., Oliveira, R., Zhang, L., `Cyclops: The Internet AS-level Observatory <https://dx.doi.org/10.1145/1452335.1452337>`_, ACM SIGCOMM Computer Communication Review (CCR), October 2008
Carr, B., Sury, O., Palet Martinez, J., Davidson, A., Evans, R., Yilmaz, F., Wijte, Y., `IPv6 Address Allocation and Assignment Policy <http://www.ripe.net/ripe/docs/ipv6policy.html>`_, RIPE document ripe-481, September 2009
Carr, B., Sury, O., Palet Martinez, J., Davidson, A., Evans, R., Yilmaz, F., Wijte, Y., `IPv6 Address Allocation and Assignment Policy <http://www.ripe.net/ripe/docs/ipv6policy.html>`_, RIPE document ripe-481, September 2009
Clark D., `The Design Philosophy of the DARPA Internet Protocols <https://dx.doi.org/10.1145/205447.205458>`_, Computer Communications Review 18:4, August 1988, pp. 106-114
Clark D., `The Design Philosophy of the DARPA Internet Protocols <https://dx.doi.org/10.1145/205447.205458>`_, Computer Communications Review 18:4, August 1988, pp. 106-114
Cohen, D., `On Holy Wars and a Plea for Peace`, IEN 137, April 1980, http://www.ietf.org/rfc/ien/ien137.txt
Cohen, D., `On Holy Wars and a Plea for Peace`, IEN 137, April 1980, http://www.ietf.org/rfc/ien/ien137.txt
CWE-444, `Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') <https://cwe.mitre.org/data/definitions/444.html>`_, https://cwe.mitre.org/data/definitions/444.html
CWE-444, `Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') <https://cwe.mitre.org/data/definitions/444.html>`_, https://cwe.mitre.org/data/definitions/444.html
Donahoo, M., Calvert, K., `TCP/IP Sockets in C: Practical Guide for Programmers <http://books.google.com/books?id=dmt_mERzxV4C>`_ , Morgan Kaufman, 2009
Donahoo, M., Calvert, K., `TCP/IP Sockets in C: Practical Guide for Programmers <http://books.google.com/books?id=dmt_mERzxV4C>`_ , Morgan Kaufman, 2009
Diffie, W., Hellman, M., `New directions in cryptography`, in Information Theory, IEEE Transactions on , vol.22, no.6, pp.644-654, Nov 1976, https://dx.doi.org/10.1109/TIT.1976.1055638
Diffie, W., Hellman, M., `New directions in cryptography`, in Information Theory, IEEE Transactions on , vol.22, no.6, pp.644-654, Nov 1976, https://dx.doi.org/10.1109/TIT.1976.1055638
Digital, Intel, Xerox, `The Ethernet: a local area network: data link layer and physical layer specifications <http://doi.acm.org/10.1145/1015591.1015594>`_. SIGCOMM Computer Communication Review 11, 3 (Jul. 1981), 20-66.
Digital, Intel, Xerox, `The Ethernet: a local area network: data link layer and physical layer specifications <http://doi.acm.org/10.1145/1015591.1015594>`_. SIGCOMM Computer Communication Review 11, 3 (Jul. 1981), 20-66.
Dimitropoulos, X., Krioukov, D., Fomenkov, M., Huffaker, B., Hyun, Y., Claffy, K., Riley, G., `AS Relationships: Inference and Validation <http://doi.acm.org/10.1145/1198255.1198259>`_, ACM SIGCOMM Computer Communication Review (CCR), Jan. 2007
Dimitropoulos, X., Krioukov, D., Fomenkov, M., Huffaker, B., Hyun, Y., Claffy, K., Riley, G., `AS Relationships: Inference and Validation <http://doi.acm.org/10.1145/1198255.1198259>`_, ACM SIGCOMM Computer Communication Review (CCR), Jan. 2007
Dalal, Y. K. and Printis, R. S., `48-bit absolute internet and Ethernet host numbers <http://doi.acm.org/10.1145/800081.802680>`_. In Proceedings of the Seventh Symposium on Data Communications (Mexico City, Mexico, October 27 - 29, 1981). SIGCOMM '81. ACM, New York, NY, 240-245.
Dalal, Y. K. and Printis, R. S., `48-bit absolute internet and Ethernet host numbers <http://doi.acm.org/10.1145/800081.802680>`_. In Proceedings of the Seventh Symposium on Data Communications (Mexico City, Mexico, October 27 - 29, 1981). SIGCOMM '81. ACM, New York, NY, 240-245.
Dukkipati, N., Refice, T., Cheng, Y., Chu, J., Herbert, T., Agarwal, A., Jain, A., Sutin, N., `An Argument for Increasing TCP's Initial Congestion Window <https://dx.doi.org/10.1145/1823844.1823848>`_, ACM SIGCOMM Computer Communications Review, vol. 40 (2010), pp. 27-33
Dukkipati, N., Refice, T., Cheng, Y., Chu, J., Herbert, T., Agarwal, A., Jain, A., Sutin, N., `An Argument for Increasing TCP's Initial Congestion Window <https://dx.doi.org/10.1145/1823844.1823848>`_, ACM SIGCOMM Computer Communications Review, vol. 40 (2010), pp. 27-33
Dubuisson, `ASN.1 : Communication between Heterogeneous Systems <http://www.oss.com/asn1/resources/books-whitepapers-pubs/asn1-books.html#dubuisson>`, Morgan Kauffman, 2000
Dubuisson, `ASN.1 : Communication between Heterogeneous Systems <http://www.oss.com/asn1/resources/books-whitepapers-pubs/asn1-books.html#dubuisson>`, Morgan Kauffman, 2000
Daemen, J., Rijmen, V., `The Design of Rijndael: AES – The Advanced Encryption Standard <http://www.springer.com/us/book/9783540425809>`_ Springer, 2002. ISBN 3-540-42580-2.
Daemen, J., Rijmen, V., `The Design of Rijndael: AES – The Advanced Encryption Standard <http://www.springer.com/us/book/9783540425809>`_ Springer, 2002. ISBN 3-540-42580-2.
