9.2. Алфавитный список литературы50

ABRAMSON, N. (Абрамсон): «Internet Access Using VSATs’», IEEE Commun. Magazine, vol. 38, pp. 60–68, July 2000.

ADAR, E., and HUBERMAN, B.A. (Адар и Губерман): «Free Riding on Gnutella», First Monday, Oct. 2000.

AHMED, A., SHAFIQ, Z., HARKEERAT, B., and KHAKPOUR, A. (Ахмед и др.): «Suffering from Buffering? Detecting QoE Impairments in Live Video Streams», Int’l Conf. on Network Protocols, IEEE, 2017.

AHSAN, A., MCQUISTIN, S.M., PERKINS, C., and OTT, J. (Ахсан и др.): «DASHing Towards Hollywood», Proc. Ninth ACM Multimedia Systems Conf., ACM, pp. 1–12, 2018.

ALLMAN, M., and PAXSON, V. (Оллман и Паксон): «On Estimating End-to-End Network Path Properties», Proc. SIGCOMM ’99 Conf., ACM, pp. 263–274, 1999.

ALLOULAH, M., and HUANG, H. (Аллула и Хуан): «Future Millimeter-Wave Indoor Systems: A Blueprint for Joint Communication and Sensing», IEEE Computer, vol. 52, pp. 16–24, July 2019.

ALTAMINI, S., and SHIRMOHAMMADI, S. (Альтамини и Ширмохамади): «Client-server Cooperative and Fair DASH Video Streaming», Proc. 29th Workshop on Network and Operating System Support for Digital Audio and Video, ACM, pp. 1–6, June 2019.

ANDERSON, C. (Андерсон): «The Long Tail: Why the Future of Business is Selling Less of More», revised updated ed., New York: Hyperion, 2008a.

ANDERSON, R.J. (Андерсон): «Making Security Sustainable», Commun. of the ACM, vol. 61, pp. 24–25, March 2018.

ANDERSON, R.J.: «Security Engineering: A Guide to Building Dependable Distributed Systems», 2nd ed., New York: John Wiley & Sons, 2008b.

ANDERSON, R.J.: «Free Speech Online and Offline», IEEE Computer, vol. 25, pp. 28–30, June 2002.

ANDERSON, R.J.: «The Eternity Service», Proc. Pragocrypt Conf., CTU Publishing House, pp. 242–252, 1996.

ANDREWS, J.G., BUZZO, S., CHOI, W., HANLY, S.V., LOZANO, A., SOONG, A.C. K., and ZHANG, J.C. (Эндрюс и др.): «What Will 5G Be?»,’ IEEE J. on Selected Areas in Commun., vol. 32, pp. 1065–1082, June 2014.

ANTONAKAKIS, M., PERDISCI, R., DAGON, D., LEE, W., and FEAMSTER, N. (Антонакакис и др.): «Building a Dynamic Reputation System for DNS», USENIX Security Symposium, pp. 273–290, 2010.

APTHORPE, N., HUANG, D., REISMAN D., NARAYANAN, A., and FEAMSTER, N. (Апторп и др.): «Keeping the Smart Home Private with Smart(er) Traffic Shaping», Proceedings on Privacy Enhancing Technologies, pp. 128–48, 2019.

ASHRAF, Z. (Ашраф): «Virtual Private Networks in Theory and Practice», Munich: Grin Verlag, 2018.

ATENCIO, L. (Атенсио): «The Joy of JavaScript», Shelter Island, NY: Manning Publications, 2020.

AXELSSON, S. (Аксельсон): «The Base-rate Fallacy and It’s Implications of the Difficulty of Intrusion Detection», Proc. Conf. on Computer and Commun. Security, ACM, pp. 1–7, 1999.

BAASE, S., and HENRY, T. (Баазе и Генри): «A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology», 5th ed., Upper Saddle River, NJ: Pearson Education, 2017.

BALLARDIE, T., FRANCIS, P., and CROWCROFT, J. (Балларди и др.): «Core Based Trees (CBT)», Proc. SIGCOMM ’93 Conf., ACM, pp. 85–95, 1993.

BARAN, P. (Бэран): «On Distributed Communications: I. Introduction to Distributed Communication Networks», Memorandum RM-420-PR, Rand Corporation, Aug. 1964.

