1 Guide to Network Defense and Countermeasures Chapter 9.
Guide to Network Defense and Countermeasures Second Edition Chapter 4 Network Traffic Signatures.