Davik, F. Yilmaz, M. Gjessing, S. Uzun, N., `IEEE 802.17 resilient packet ring tutorial <https://dx.doi.org/10.1109/MCOM.2004.1273782>`_, IEEE Communications Magazine, Mar 2004, Vol 42, N 3, p. 112-118
Davik, F. Yilmaz, M. Gjessing, S. Uzun, N., `IEEE 802.17 resilient packet ring tutorial <https://dx.doi.org/10.1109/MCOM.2004.1273782>`_, IEEE Communications Magazine, Mar 2004, Vol 42, N 3, p. 112-118
Dijkstra, E., `A Note on Two Problems in Connection with Graphs <https://dx.doi.org/10.1007/BF01386390>`_. Numerische Mathematik, 1:269- 271, 1959
Dijkstra, E., `A Note on Two Problems in Connection with Graphs <https://dx.doi.org/10.1007/BF01386390>`_. Numerische Mathematik, 1:269- 271, 1959
Wikipedia, `Dijkstra's algorithm <https://en.wikipedia.org/wiki/Dijkstra's_algorithm>`_
Wikipedia, `Dijkstra's algorithm <https://en.wikipedia.org/wiki/Dijkstra's_algorithm>`_
ETSI, TS 103 533-3, v 1.1.1, `CYBER: Middlebox Security Protocol; Part 3: Profile for enterprise network and data center access control <https://www.etsi.org/deliver/etsi_ts/103500_103599/10352303/01.01.01_60/ts_10352303v010101p.pdf>`_, Oct. 2018
ETSI, TS 103 533-3, v 1.1.1, `CYBER: Middlebox Security Protocol; Part 3: Profile for enterprise network and data center access control <https://www.etsi.org/deliver/etsi_ts/103500_103599/10352303/01.01.01_60/ts_10352303v010101p.pdf>`_, Oct. 2018
Fletcher, J., `An Arithmetic Checksum for Serial Transmissions <https://dx.doi.org/10.1109/TCOM.1982.1095369>`_, Communications, IEEE Transactions on, Jan. 1982, Vol. 30, N. 1, pp. 247-252
Fletcher, J., `An Arithmetic Checksum for Serial Transmissions <https://dx.doi.org/10.1109/TCOM.1982.1095369>`_, Communications, IEEE Transactions on, Jan. 1982, Vol. 30, N. 1, pp. 247-252
Francois, P., Filsfils, C., Evans, J., and Bonaventure, O., `Achieving sub-second IGP convergence in large IP networks <http://doi.acm.org/10.1145/1070873.1070877>`_. SIGCOMM Computer Communication Review 35, 3 (Jul. 2005), 35-44.
Francois, P., Filsfils, C., Evans, J., and Bonaventure, O., `Achieving sub-second IGP convergence in large IP networks <http://doi.acm.org/10.1145/1070873.1070877>`_. SIGCOMM Computer Communication Review 35, 3 (Jul. 2005), 35-44.
Sally Floyd and Van Jacobson. 1993. `Random early detection gateways for congestion avoidance <https://dx.doi.org/10.1109/90.251892>`_. IEEE/ACM Transactions Networking 1, 4 (August 1993), 397-413.
Sally Floyd and Van Jacobson. 1993. `Random early detection gateways for congestion avoidance <https://dx.doi.org/10.1109/90.251892>`_. IEEE/ACM Transactions Networking 1, 4 (August 1993), 397-413.
Floyd, S., and Jacobson, V., `The Synchronization of Periodic Routing Messages <https://dx.doi.org/10.1109/90.298431>`_, IEEE/ACM Transactions on Networking, V.2 N.2, p. 122-136, April 1994
Floyd, S., and Jacobson, V., `The Synchronization of Periodic Routing Messages <https://dx.doi.org/10.1109/90.298431>`_, IEEE/ACM Transactions on Networking, V.2 N.2, p. 122-136, April 1994
Freier, A., Karlton, P., Kocher, C., `The SSL Protocol Version 3.0`, Internet draft, November 1996, https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00
Freier, A., Karlton, P., Kocher, C., `The SSL Protocol Version 3.0`, Internet draft, November 1996, https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00
Fortz, B. Rexford, J. ,Thorup, M., `Traffic engineering with traditional IP routing protocols <https://dx.doi.org/10.1109/MCOM.2002.1039866>`_, IEEE Communication Magazine, October 2002
Fortz, B. Rexford, J. ,Thorup, M., `Traffic engineering with traditional IP routing protocols <https://dx.doi.org/10.1109/MCOM.2002.1039866>`_, IEEE Communication Magazine, October 2002
Theodore Faber, Joe Touch, and Wei Yue, `The TIME-WAIT state in TCP and Its Effect on Busy Servers <https://dx.doi.org/10.1109/INFCOM.1999.752180>`_, Proceedings INFOCOM'99, pp. 1573
Theodore Faber, Joe Touch, and Wei Yue, `The TIME-WAIT state in TCP and Its Effect on Busy Servers <https://dx.doi.org/10.1109/INFCOM.1999.752180>`_, Proceedings INFOCOM'99, pp. 1573
Feldmeier, D. C., `Fast software implementation of error detection codes <https://dx.doi.org/10.1109/90.477710>`_. IEEE/ACM Transactions Networking 3, 6 (Dec. 1995), 640-651.
Feldmeier, D. C., `Fast software implementation of error detection codes <https://dx.doi.org/10.1109/90.477710>`_. IEEE/ACM Transactions Networking 3, 6 (Dec. 1995), 640-651.
Govindan, R., Alaettinoglu, C., Varadhan, K., Estrin, D., `An Architecture for Stable, Analyzable Internet Routing <https://dx.doi.org/10.1109/65.750447>`_, IEEE Network Magazine, Vol. 13, No. 1, pp. 29--35, January 1999
Govindan, R., Alaettinoglu, C., Varadhan, K., Estrin, D., `An Architecture for Stable, Analyzable Internet Routing <https://dx.doi.org/10.1109/65.750447>`_, IEEE Network Magazine, Vol. 13, No. 1, pp. 29--35, January 1999
Grier, D., Campbell, M., `A social history of Bitnet and Listserv <http://www.computer.org/portal/web/csdl/doi/10.1109/85.841135>`_, 1985-1991, Annals of the History of Computing, IEEE, Volume 22, Issue 2, Apr-Jun 2000, pp. 32 - 41
Grier, D., Campbell, M., `A social history of Bitnet and Listserv <http://www.computer.org/portal/web/csdl/doi/10.1109/85.841135>`_, 1985-1991, Annals of the History of Computing, IEEE, Volume 22, Issue 2, Apr-Jun 2000, pp. 32 - 41
Genilloud, G., `X.400 MHS: first steps towards an EDI communication standard <http://doi.acm.org/10.1145/378570.378712>`_. SIGCOMM Computer Communication Review 20, 2 (Apr. 1990), 72-86.
Genilloud, G., `X.400 MHS: first steps towards an EDI communication standard <http://doi.acm.org/10.1145/378570.378712>`_. SIGCOMM Computer Communication Review 20, 2 (Apr. 1990), 72-86.
Greenwald, `No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State <https://books.google.be/books?isbn=1627790748>`_, Metropolitan books, 2014
Greenwald, `No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State <https://books.google.be/books?isbn=1627790748>`_, Metropolitan books, 2014
Gao, L., Griffin, T., Rexford, J., `Inherently safe backup routing with BGP <https://dx.doi.org/10.1109/INFCOM.2001.916777>`_, Proceedings IEEE INFOCOM, April 2001
Gao, L., Griffin, T., Rexford, J., `Inherently safe backup routing with BGP <https://dx.doi.org/10.1109/INFCOM.2001.916777>`_, Proceedings IEEE INFOCOM, April 2001
Gettys, J., Nichols, K., `Bufferbloat: dark buffers in the internet <http://queue.acm.org/detail.cfm?id=2063196>`_. Communications of the ACM 55, no. 1 (2012): 57-65.
Gettys, J., Nichols, K., `Bufferbloat: dark buffers in the internet <http://queue.acm.org/detail.cfm?id=2063196>`_. Communications of the ACM 55, no. 1 (2012): 57-65.