BASU, S., SUNDARRAJAN, A., GHADERTI, J., SHAKKOTTAI, S., and SITARAMAN, R. (Басу и др.): «Adaptive TTL-Based Caching for Content Delivery»,’ IEEE/ACM Trans. on Networking, vol. 26, pp. 1063–1077, June 2018.

BELLMAN, R.E. (Беллман): «Dynamic Programming», Princeton, NJ: Princeton University Press, 1957.

BELLOVIN, S. (Белловин): «The Security Flag in the IPv4 Header», RFC 3514, Apr. 2003.

BELSNES, D. (Белснес): «Flow Control in the Packet Switching Networks», Commun. Networks, Uxbridge, England: Online, pp. 349–361, 1975.

BENNET, C.H., and BRASSARD, G. (Беннет и Брассар): «Quantum Cryptography: Public Key Distribution and Coin Tossing», Proc. Int’l Conf. on Computer Systems and Signal Processing, pp. 175–179, 1984.

BERESFORD, A., and STAJANO, F. (Бересфорд и Стаяно): «Location Privacy in Pervasive Computing», IEEE Pervasive Computing, vol. 2, pp. 46–55, Jan. 2003.

BERNAL, P. (Бернал): «The Internet, Warts and All», Cambridge, U.K.: Cambridge University Press, 2018.

BERNASCHI, M., CELESTINI, A., GUARINO, S., LOMBARDI, F., and MASTRO­STEFANO, E. (Берначи и др.): «Spiders Like Onions: on the Network of Tor Hidden Services», Proc. World Wide Web Conf., ACM, pp. 105–115, May 2019.

BERNERS-LEE, T., CAILLIAU, A., LOUTONEN, A., NIELSEN, H.F., and SECRET, A. (Бернерс-Ли и др.): «The World Wide Web», Commun. of the ACM, vol. 37, pp. 76–82, Aug. 1994.

BERTSEKAS, D., and GALLAGER, R. (Берцекас и Галлагер): «Data Networks», 2nd ed., Upper Saddle River, NJ: Prentice Hall, 1992.

BHATTI, S.N., and CROWCROFT, J. (Бхатти и Кроукрофт): «QoS Sensitive Flows: Issues in IP Packet Handling», IEEE Internet Computing, vol. 4, pp. 48–57, July–Aug. 2000.

BIHAM, E., and SHAMIR, A. (Бихам и Шамир): «Differential Fault Analysis of Secret Key Cryptosystems», Proc. 17th Ann. Int’l Cryptology Conf., Springer-Verlag LNCS 1294, pp. 513–525, 1997.

BING, B. (Бинг): «Wi-Fi Technologies and Applications», Seattle: Amazon, 2017.

BIRD, R., GOPAL, I., HERZBERG, A., JANSON, P.A., KUTTEN, S., MOLVA, R., and YUNG, M. (Берд и др.): «Systematic Design of a Family of Attack-Resistant Authentication Protocols», IEEE J. on Selected Areas in Commun., vol. 11, pp. 679–693, June 1993.

BIRRELL, A.D., and NELSON, B.J. (Биррелл и Нельсон): «Implementing Remote Procedure Calls», ACM Trans. on Computer Systems, vol. 2, pp. 39–59, Feb. 1984.

BIRYUKOV, A., SHAMIR, A., and WAGNER, D. (Бирюков и др.): «Real Time Cryptanalysis of A5/1 on a PC», Proc. Seventh Int’l Workshop on Fast Software Encryption, Springer-Verlag LNCS 1978, pp. 1–8, 2000.

BISCHOF, Z., BUSTAMANTE, F., and FEAMSTER, N. (Бишоф и др.): «Characterizing and Improving the Reliability of Broadband Internet Access» (CQ The 46th Research Conf. on Commun., Information, and Internet Policy (TPRC), SSRN, 2018.

BOCCARDI, F., HEATH, R.W., LOZANO, A., MARZETTA, T.L., and POPOVSKI, P. (Боккарди и др.): «Five Disruptive Technology Directions for 5G», IEEE Commun. Magazine, vol. 52, pp. 74–80, Feb. 2014.

