- 1.Internet assigned numbers authority (IANA), http://www.iana.org/assignments/port-number (last accessed October, 2009)
- 2.A. Madhukar, C. Williamson, A longitudinal study of p2p traffic classification, in: MASCOTS ’06: Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation, IEEE Computer Society, Washington, DC, USA, 2006, pp. 179–188. doi:http://dx.doi.org/10.1109/MASCOTS.2006.6.
- 3.J. Klensin, SIMPLE MAIL TRANSFER PROTOCOL, IETF RFC 821, April 2001; http://www.ietf.org/rfc/rfc2821.txt
- 4.Bro intrusion detection system - Bro overview, http://broids. org, as of August 14, 2007.
- 5.V. Paxson, “Bro: A system for detecting network intruders in real-time,†Computer Networks, no. 31(23-24), pp. 2435– 2463, 1999.
- 6.Azzouna, Nadia Ben and Guillemin, Fabrice, Analysis of ADSL Trafficon an IP Backbone Link, IEEE IEEE Global Telecommunications Conference 2003, San Francisco, USA, December 2003.
- 7.Cho, Kenjiro, Fukuda, Kenshue, Esaki, Hiroshi and Kato, Akira, The Impact and Implications of the Growth in Residential User-to-User Traffic, ACM SIGCOMM 2006, Pisa, Italy, September 2006.
- 8.Balachandran, Anand; Voelker, Geoffrey M.; Bahl, Paramvir and Ragan,P. Venkat, Characterizing user behavior and network performance in a public wireless LAN, Proceedings of the 2002 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 195-205, 2002.