Gao, L., Rexford, J., `Stable Internet routing without global coordination <https://dx.doi.org/10.1109/90.974523>`_, IEEE/ACM Transactions on Networking, December 2001, pp. 681-692
Gao, L., Rexford, J., `Stable Internet routing without global coordination <https://dx.doi.org/10.1109/90.974523>`_, IEEE/ACM Transactions on Networking, December 2001, pp. 681-692
Griffin, T. G., Shepherd, F. B., and Wilfong, G., `The stable paths problem and interdomain routing <https://dx.doi.org/10.1109/90.993304>`_. IEEE/ACM Transactions Networking 10, 2 (Apr. 2002), 232-243
Griffin, T. G., Shepherd, F. B., and Wilfong, G., `The stable paths problem and interdomain routing <https://dx.doi.org/10.1109/90.993304>`_. IEEE/ACM Transactions Networking 10, 2 (Apr. 2002), 232-243
Griffin, T. G. and Wilfong, G., `An analysis of BGP convergence properties <http://doi.acm.org/10.1145/316194.316231>`_. SIGCOMM Computer Communication Review 29, 4 (Oct. 1999), 277-288.
Griffin, T. G. and Wilfong, G., `An analysis of BGP convergence properties <http://doi.acm.org/10.1145/316194.316231>`_. SIGCOMM Computer Communication Review 29, 4 (Oct. 1999), 277-288.
Garcia-Lunes-Aceves, J., `Loop-Free Routing Using Diffusing Computations <https://dx.doi.org/10.1109/90.222913>`_, IEEE/ACM Transactions on Networking, Vol. 1, No, 1, Feb. 1993
Garcia-Lunes-Aceves, J., `Loop-Free Routing Using Diffusing Computations <https://dx.doi.org/10.1109/90.222913>`_, IEEE/ACM Transactions on Networking, Vol. 1, No, 1, Feb. 1993
Gast, M., `802.11 Wireless Networks : The Definitive Guide <http://books.google.com/books?id=9rHnRzzMHLIC&pgis=1>`_, O'Reilly, 2002
Gast, M., `802.11 Wireless Networks : The Definitive Guide <http://books.google.com/books?id=9rHnRzzMHLIC&pgis=1>`_, O'Reilly, 2002
Gill, V. , `Lack of Priority Queuing Considered Harmful <http://queue.acm.org/detail.cfm?id=1036502>`_, ACM Queue, December 2004
Gill, V. , `Lack of Priority Queuing Considered Harmful <http://queue.acm.org/detail.cfm?id=1036502>`_, ACM Queue, December 2004
Goralski, W., `The Illustrated network : How TCP/IP works in a modern network <http://books.google.com/books?id=6nDtNA6VJ5YC>`_, Morgan Kaufmann, 2009
Goralski, W., `The Illustrated network : How TCP/IP works in a modern network <http://books.google.com/books?id=6nDtNA6VJ5YC>`_, Morgan Kaufmann, 2009
Helme, S., `Top 1 Million Analysis - September 2019 <https://scotthelme.co.uk/top-1-million-analysis-september-2019/>`_, 2019, https://scotthelme.co.uk/top-1-million-analysis-september-2019/
Helme, S., `Top 1 Million Analysis - September 2019 <https://scotthelme.co.uk/top-1-million-analysis-september-2019/>`_, 2019, https://scotthelme.co.uk/top-1-million-analysis-september-2019/
Ha, S., Rhee, I., and Xu, L., `CUBIC: a new TCP-friendly high-speed TCP variant <http://doi.acm.org/10.1145/1400097.1400105>`_. SIGOPS Operating Systems Review 42, 5 (Jul. 2008), 64-74.
Ha, S., Rhee, I., and Xu, L., `CUBIC: a new TCP-friendly high-speed TCP variant <http://doi.acm.org/10.1145/1400097.1400105>`_. SIGOPS Operating Systems Review 42, 5 (Jul. 2008), 64-74.
Hogg, S. Vyncke, E., `IPv6 Security <http://www.ciscopress.com/store/ipv6-security-9780133346312>`_, Cisco Press, 2008
Hogg, S. Vyncke, E., `IPv6 Security <http://www.ciscopress.com/store/ipv6-security-9780133346312>`_, Cisco Press, 2008
Ishihara, K., Mukai, M., Hiromi, R., Mawatari, M., `Packet Filter and Route Filter Recommendation for IPv6 at xSP routers <http://www.team-cymru.org/ReadingRoom/Templates/IPv6Routers/xsp-recommendations.html>`_, 2013
Ishihara, K., Mukai, M., Hiromi, R., Mawatari, M., `Packet Filter and Route Filter Recommendation for IPv6 at xSP routers <http://www.team-cymru.org/ReadingRoom/Templates/IPv6Routers/xsp-recommendations.html>`_, 2013
ISO, `Intermediate System to Intermediate System intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service (ISO 8473) <http://standards.iso.org/ittf/PubliclyAvailableStandards/c030932_ISO_IEC_10589_2002(E).zip>`_ , 2002
ISO, `Intermediate System to Intermediate System intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service (ISO 8473) <http://standards.iso.org/ittf/PubliclyAvailableStandards/c030932_ISO_IEC_10589_2002(E).zip>`_ , 2002
Jacobson, V., `Congestion avoidance and control <http://doi.acm.org/10.1145/52324.52356>`_. In Symposium Proceedings on Communications Architectures and Protocols (Stanford, California, United States, August 16 - 18, 1988). V. Cerf, Ed. SIGCOMM '88. ACM, New York, NY, 314-329.
Jacobson, V., `Congestion avoidance and control <http://doi.acm.org/10.1145/52324.52356>`_. In Symposium Proceedings on Communications Architectures and Protocols (Stanford, California, United States, August 16 - 18, 1988). V. Cerf, Ed. SIGCOMM '88. ACM, New York, NY, 314-329.
Jain, R., `Congestion control in computer networks : Issues and trends <https://dx.doi.org/10.1109/65.56532>`_, IEEE Network Magazine, May 1990, pp. 24-30
Jain, R., `Congestion control in computer networks : Issues and trends <https://dx.doi.org/10.1109/65.56532>`_, IEEE Network Magazine, May 1990, pp. 24-30
Jung, J., Sit, E., Balakrishnan, H., and Morris, R. 2002. `DNS performance and the effectiveness of caching <https://dx.doi.org/10.1109/TNET.2002.803905>`_. IEEE/ACM Transactions Networking 10, 5 (Oct. 2002), 589-603.
Jung, J., Sit, E., Balakrishnan, H., and Morris, R. 2002. `DNS performance and the effectiveness of caching <https://dx.doi.org/10.1109/TNET.2002.803905>`_. IEEE/ACM Transactions Networking 10, 5 (Oct. 2002), 589-603.
JSON-RPC Working group, `JSON-RPC 2.0 Specification <http://www.jsonrpc.org/specification>`_, available on http://www.jsonrpc.org, 2010
JSON-RPC Working group, `JSON-RPC 2.0 Specification <http://www.jsonrpc.org/specification>`_, available on http://www.jsonrpc.org, 2010
Kerrisk, M., `The Linux Programming Interface <http://nostarch.com/tlpi>`_, No Starch Press, 2010
Kerrisk, M., `The Linux Programming Interface <http://nostarch.com/tlpi>`_, No Starch Press, 2010
Kent, C. A. and Mogul, J. C., `Fragmentation considered harmful <http://doi.acm.org/10.1145/205447.205456>`_. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 75-87.