BOGGS, D., MOGUL, J., and KENT, C. (Боггс и др.): «Measured Capacity of an Ethernet: Myths and Reality», Proc. SIGCOMM ’88 Conf., ACM, pp. 222–234, 1988.

BORISOV, N., GOLDBERG, I., and WAGNER, D. (Борисов и др.): «Intercepting Mobile Communications: The Insecurity of 802.11», Seventh Int’l Conf. on Mobile Computing and Networking, ACM, pp. 180–188, 2001.

BOSSHART, P., DALY, D., GIBB, G., IZZARD, M., MCKEOWN, N., REXFORD, J., and WALKER, D. (Босхарт и др.): «P4: Programming Protocol-Independent Packet Processors», Computer Commun. Review, vol. 44, pp. 87–95, Apr., 2014.

BOSSHART, P., GIBB, G., KIM, H.-S., VARGHESE, G., MCKEOWN, N., IZZARD, M., MUJICA, F., and HOROWITZ, M. (Босхарт и др.): «Forwarding Metamorphosis: Fast Programmable Match-Action Processing in Hardware for SDN», Computer Commun. Review, vol. 43, pp. 99–110, Apr., 2013.

BRADEN, R. (Брейден): «Requirements for Internet Hosts—Communication Layers», RFC 1122, Oct. 1989.

BRADEN, R., BORMAN, D., and PARTRIDGE, C. (Брейден и др.): «Computing the Internet Checksum», RFC 1071, Sept. 1988.

BRESLAU, L., CAO, P., FAN, L., PHILLIPS, G., and SHENKER, S. (Бреслау и др.): «Web Caching and Zipf-like Distributions: Evidence and Implications», Proc. INFOCOM Conf., IEEE, pp. 126–134, 1999.

BRONZINO, F., SCHMITT, P., AYOUBI, S., MARTINS, G., TEIXEIRA, R., and FEAMSTER, N. (Бронзино и др.): «Inferring Streaming Video Quality from Encrypted Traffic: Practical Models and Deployment Experience», ACM SIGMETRICS, 2020.

BUSH, V. (Буш): «As We May Think», Atlantic Monthly, vol. 176, pp. 101–108, July 1945.

CALDER, M., FAN, X., HU, Z., KATZ-BASSETT, E., HEIDEMANN, J. and GOVINDAN, R. (Колдер и др.): «Mapping the Expansion of Google’s Serving Infrastructure», ACM SIGCOMM Internet Measurement Conf., ACM, pp. 313–326, 2013.

CAPETANAKIS, J.I. (Капетанакис): «Tree Algorithms for Packet Broadcast Channels», IEEE Trans. on Information Theory, vol. IT-5, pp. 505–515, Sept. 1979.

CASADO, M., FREEDMAN, M.J., PETIT, J., LUO, J., MCKEOWN, N., and SCHENKER, S. (Касадо и др.): «Ethane: Taking Control of the Enterprise», Proc. SIGCOMM 2007 Conf., ACM, pp. 1–12, 2007.

CASTAGNOLI, G., BRAUER, S., and HERRMANN, M. (Кастаньоли и др.): «Optimization of Cyclic Redundancy-Check Codes with 24 and 32 Parity Bits», IEEE Trans. on Commun., vol. 41, pp. 883–892, June 1993.

CERF, V., and KAHN, R. (Серф и Кан): «A Protocol for Packet Network Interconnection», IEEE Trans. on Commun., vol. COM-2, pp. 637–648, May 1974.

CHAKRABORTY, T., MISRA, S., and PRASAD, R. (Чакраборти и др.): «VoIP Technology: Applications and Challenges», Berlin: Springer, 2019.

CHANG, F., DEAN, J., GHEMAWAT, S., HSIEH, W., WALLACH, D., BURROWS, M., CHANDRA, T., FIKES, A., and GRUBER, R. (Чан и др.): «Bigtable: A Distributed Storage System for Structured Data», Proc. OSDI 2006 Symp., USENIX, pp. 15–29, 2006.

CHASE, J.S., GALLATIN, A.J., and YOCUM, K.G. (Чейз и др.): «End System Optimizations for High-Speed TCP», IEEE Commun. Magazine, vol. 39, pp. 68–75, Apr. 2001.

