C. Hacking and . Modem, What Cable Companies Don't Want You to Know, 2006.

S. Alexander and R. Droms, DHCP Options and BOOTP Vendor Extensions, 1997.
DOI : 10.17487/rfc2132

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.3028

D. Endler and M. Collier, Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions, 2007.

M. S. Johns, DOCSIS Cable Device MIB Cable Device Management Information Base for DOCSIS compliant Cable Modems and Cable Modem Termination Systems, RFC 2669, 1999.

P. S. Latini, Avoiding Piracy in DOCSIS Networks. Canitec Conference and Exhibition, 2010.

J. Mckelvey, Combating security risks on the cable IP network, 2002.

M. Millet, Theft of Service ? Inevitable? CableFAX: The Magazine, 2005.

P. Pahwa, G. Tiwari, and R. Chhabra, Spoofing Media Access Control (MAC) and its Counter Measures, International Journal of Advanced Engineering & Application, 2010.

D. Raftus and E. Cardona, Radio Frequency (RF) Interface Management Information Base for Data over Cable Service Interface Specifications (DOCSIS) 2.0 Compliant RF Interfaces, RFC, vol.4546, 2006.
DOI : 10.17487/rfc4546

N. Shah, D. Kouvatsos, J. Martin, and S. Moser, A Tutorial on DOCSIS: Protocol and Performance Models, International Working Conference on Performance Modeling and Evaluation of Heterogeneous Networks, 2005.

F. Swiderski and W. Snyder, Threat modeling, 2004.