Kent, C. A. and Mogul, J. C., `Fragmentation considered harmful <http://doi.acm.org/10.1145/205447.205456>`_. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 75-87.
Krombholz, K., Mayer, W., Schmiedecker, M. and Weippl, E., 2017. `" I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS <https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/krombholz>`_. In 26th {USENIX} Security Symposium ({USENIX} Security 17) (pp. 1339-1356).
Krombholz, K., Mayer, W., Schmiedecker, M. and Weippl, E., 2017. `" I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS <https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/krombholz>`_. In 26th {USENIX} Security Symposium ({USENIX} Security 17) (pp. 1339-1356).
Kühlewind, M., Neuner, S., Trammell, B., `On the state of ECN and TCP Options on the Internet <http://link.springer.com/chapter/10.1007%2F978-3-642-36516-4_14>`_. Proceedings of the 14th Passive and Active Measurement conference (PAM 2013), Hong Kong, March 2013
Kühlewind, M., Neuner, S., Trammell, B., `On the state of ECN and TCP Options on the Internet <http://link.springer.com/chapter/10.1007%2F978-3-642-36516-4_14>`_. Proceedings of the 14th Passive and Active Measurement conference (PAM 2013), Hong Kong, March 2013
Karn, P. and Partridge, C., `Improving round-trip time estimates in reliable transport protocols <http://doi.acm.org/10.1145/118544.118549>`_. ACM Transactions Computer Systems 9, 4 (Nov. 1991), 364-373.
Karn, P. and Partridge, C., `Improving round-trip time estimates in reliable transport protocols <http://doi.acm.org/10.1145/118544.118549>`_. ACM Transactions Computer Systems 9, 4 (Nov. 1991), 364-373.
Karn, P., Price, H., Diersing, R., `Packet radio in amateur service <https://dx.doi.org/10.1109/JSAC.1985.1146214>`_, IEEE Journal on Selected Areas in Communications, 3, May, 1985
Karn, P., Price, H., Diersing, R., `Packet radio in amateur service <https://dx.doi.org/10.1109/JSAC.1985.1146214>`_, IEEE Journal on Selected Areas in Communications, 3, May, 1985
Kaufman, C., Perlman, R., and Sommerfeld, B. `DoS protection for UDP-based protocols <http://doi.acm.org/10.1145/948109.948113>`_. In Proceedings of the 10th ACM Conference on Computer and Communications Security (Washington D.C., USA, October 27 - 30, 2003). CCS '03. ACM, New York, NY, 2-7.
Kaufman, C., Perlman, R., and Sommerfeld, B. `DoS protection for UDP-based protocols <http://doi.acm.org/10.1145/948109.948113>`_. In Proceedings of the 10th ACM Conference on Computer and Communications Security (Washington D.C., USA, October 27 - 30, 2003). CCS '03. ACM, New York, NY, 2-7.
Kaufman, C., Perlman, R., Speciner, M., `Network Security : Private communication in a public world <https://books.google.be/books?id=wxMqaz4JMb0C>`_, 2nd edition, Prentice Hall, 2002
Kaufman, C., Perlman, R., Speciner, M., `Network Security : Private communication in a public world <https://books.google.be/books?id=wxMqaz4JMb0C>`_, 2nd edition, Prentice Hall, 2002
Kung, N.T. Morris, R., `Credit-based flow control for ATM networks <https://dx.doi.org/10.1109/65.372658>`_, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages: 40-48
Kung, N.T. Morris, R., `Credit-based flow control for ATM networks <https://dx.doi.org/10.1109/65.372658>`_, IEEE Network, Mar/Apr 1995, Volume: 9, Issue: 2, pages: 40-48
Krishnamurthy, B. and Rexford, J., `Web Protocols and Practice: HTTP/1.1, Networking Protocols, Caching, and Traffic Measurement <https://books.google.be/books?id=g_1SAAAAMAAJ&q=Web+Protocols+and+Practice:+HTTP/1.1,+Networking+Protocols,+Caching,+and+Traffic+Measurement&dq=Web+Protocols+and+Practice:+HTTP/1.1,+Networking+Protocols,+Caching,+and+Traffic+Measurement&hl=en&sa=X&ved=0ahUKEwi4r4O4p73lAhU3SBUIHSOWBwkQ6AEIKTAA>`_, Addison Wesley, 2001
Krishnamurthy, B. and Rexford, J., `Web Protocols and Practice: HTTP/1.1, Networking Protocols, Caching, and Traffic Measurement <https://books.google.be/books?id=g_1SAAAAMAAJ&q=Web+Protocols+and+Practice:+HTTP/1.1,+Networking+Protocols,+Caching,+and+Traffic+Measurement&dq=Web+Protocols+and+Practice:+HTTP/1.1,+Networking+Protocols,+Caching,+and+Traffic+Measurement&hl=en&sa=X&ved=0ahUKEwi4r4O4p73lAhU3SBUIHSOWBwkQ6AEIKTAA>`_, Addison Wesley, 2001
Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K.G., Vallina-Rodriguez, N. and Caballero, J., 2018, October. `Coming of age: A longitudinal study of TLS deployment <https://doi.org/10.1145/3278532.3278568>`_. In Proceedings of the Internet Measurement Conference 2018 (pp. 415-428). ACM.
Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K.G., Vallina-Rodriguez, N. and Caballero, J., 2018, October. `Coming of age: A longitudinal study of TLS deployment <https://doi.org/10.1145/3278532.3278568>`_. In Proceedings of the Internet Measurement Conference 2018 (pp. 415-428). ACM.
Kleinrock, L., Tobagi, F., `Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and their Throughput-Delay Characteristics <https://dx.doi.org/10.1109/TCOM.1975.1092768>`_, IEEE Transactions on Communications, Vol. COM-23, No. 12, pp. 1400-1416, December 1975.
Kleinrock, L., Tobagi, F., `Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and their Throughput-Delay Characteristics <https://dx.doi.org/10.1109/TCOM.1975.1092768>`_, IEEE Transactions on Communications, Vol. COM-23, No. 12, pp. 1400-1416, December 1975.
Katz, D., Ward, D., `Bidirectional Forwarding Detection`, :rfc:`5880`, June 2010
Katz, D., Ward, D., `Bidirectional Forwarding Detection`, :rfc:`5880`, June 2010
Khanna, A. and Zinky, J. 1989. `The revised ARPANET routing metric <http://doi.acm.org/10.1145/75247.75252>`_. SIGCOMM Computer Communication Review 19, 4 (Aug. 1989), 45-56.
Khanna, A. and Zinky, J. 1989. `The revised ARPANET routing metric <http://doi.acm.org/10.1145/75247.75252>`_. SIGCOMM Computer Communication Review 19, 4 (Aug. 1989), 45-56.
Lamport, L., `Password authentication with insecure communication <http://doi.acm.org/10.1145/358790.358797>`_. Communications ACM 24, 11 (November 1981), 770-772.
Lamport, L., `Password authentication with insecure communication <http://doi.acm.org/10.1145/358790.358797>`_. Communications ACM 24, 11 (November 1981), 770-772.
