
7BIBLIOGRAPHY
Borovicka, Tomas, Marcel Jirina, Pavel Kordik, and Marcel Jiri. 2012. “Selecting Representative Data
Sets.” In Advances in Data Mining Knowledge Discovery and Applications, edited by Adem
Karahoca. InTech. https://doi.org/10.5772/50787.
Buchanan, Mark. 2007. “Statistics: Conviction by Numbers.” News. Nature. January 17, 2007.
https://doi.org/10.1038/445254a.
Constantin, Lucian. 2012. “Tools Released at Defcon Can Crack Widely Used PPTP Encryption in under
a Day.” Computerworld. July 29, 2012.
https://www.computerworld.com/article/2505117/cyberwarfare/tools-released-at-defcon-
can-crack-widely-used-pptp-encryption-in-under-a-day.html.
Fielding, Roy, and Julian Reschke. n.d. “Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and
Routing.” Accessed May 27, 2018. https://tools.ietf.org/html/rfc7230.
foo.com, Jasper packet-. 2014. “Determining TCP Initial Round Trip Time.” Packet-Foo.Com (blog). July
25, 2014. https://blog.packet-foo.com/2014/07/determining-tcp-initial-round-trip-time/.
“Global Internet Testing | Speedchecker Ltd.” n.d. Accessed September 18, 2018.
https://probeapi.speedchecker.xyz/.
Hills, Roy. (2013) 2018. The IKE Scanner. Contribute to Royhills/Ike-Scan Development by Creating an
Account on GitHub. C. https://github.com/royhills/ike-scan.
“IBM Knowledge Center - Scan Duration and Ports Scanning.” n.d. Accessed September 26, 2018.
https://www.ibm.com/support/knowledgecenter/en/SS42VS_7.2.6/com.ibm.qradar.doc/c_
qvm_scan_times_ports.html.
“ICMP Tunnel.” 2018. Wikipedia.
https://en.wikipedia.org/w/index.php?title=ICMP_tunnel&oldid=846302017.
IP2Location. n.d. “IP2Proxy LITE IP-COUNTRY Database.” IP2Location. Accessed June 3, 2018.
https://lite.ip2location.com/database/px1-ip-country.
“IPsec.” 2018. Wikipedia. https://en.wikipedia.org/w/index.php?title=IPsec&oldid=863034235.
Koblas, David. 1992. “SOCKS.” In .
“Layer 2 Tunneling Protocol.” 2018. Wikipedia.
https://en.wikipedia.org/w/index.php?title=Layer_2_Tunneling_Protocol&oldid=862304783.
“Layer Two Tunneling Protocol.” n.d. Accessed October 11, 2018.
http://www.chimica.unipd.it/luigino.feltre/pubblica/unix/winnt_doc/2000/inbe_vpn_njvv.ht
ml.
Leech, Marcus. 1996. “SOCKS Protocol Version 5.” March 1996. https://tools.ietf.org/html/rfc1928.
liquidat. (2013) 2018. Nagios/Icinga Check for OpenVPN Availability Monitoring: Liquidat/Nagios-
Icinga-Openvpn. Python. https://github.com/liquidat/nagios-icinga-openvpn.
“Manuals.” n.d. Accessed September 26, 2018. https://openvpn.net/index.php/manuals.html.
“Meet Algo, the VPN That Works.” 2016. Trail of Bits Blog (blog). December 12, 2016.
https://blog.trailofbits.com/2016/12/12/meet-algo-the-vpn-that-works/.
“[MS-SSTP]: Relationship to Other Protocols.” n.d. Accessed October 11, 2018.
https://msdn.microsoft.com/en-us/library/cc247424.aspx.
“[MS-SSTP]: Secure Socket Tunneling Protocol (SSTP).” n.d. Accessed October 11, 2018.
https://msdn.microsoft.com/en-us/library/cc247338.aspx.
Murray, David, Terry Koziniec, Kevin Lee, and Michael Dixon. 2012. “Large MTUs and Internet
Performance.” In 2012 IEEE 13th International Conference on High Performance Switching and
Routing, 82–87. Belgrade, Serbia: IEEE. https://doi.org/10.1109/HPSR.2012.6260832.
“OpenVPN.” 2018. Wikipedia.
https://en.wikipedia.org/w/index.php?title=OpenVPN&oldid=846543167.
Pannu, Mandeep, Bob Gill, Robert Bird, Kai Yang, and Ben Farrel. 2016. “Exploring Proxy Detection
Methodology.” In , 1–6. IEEE. https://doi.org/10.1109/ICCCF.2016.7740438.