CHAUDHARY, A, and CHAUBE, M.K. (Чаудхари и Чаубе): «Hiding MP3 in Colour Image Using Whale Optimization», Proc. Second Int’l Conf. on Vision, Image, and Signal Processing, ACM, Art. 54, 2018.

CHEN, S., and NAHRSTEDT, K. (Чэнь и Нарштедт): «An Overview of QoS Routing for Next-Generation Networks», IEEE Network Magazine, vol. 12, pp. 64–69, Nov./Dec. 1998.

CHEN, X., FEIBISH, S., KORAL, Y., REXFORD, J., ROTTENSTREICH, O., MONETTI, S., WANG, T. (Чэнь и др.): «Fine-Grained Queue Measurement in the Data Plane», CoNext, ACM, Dec. 2019.

CHIU, D., and JAIN, R. (Чиу и Джейн): «Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks», Comput. Netw. ISDN Syst., vol. 17, pp. 1–4, June 1989.

CLANCY, T.C., MCGWIER, R.W., and CHEN, L. (Клэнси и др.): «Post-Quantum Crypto­graphy and 5G Security: A Tutorial», Proc. WiSec, ACM, pp. 285–287, 2019.

CLARK, D.D. (Кларк): «The Design Philosophy of the DARPA Internet Protocols», Proc. SIG-COMM ’88 Conf., ACM, pp. 106–114, 1988.

CLARK, D.D.: «Window and Acknowledgement Strategy in TCP», RFC 813, July 1982.

CLARK, D.D., JACOBSON, V., ROMKEY, J., and SALWEN, H. (Кларк и др.): «An Analysis of TCP Processing Overhead», IEEE Commun. Magazine, vol. 27, pp. 23–29, June 1989.

CLARK, D.D., SHENKER, S., and ZHANG, L. (Кларк и др.): «Supporting Real-Time Applications in an Integrated Services Packet Network», Proc. SIGCOMM ’92 Conf., ACM, pp. 14–26, 1992.

CLARKE, A.C. (Кларк): «Extra-Terrestrial Relays», Wireless World, 1945.

CLARKE, I., MILLER, S.G., HONG, T.W., SANDBERG, O., and WILEY, B. (Кларк и др.): «Protecting Free Expression Online with Freenet», IEEE Internet Computing, vol. 6, pp. 40–49, Jan.–Feb. 2002.

CODING, M. (Кодинг): «JavaScript for Beginners», Seattle: Amazon, 2019.

COHEN, B. (Коэн): «Incentives Build Robustness in BitTorrent», Proc. First Workshop on Economics of Peer-to-Peer Systems, June 2003.

COLBACH, B. (Кольбах): «Bluetooth Tutorial: Design, Protocol and Specifications for BLE — Bluetooth Low Energy 4.0 and Bluetooth 5», Seattle: Amazon Kindle, 2019.

COMER, D.E. (Комер): The Internet Book, 4th ed., Upper Saddle River, NJ: Prentice Hall, 2007.

COMER, D.E.: «Internetworking with TCP/IP», vol. 1, 6th ed., Upper Saddle River, NJ: Pren- tice Hall, 2013.

CRAVER, S.A., WU, M., LIU, B., STUBBLEFIELD, A., SWARTZLANDER, B., WALLACH, D.W., DEAN, D., and FELTEN, E.W. (Крейвер и др.): «Reading Between the Lines: Lessons from the SDMI Challenge», Proc. 10th USENIX Security Symp., USENIX, 2001.

CROCKER, S.D. (Крокер): «The Arpanet and Its Impact on the State of Networking», IEEE Computer, vol. 52, pp-14–23, Oct. 2019.

CROVELLA, M., and KRISHNAMURTHY, B. (Кровелла и Кришнамурти): «Internet Measurement», New York: John Wiley & Sons, 2006.

CUEVAS, R., KRYCZKA, M., GINZALEZ, R., CUEVAS, A., and AZCORRZ, A. (Куэвас): «Torrent-Guard: Stopping Scam and Malware Distribution in the BitTorrent Ecosystem», Com puter Networks, vol. 59, pp. 77–90, 2014.

DAEMEN, J., and RIJMEN, V. (Дамен и Рэймен): «The Design of Rijndael», Berlin: Sprin­ger-Verlag, 2002.