Eng Keong Lua, Crowcroft, J., Pias, M., Sharma, R., Lim, S., `A survey and comparison of peer-to-peer overlay network schemes <https://dx.doi.org/10.1109/COMST.2005.1610546>`_, Communications Surveys & Tutorials, IEEE, Volume: 7 , Issue: 2, 2005, pp. 72-93
Eng Keong Lua, Crowcroft, J., Pias, M., Sharma, R., Lim, S., `A survey and comparison of peer-to-peer overlay network schemes <https://dx.doi.org/10.1109/COMST.2005.1610546>`_, Communications Surveys & Tutorials, IEEE, Volume: 7 , Issue: 2, 2005, pp. 72-93
Leroy, D. and O. Bonaventure, `Preparing network configurations for IPv6 renumbering <http://inl.info.ucl.ac.be/system/files/dleroy-nem-2009.pdf>`_, International Journal of Network Management, 2009
Leroy, D. and O. Bonaventure, `Preparing network configurations for IPv6 renumbering <http://inl.info.ucl.ac.be/system/files/dleroy-nem-2009.pdf>`_, International Journal of Network Management, 2009
Leffler, S., Fabry, R., Joy, W., Lapsley, P., Miller, S., Torek, C., `An Advanced 4.4BSD Interprocess Communication Tutorial <http://docs.freebsd.org/44doc/psd/21.ipc/paper.pdf>`_, 4.4 BSD Programmer's Supplementary Documentation
Leffler, S., Fabry, R., Joy, W., Lapsley, P., Miller, S., Torek, C., `An Advanced 4.4BSD Interprocess Communication Tutorial <http://docs.freebsd.org/44doc/psd/21.ipc/paper.pdf>`_, 4.4 BSD Programmer's Supplementary Documentation
Leboudec, J.-Y., `Rate Adaptation Congestion Control and Fairness : a tutorial <http://ica1www.epfl.ch/PS_files/LEB3132.pdf>`_, Dec. 2008
Leboudec, J.-Y., `Rate Adaptation Congestion Control and Fairness : a tutorial <http://ica1www.epfl.ch/PS_files/LEB3132.pdf>`_, Dec. 2008
McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J., `OpenFlow: enabling innovation in campus networks <https://doi.org/10.1145/1355734.1355746>`_. ACM SIGCOMM Computer Communication Review. 2008 Mar 31;38(2):69-74.
McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J., `OpenFlow: enabling innovation in campus networks <https://doi.org/10.1145/1355734.1355746>`_. ACM SIGCOMM Computer Communication Review. 2008 Mar 31;38(2):69-74.
McQuillan, J. M., Richer, I., and Rosen, E. C., `An overview of the new routing algorithm for the ARPANET <http://doi.acm.org/10.1145/800092.802981>`_. In Proceedings of the Sixth Symposium on Data Communications (Pacific Grove, California, United States, November 27 - 29, 1979). SIGCOMM '79. ACM, New York, NY, 63-68.
McQuillan, J. M., Richer, I., and Rosen, E. C., `An overview of the new routing algorithm for the ARPANET <http://doi.acm.org/10.1145/800092.802981>`_. In Proceedings of the Sixth Symposium on Data Communications (Pacific Grove, California, United States, November 27 - 29, 1979). SIGCOMM '79. ACM, New York, NY, 63-68.
McQuillan, J.M., Richer, I., Rosen, E., `The New Routing Algorithm for the ARPANET <https://dx.doi.org/10.1109/TCOM.1980.1094721>`_ Communications, IEEE Transactions on , vol.28, no.5, pp.711,719, May 1980
McQuillan, J.M., Richer, I., Rosen, E., `The New Routing Algorithm for the ARPANET <https://dx.doi.org/10.1109/TCOM.1980.1094721>`_ Communications, IEEE Transactions on , vol.28, no.5, pp.711,719, May 1980
Mathis, M., Semke, J., Mahdavi, J., and Ott, T. 1997. `The macroscopic behavior of the TCP congestion avoidance algorithm <http://doi.acm.org/10.1145/263932.264023>`_. SIGCOMM Computer Communication Review 27, 3 (Jul. 1997), 67-82.
Mathis, M., Semke, J., Mahdavi, J., and Ott, T. 1997. `The macroscopic behavior of the TCP congestion avoidance algorithm <http://doi.acm.org/10.1145/263932.264023>`_. SIGCOMM Computer Communication Review 27, 3 (Jul. 1997), 67-82.
Mühlbauer, W., Uhlig, S., Fu, B., Meulle, M., and Maennel, O., `In search for an appropriate granularity to model routing policies <http://doi.acm.org/10.1145/1282380.1282398>`_. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Kyoto, Japan, August 27 - 31, 2007). SIGCOMM '07. ACM, New York, NY, 145-156.
Mühlbauer, W., Uhlig, S., Fu, B., Meulle, M., and Maennel, O., `In search for an appropriate granularity to model routing policies <http://doi.acm.org/10.1145/1282380.1282398>`_. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (Kyoto, Japan, August 27 - 31, 2007). SIGCOMM '07. ACM, New York, NY, 145-156.
Malkin, G., `RIP: An Intra-Domain Routing Protocol <http://books.google.com/books?id=BtJpQgAACAAJ>`_, Addison Wesley, 1999
Malkin, G., `RIP: An Intra-Domain Routing Protocol <http://books.google.com/books?id=BtJpQgAACAAJ>`_, Addison Wesley, 1999
Metcalfe R., Boggs, D., `Ethernet: Distributed packet-switching for local computer networks <http://doi.acm.org/10.1145/360248.3602530>`_. Communications of the ACM, 19(7):395--404, 1976.
Metcalfe R., Boggs, D., `Ethernet: Distributed packet-switching for local computer networks <http://doi.acm.org/10.1145/360248.3602530>`_. Communications of the ACM, 19(7):395--404, 1976.
Mills, D.L., `Computer Network Time Synchronization: the Network Time Protocol <http://books.google.com/books?id=pdTcJBfnbq8C>`_. CRC Press, March 2006, 304 pp.
Mills, D.L., `Computer Network Time Synchronization: the Network Time Protocol <http://books.google.com/books?id=pdTcJBfnbq8C>`_. CRC Press, March 2006, 304 pp.
Mogul, J. , `The case for persistent-connection HTTP <http://doi.acm.org/10.1145/217382.217465>`_. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols For Computer Communication (Cambridge, Massachusetts, United States, August 28 - September 01, 1995). D. Oran, Ed. SIGCOMM '95. ACM, New York, NY, 299-313.
Mogul, J. , `The case for persistent-connection HTTP <http://doi.acm.org/10.1145/217382.217465>`_. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols For Computer Communication (Cambridge, Massachusetts, United States, August 28 - September 01, 1995). D. Oran, Ed. SIGCOMM '95. ACM, New York, NY, 299-313.
Modadugu, N. and Rescorla, E., 2004, February. `The Design and Implementation of Datagram TLS <https://www.ndss-symposium.org/wp-content/uploads/2017/09/Modadugu.pdf>`_. In NDSS.
