Guide to Network Defense and Countermeasures Second Edition Chapter 4 Network Traffic Signatures.
Guide to Network Defense and Countermeasures Third Edition