Z. Durumeric, E. Wustrow, and J. A. Halderman, Zmap : The internet scanner, 2013.

B. Gellman and A. Soltani, NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say. The Washington Post, 2013.

M. Honda, Y. Nishida, C. Raiciu, A. Greenhalgh, M. Handley et al., Is it still possible to extend TCP?, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pp.181-194, 2011.
DOI : 10.1145/2068816.2068834

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.393.9322

J. Juhl, Applying patches to the Linux kernel, 2005.

M. Krzywinski, Port knocking : Network authentication across closed ports, SysAdmin Magazine, vol.12, pp.12-17, 2003.

B. Leidl, Obfuscated openssh. https://github.com/brl/obfuscated-openssh, 2010.