Modadugu, N. and Rescorla, E., 2004, February. `The Design and Implementation of Datagram TLS <https://www.ndss-symposium.org/wp-content/uploads/2017/09/Modadugu.pdf>`_. In NDSS.
Moy, J., `OSPF: Anatomy of an Internet Routing Protocol <http://books.google.com/books?id=YXUWsqVhx60C>`_, Addison Wesley, 1998
Moy, J., `OSPF: Anatomy of an Internet Routing Protocol <http://books.google.com/books?id=YXUWsqVhx60C>`_, Addison Wesley, 1998
Menezes, A., van Oorschot, P. and Vanstone, S. , `Handbook of Applied Cryptography <http://cacr.uwaterloo.ca/hac/>`_ , CRC Press, 2011
Menezes, A., van Oorschot, P. and Vanstone, S. , `Handbook of Applied Cryptography <http://cacr.uwaterloo.ca/hac/>`_ , CRC Press, 2011
Myers, B. A., `A brief history of human-computer interaction technology <http://doi.acm.org/10.1145/274430.274436>`_. interactions 5, 2 (Mar. 1998), 44-54.
Myers, B. A., `A brief history of human-computer interaction technology <http://doi.acm.org/10.1145/274430.274436>`_. interactions 5, 2 (Mar. 1998), 44-54.
Nelson, T. H., `Complex information processing: a file structure for the complex, the changing and the indeterminate <http://doi.acm.org/10.1145/800197.806036>`_. In Proceedings of the 1965 20th National Conference (Cleveland, Ohio, United States, August 24 - 26, 1965). L. Winner, Ed. ACM '65. ACM, New York, NY, 84-100.
Nelson, T. H., `Complex information processing: a file structure for the complex, the changing and the indeterminate <http://doi.acm.org/10.1145/800197.806036>`_. In Proceedings of the 1965 20th National Conference (Cleveland, Ohio, United States, August 24 - 26, 1965). L. Winner, Ed. ACM '65. ACM, New York, NY, 84-100.
Nygren E, Sitaraman RK, Sun J., `The Akamai network: a platform for high-performance Internet applications <https://doi.org/10.1145/1842733.1842736>`_. ACM SIGOPS Operating Systems Review. 2010 Aug 17;44(3):2-19.
Nygren E, Sitaraman RK, Sun J., `The Akamai network: a platform for high-performance Internet applications <https://doi.org/10.1145/1842733.1842736>`_. ACM SIGOPS Operating Systems Review. 2010 Aug 17;44(3):2-19.
Paxson, V. , `End-to-end Internet packet dynamics <http://doi.acm.org/10.1145/263109.263155>`_. SIGCOMM Computer Communication Review 27, 4 (Oct. 1997), 139-152.
Paxson, V. , `End-to-end Internet packet dynamics <http://doi.acm.org/10.1145/263109.263155>`_. SIGCOMM Computer Communication Review 27, 4 (Oct. 1997), 139-152.
Perlman, R., `An algorithm for distributed computation of a spanning tree in an extended LAN <http://doi.acm.org/10.1145/318951.319004>`_. SIGCOMM Computer Communication Review 15, 4 (September 1985), 44-53.
Perlman, R., `An algorithm for distributed computation of a spanning tree in an extended LAN <http://doi.acm.org/10.1145/318951.319004>`_. SIGCOMM Computer Communication Review 15, 4 (September 1985), 44-53.
Perlman, R., `Interconnections : Bridges, routers, switches and internetworking protocols <http://books.google.com/books?id=AIRitf5C-QQC&pgis=1>`_, 2nd edition, Addison Wesley, 2000
Perlman, R., `Interconnections : Bridges, routers, switches and internetworking protocols <http://books.google.com/books?id=AIRitf5C-QQC&pgis=1>`_, 2nd edition, Addison Wesley, 2000
Prado, A., Harris, N., and Y. Gluck, `The BREACH Attack <http://breachattack.com>`_ , 2013, <http://breachattack.com/>.
Prado, A., Harris, N., and Y. Gluck, `The BREACH Attack <http://breachattack.com>`_ , 2013, <http://breachattack.com/>.
Rago, S., `UNIX System V network programming <http://www.pearsonhighered.com/educator/product/UNIX-System-V-Network-Programming/9780201563184.page>`_, Addison Wesley, 1993
Rago, S., `UNIX System V network programming <http://www.pearsonhighered.com/educator/product/UNIX-System-V-Network-Programming/9780201563184.page>`_, Addison Wesley, 1993
Rescorla, E., `Stanford Seminar - The TLS 1.3 protocol <https://www.youtube.com/watch?v=grRi-aFrbSE>`_, Nov. 2015
Rescorla, E., `Stanford Seminar - The TLS 1.3 protocol <https://www.youtube.com/watch?v=grRi-aFrbSE>`_, Nov. 2015
Ristic, I., `Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Web Servers and Applications <https://books.google.be/books?id=fQOLBAAAQBAJ>`_, Feisty Duck, 2015
Ristic, I., `Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Web Servers and Applications <https://books.google.be/books?id=fQOLBAAAQBAJ>`_, Feisty Duck, 2015
Ramakrishnan, K. K. and Jain, R., `A binary feedback scheme for congestion avoidance in computer networks with a connectionless network layer <http://doi.acm.org/10.1145/205447.205461>`_. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 138-156.
Ramakrishnan, K. K. and Jain, R., `A binary feedback scheme for congestion avoidance in computer networks with a connectionless network layer <http://doi.acm.org/10.1145/205447.205461>`_. SIGCOMM Computer Communication Review 25, 1 (Jan. 1995), 138-156.
Rivest, R., Shamir, A. and Adleman, L., `A method for obtaining digital signatures and public-key cryptosystems <http://doi.acm.org/10.1145/359340.359342>`_. Communications ACM 21, 2 (February 1978), 120-126
Rivest, R., Shamir, A. and Adleman, L., `A method for obtaining digital signatures and public-key cryptosystems <http://doi.acm.org/10.1145/359340.359342>`_. Communications ACM 21, 2 (February 1978), 120-126
Ramakrishnan, K.K. and Henry Yang, `The Ethernet Capture Effect: Analysis and Solution <http://www2.research.att.com/~kkrama/papers/capture_camera.pdf>`_, Proceedings of IEEE 19th Conference on Local Computer Networks, MN, Oct. 1994.
Ramakrishnan, K.K. and Henry Yang, `The Ethernet Capture Effect: Analysis and Solution <http://www2.research.att.com/~kkrama/papers/capture_camera.pdf>`_, Proceedings of IEEE 19th Conference on Local Computer Networks, MN, Oct. 1994.
Roberts, L., `ALOHA packet system with and without slots and capture <http://doi.acm.org/10.1145/1024916.1024920>`_. SIGCOMM Computer Communication Review 5, 2 (Apr. 1975), 28-42.
Roberts, L., `ALOHA packet system with and without slots and capture <http://doi.acm.org/10.1145/1024916.1024920>`_. SIGCOMM Computer Communication Review 5, 2 (Apr. 1975), 28-42.
