Daş, Resul; Karabade, Abubakar; Tuna, Gurkan (2015). "Common network attack types and defense mechanisms". 2015 23nd Signal Processing and Communications Applications Conference (SIU). pp. 2658–2661. doi:10.1109/SIU.2015.7130435. ISBN978-1-4673-7386-9. S2CID11256038.
Mahmood, H.B. (2003). "Transport layer security protocol in Telnet". 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732). Vol. 3. pp. 1033–1037 Vol.3. doi:10.1109/APCC.2003.1274255. ISBN0-7803-8114-9. S2CID56798078.
Srinivasa, Shreyas; Pedersen, Jens Myrup; Vasilomanolakis, Emmanouil (2021-11-02). "Open for hire". Proceedings of the 21st ACM Internet Measurement Conference. IMC '21. New York, NY, USA: Association for Computing Machinery. pp. 195–215. doi:10.1145/3487552.3487833. ISBN978-1-4503-9129-0. S2CID240357287.
Crocker, Stephen D.; Heafner, John F.; Metcalfe, Robert M.; Postel, Jonathan B. (1971). "Function-oriented protocols for the ARPA computer network". Proceedings of the November 16-18, 1971, fall joint computer conference on - AFIPS '71 (Fall). Association for Computing Machinery. pp. 271–279. doi:10.1145/1478873.1478908. ISBN9781450379090.
Daş, Resul; Karabade, Abubakar; Tuna, Gurkan (2015). "Common network attack types and defense mechanisms". 2015 23nd Signal Processing and Communications Applications Conference (SIU). pp. 2658–2661. doi:10.1109/SIU.2015.7130435. ISBN978-1-4673-7386-9. S2CID11256038.
Mahmood, H.B. (2003). "Transport layer security protocol in Telnet". 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732). Vol. 3. pp. 1033–1037 Vol.3. doi:10.1109/APCC.2003.1274255. ISBN0-7803-8114-9. S2CID56798078.
Srinivasa, Shreyas; Pedersen, Jens Myrup; Vasilomanolakis, Emmanouil (2021-11-02). "Open for hire". Proceedings of the 21st ACM Internet Measurement Conference. IMC '21. New York, NY, USA: Association for Computing Machinery. pp. 195–215. doi:10.1145/3487552.3487833. ISBN978-1-4503-9129-0. S2CID240357287.
Samtani, Sagar; Yu, Shuo; Zhu, Hongyi; Patton, Mark; Chen, Hsinchun (2016). "Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques". 2016 IEEE Conference on Intelligence and Security Informatics (ISI). pp. 25–30. doi:10.1109/ISI.2016.7745438. ISBN978-1-5090-3865-7. S2CID11741873.
Ylonen, Tatu. "History of the SSH Protocol". SSH home page. SSH Communications Security, Inc. Archived from the original on 25 July 2018. Retrieved 14 June 2017.
Poulsen, Kevin (2 April 2007). "Telnet, dead at 35...RIP". Wired. p. 24. Archived from the original on 21 December 2016. Retrieved 14 June 2017.
Ylonen, Tatu. "History of the SSH Protocol". SSH home page. SSH Communications Security, Inc. Archived from the original on 25 July 2018. Retrieved 14 June 2017.
Todorov, Dobromir (2007). Mechanics of user identification and authentication : fundamentals of identity management. Boca Raton: Auerbach Publications. ISBN978-1-4200-5220-6. OCLC263353270.
Todorov, Dobromir (2007). Mechanics of user identification and authentication : fundamentals of identity management. Boca Raton: Auerbach Publications. ISBN978-1-4200-5220-6. OCLC263353270.