Ross, F., `An overview of FDDI: The fiber distributed data interface <https://dx.doi.org/10.1109/49.44552>`_, IEEE J. Selected Areas in Comm., vol. 7, no. 7, pp. 1043-1051, Sept. 1989
Ross, F., `An overview of FDDI: The fiber distributed data interface <https://dx.doi.org/10.1109/49.44552>`_, IEEE J. Selected Areas in Comm., vol. 7, no. 7, pp. 1043-1051, Sept. 1989
Russell A., `Rough Consensus and Running Code and the Internet-OSI Standards War <https://dx.doi.org/10.1109/MAHC.2006.42>`_, IEEE Annals of the History of Computing, July-September 2006
Russell A., `Rough Consensus and Running Code and the Internet-OSI Standards War <https://dx.doi.org/10.1109/MAHC.2006.42>`_, IEEE Annals of the History of Computing, July-September 2006
Subramanian, L., Agarwal, S., Rexford, J., Katz, R.. .. `Characterizing the Internet hierarchy from multiple vantage points <https://dx.doi.org/10.1109/INFCOM.2002.1019307>`_. In IEEE INFOCOM, 2002
Subramanian, L., Agarwal, S., Rexford, J., Katz, R.. .. `Characterizing the Internet hierarchy from multiple vantage points <https://dx.doi.org/10.1109/INFCOM.2002.1019307>`_. In IEEE INFOCOM, 2002
Sechrest, S., `An Introductory 4.4BSD Interprocess Communication Tutorial <http://docs.freebsd.org/44doc/psd/20.ipctut/paper.pdf>`_, 4.4BSD Programmer's Supplementary Documentation
Sechrest, S., `An Introductory 4.4BSD Interprocess Communication Tutorial <http://docs.freebsd.org/44doc/psd/20.ipctut/paper.pdf>`_, 4.4BSD Programmer's Supplementary Documentation
Scheifler, R., Gettys, J., `X Window System: The Complete Reference to Xlib <http://h30097.www3.hp.com/docs/base_doc/DOCUMENTATION/V51B_ACRO_SUP/XWINSYS.PDF>`_, X Protocol, ICCCM, XLFD, X Version 11, Release 4, Digital Press
Scheifler, R., Gettys, J., `X Window System: The Complete Reference to Xlib <http://h30097.www3.hp.com/docs/base_doc/DOCUMENTATION/V51B_ACRO_SUP/XWINSYS.PDF>`_, X Protocol, ICCCM, XLFD, X Version 11, Release 4, Digital Press
Stone, J., Greenwald, M., Partridge, C., and Hughes, J., `Performance of checksums and CRC's over real data <https://dx.doi.org/10.1109/90.731187>`_. IEEE/ACM Transactions Networking 6, 5 (Oct. 1998), 529-543.
Stone, J., Greenwald, M., Partridge, C., and Hughes, J., `Performance of checksums and CRC's over real data <https://dx.doi.org/10.1109/90.731187>`_. IEEE/ACM Transactions Networking 6, 5 (Oct. 1998), 529-543.
Shoch, J. F. and Hupp, J. A., `Measured performance of an Ethernet local network <http://doi.acm.org/10.1145/359038.359044>`_. Communications ACM 23, 12 (Dec. 1980), 711-721.
Shoch, J. F. and Hupp, J. A., `Measured performance of an Ethernet local network <http://doi.acm.org/10.1145/359038.359044>`_. Communications ACM 23, 12 (Dec. 1980), 711-721.
Senapathi, S., Hernandez, R., `Introduction to TCP Offload Engines <http://www.dell.com/downloads/global/power/1q04-her.pdf>`_, March 2004
Senapathi, S., Hernandez, R., `Introduction to TCP Offload Engines <http://www.dell.com/downloads/global/power/1q04-her.pdf>`_, March 2004
Semke, J., Mahdavi, J., and Mathis, M., `Automatic TCP buffer tuning <http://doi.acm.org/10.1145/285243.285292>`_. SIGCOMM Computer Communication Review 28, 4 (Oct. 1998), 315-323.
Semke, J., Mahdavi, J., and Mathis, M., `Automatic TCP buffer tuning <http://doi.acm.org/10.1145/285243.285292>`_. SIGCOMM Computer Communication Review 28, 4 (Oct. 1998), 315-323.
Stevens R. and Fenner, and Rudoff, A., `UNIX Network Programming: The sockets networking API <http://books.google.com/books?id=ptSC4LpwGA0C>`_, Addison Wesley, 2004
Stevens R. and Fenner, and Rudoff, A., `UNIX Network Programming: The sockets networking API <http://books.google.com/books?id=ptSC4LpwGA0C>`_, Addison Wesley, 2004
Sklower, K. 1989. `Improving the efficiency of the OSI checksum calculation <http://doi.acm.org/10.1145/74681.74684>`_. SIGCOMM Computer Communication Review 19, 5 (Oct. 1989), 32-43.
Sklower, K. 1989. `Improving the efficiency of the OSI checksum calculation <http://doi.acm.org/10.1145/74681.74684>`_. SIGCOMM Computer Communication Review 19, 5 (Oct. 1989), 32-43.
Sarrar, N., Maier, G., Ager, B., Sommer, R. and Uhlig, S., `Investigating IPv6 traffic <http://link.springer.com/chapter/10.1007/978-3-642-28537-0_2>`_, Passive and Active Measurements, Lecture Notes in Computer Science vol 7192, 2012, pp.11-20
Sarrar, N., Maier, G., Ager, B., Sommer, R. and Uhlig, S., `Investigating IPv6 traffic <http://link.springer.com/chapter/10.1007/978-3-642-28537-0_2>`_, Passive and Active Measurements, Lecture Notes in Computer Science vol 7192, 2012, pp.11-20
Stallings, W., `Protocol Basics: Secure Shell Protocol <http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12-4/124_ssh.html>`_, Internet Protocol Journal, vol 12, n 4, Dec. 2009
Stallings, W., `Protocol Basics: Secure Shell Protocol <http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12-4/124_ssh.html>`_, Internet Protocol Journal, vol 12, n 4, Dec. 2009
Stevens, R., `TCP/IP Illustrated : the Protocols <http://books.google.com/books?id=-btNds68w84C>`_, Addison-Wesley, 1994
Stevens, R., `TCP/IP Illustrated : the Protocols <http://books.google.com/books?id=-btNds68w84C>`_, Addison-Wesley, 1994
Stevens, R., `UNIX Network Programming, Volume 1, Second Edition: Networking APIs: Sockets and XTI <http://books.google.com/books?id=ptSC4LpwGA0C>`_, Prentice Hall, 1998
Stevens, R., `UNIX Network Programming, Volume 1, Second Edition: Networking APIs: Sockets and XTI <http://books.google.com/books?id=ptSC4LpwGA0C>`_, Prentice Hall, 1998
Shreedhar and G. Varghese. `Efficient fair queueing using deficit round robin <http://doi.acm.org/10.1145/217391.217453>`_ SIGCOMM Computer Communication Review 25, 4 (October 1995), 231-242.
Shreedhar and G. Varghese. `Efficient fair queueing using deficit round robin <http://doi.acm.org/10.1145/217391.217453>`_ SIGCOMM Computer Communication Review 25, 4 (October 1995), 231-242.
Turkovic, B., Kuipers, F., Uhlig, S., `Fifty Shades of Congestion Control: A Performance and Interactions Evaluation <https://arxiv.org/abs/1903.03852>`_ CoRR abs/1903.03852 (2019)
Turkovic, B., Kuipers, F., Uhlig, S., `Fifty Shades of Congestion Control: A Performance and Interactions Evaluation <https://arxiv.org/abs/1903.03852>`_ CoRR abs/1903.03852 (2019)
Thomborson, C., `The V.42bis Standard for Data-Compressing Modems <http://www.computer.org/portal/web/csdl/doi/10.1109/40.166712>`_, IEEE Micro, September/October 1992 (vol. 12 no. 5), pp. 41-53
Thomborson, C., `The V.42bis Standard for Data-Compressing Modems <http://www.computer.org/portal/web/csdl/doi/10.1109/40.166712>`_, IEEE Micro, September/October 1992 (vol. 12 no. 5), pp. 41-53
The Unicode Consortium. `The Unicode Standard <http://unicode.org/versions/Unicode5.0.0/>`_, Version 5.0.0, defined by: The Unicode Standard, Version 5.0 (Boston, MA, Addison-Wesley, 2007
The Unicode Consortium. `The Unicode Standard <http://unicode.org/versions/Unicode5.0.0/>`_, Version 5.0.0, defined by: The Unicode Standard, Version 5.0 (Boston, MA, Addison-Wesley, 2007
Vasseur, J., Pickavet, M., and Demeester, P., `Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS <http://books.google.com/books?id=nYO305Y5eNAC>`_. Morgan Kaufmann Publishers Inc., 2004
Vasseur, J., Pickavet, M., and Demeester, P., `Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS <http://books.google.com/books?id=nYO305Y5eNAC>`_. Morgan Kaufmann Publishers Inc., 2004
Varghese, G., `Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices <http://books.google.com/books?id=01QORuRF6fIC>`_, Morgan Kaufmann, 2005
Varghese, G., `Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices <http://books.google.com/books?id=01QORuRF6fIC>`_, Morgan Kaufmann, 2005
Vyncke, E., Paggen, C., `LAN Switch Security: What Hackers Know About Your Switches <http://books.google.com/books?id=HkraAQAACAAJ>`_, Cisco Press, 2007
Vyncke, E., Paggen, C., `LAN Switch Security: What Hackers Know About Your Switches <http://books.google.com/books?id=HkraAQAACAAJ>`_, Cisco Press, 2007
Wang XS, Balasubramanian A, Krishnamurthy A, Wetherall D. `How Speedy is SPDY ? <https://www.usenix.org/conference/nsdi14/technical-sessions/wang>`_ . In 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14) 2014 (pp. 387-399).
Wang XS, Balasubramanian A, Krishnamurthy A, Wetherall D. `How Speedy is SPDY ? <https://www.usenix.org/conference/nsdi14/technical-sessions/wang>`_ . In 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14) 2014 (pp. 387-399).
White, R., Mc Pherson, D., Srihari, S., `Practical BGP <http://books.google.com/books?id=9OlSAAAAMAAJ>`_, Addison-Wesley, 2004
White, R., Mc Pherson, D., Srihari, S., `Practical BGP <http://books.google.com/books?id=9OlSAAAAMAAJ>`_, Addison-Wesley, 2004
Wessels, D., Fomenkov, M., `Wow, That's a lot of packets <https://www.caida.org/publications/papers/2003/dnspackets/>`_, Passive and Active Network Measurement Workshop (PAM), Apr 2003
Wessels, D., Fomenkov, M., `Wow, That's a lot of packets <https://www.caida.org/publications/papers/2003/dnspackets/>`_, Passive and Active Network Measurement Workshop (PAM), Apr 2003
Williams, R. `A painless guide to CRC error detection algorithms`, August 1993, unpublished manuscript, https://web.archive.org/web/20060101004751/http://www.ross.net/crc/download/crc_v3.txt
Williams, R. `A painless guide to CRC error detection algorithms`, August 1993, unpublished manuscript, https://web.archive.org/web/20060101004751/http://www.ross.net/crc/download/crc_v3.txt
Ware, R., Mukerjee, M., Seshan, S. and Sherry, J. `Modeling BBR's Interactions with Loss-Based Congestion Control <https://doi.org/10.1145/3355369.3355604>`_. In Proceedings of the Internet Measurement Conference (IMC '19). ACM, New York, NY, USA, 137-143.
Ware, R., Mukerjee, M., Seshan, S. and Sherry, J. `Modeling BBR's Interactions with Loss-Based Congestion Control <https://doi.org/10.1145/3355369.3355604>`_. In Proceedings of the Internet Measurement Conference (IMC '19). ACM, New York, NY, USA, 137-143.
ITU-T, recommendation X.200, `Open Systems Interconnection - Model and Notation <http://www.itu.int/rec/T-REC-X.200-199407-I/en>`_, 1994
ITU-T, recommendation X.200, `Open Systems Interconnection - Model and Notation <http://www.itu.int/rec/T-REC-X.200-199407-I/en>`_, 1994
Ylonen, T., `SSH — Secure Login Connections over the Internet <https://www.usenix.org/legacy/publications/library/proceedings/sec96/full_papers/ylonen/index.html>`_, Usenix Security 1996
Ylonen, T., `SSH — Secure Login Connections over the Internet <https://www.usenix.org/legacy/publications/library/proceedings/sec96/full_papers/ylonen/index.html>`_, Usenix Security 1996
Zimmermann T., Wolters B., Hohlfeld O., Wehrle K. `Is the web ready for HTTP/2 server push? <http://doi.acm.org/10.1145/3281411.3281434>`_ , Proceedings of the 14th International Conference on emerging Networking Experiments and Technologies 2018 Dec 4 (pp. 13-19). ACM.
Zimmermann T., Wolters B., Hohlfeld O., Wehrle K. `Is the web ready for HTTP/2 server push? <http://doi.acm.org/10.1145/3281411.3281434>`_ , Proceedings of the 14th International Conference on emerging Networking Experiments and Technologies 2018 Dec 4 (pp. 13-19). ACM.
Zimmermann, H., `OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection <https://dx.doi.org/10.1109/TCOM.1980.1094702>`_, IEEE Transactions on Communications, vol. 28, no. 4, April 1980, pp. 425 - 432.
Zimmermann, H., `OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection <https://dx.doi.org/10.1109/TCOM.1980.1094702>`_, IEEE Transactions on Communications, vol. 28, no. 4, April 1980, pp. 425 - 432.
Zakon, R., `Hobbes Internet Timeline <https://www.zakon.org/robert/internet/timeline/>`_, online, https://www.zakon.org/robert/internet/timeline/
Zakon, R., `Hobbes Internet Timeline <https://www.zakon.org/robert/internet/timeline/>`_, online, https://www.zakon.org/robert/internet/timeline/
Zheng, X., `Phishing with Unicode Domains <https://www.xudongz.com/blog/2017/idn-phishing/>`_, April 14, 2017, https://www.xudongz.com/blog/2017/idn-phishing/
Zheng, X., `Phishing with Unicode Domains <https://www.xudongz.com/blog/2017/idn-phishing/>`_, April 14, 2017, https://www.xudongz.com/blog/2017/idn-phishing/