DAGON, D., ANTONAKAKIS, M., VIXIE, P., JINMEI, T., and LEE, W. (Дейгон и др.): «Increased DNS Forgery Resistance Through 0x20-bit Encoding», Proceedings of the 15th ACM Conf. on Computer and Commun. Security, ACM, pp. 211–222, 2008.

DALAL, Y., and METCLFE, R. (Далал и Меткалф): «Reverse Path Forwarding of Broadcast Packets», Commun. of the ACM, vol. 21, pp. 1040–1048, Dec. 1978.

DAN, K., KITAGAWA, N., SAKURABA, S., and YAMAI, N. (Дэн и др.): «Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log», Proc. 43rd Computer Softw. and Appl. Conf., IEEE, pp. 896–899, 2019.

DAVIE, B., and FARREL, A. (Дейви и Фаррел): «MPLS: Next Steps», San Francisco: Morgan Kaufmann, 2008.

DAVIE, B., and REKHTER, Y. (Дейви и Рехтер): «MPLS Technology and Applications», San Francisco: Morgan Kaufmann, 2000.

DAVIES, J. (Дэвис): «Understanding IPv6», 2nd ed., Redmond, WA: Microsoft Press, 2008.

DAVIS, J. (Дэвис): «Wifi Technology: Advances and Applications», New York: NY Research Press, 2018.

DAY, J.D. (Дэй): «The (Un)Revised OSI Reference Model», Computer Commun. Rev., vol. 25, pp. 39–55, Oct. 1995.

DAY, J.D., and ZIMMERMANN, H. (Дэй и Циммерман): «The OSI Reference Model», Proc. of the IEEE, vol. 71, pp. 1334–1340, Dec. 1983.

DE ANDRADE, M., MAIER, M., MCGARRY, M., REISSLEIN, M. (Де Андраде и др.): «Passive optical network (PON) supported networking», Optical Switching and Networking, 2014.

DE MARCO, G., and KOWALSKI, D. (Де Марко и Ковальски): «Contention Resolution in a Nonsynchronized Multiple Access Channel», J. of Theoretical Computer Science, vol. 689, pp. 1–13, Aug. 2017.

DEAN, J., and GHEMAWAT, S. (Дин и Гемават): «MapReduce: a Flexible Data Processing Tool», Commun. of the ACM, vol. 53, pp. 72–77, Jan. 2008.

DEERING, S.E. (Диринг): «SIP: Simple Internet Protocol», IEEE Network Magazine, vol. 7, pp. 16–28, May/June 1993.

DEERING, S.E., and CHERITON, D. (Диринг и Черитон): «Multicast Routing in Datagram Networks and Extended LANs», ACM Trans. on Computer Systems, vol. 8, pp. 85–110, May 1990.

DEMERS, A., KESHAV, S., and SHENKER, S. (Демерс и др.): «Analysis and Simulation of a Fair Queueing Algorithm», Internetwork: Research and Experience, vol. 1, pp. 3–26, Sept. 1990.

DENNING, D.E., and SACCO, G.M. (Деннинг и Сакко): «Timestamps in Key Distribution Protocols», Commun. of the ACM, vol. 24, pp. 533–536, Aug. 1981.

DIFFIE, W., and HELLMAN, M.E. (Диффи и Хеллман): «Exhaustive Cryptanalysis of the NBS Data Encryption Standard», IEEE Computer, vol. 10, pp. 74–84, June 1977.

DIFFIE, W., and HELLMAN, M.E. (Диффи и Хеллман): «New Directions in Cryptography», IEEE Trans. on Information Theory, vol. IT-2, pp. 644–654, Nov. 1976.

DIJKSTRA, E.W. (Дейкстра): «A Note on Two Problems in Connexion with Graphs», Numer. Math., vol. 1, pp. 269–271, Oct. 1959.

DIZDAREVIC, J., CARPIO, D., JUKAN, A., and MASIP-BRUIN, X. (Диздаревич и др.): «A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration», ACM Computing Surveys, vol. 51, Art. 116, Jan. 2019.

DONAHOO, M., and CALVERT, K. (Донаху и Калверт): «TCP/IP Sockets in C», 2nd ed., San Francisco: Morgan Kaufmann, 2009.

DONAHOO, M., and CALVERT, K. (Донаху и Калверт): «TCP/IP Sockets in Java», 2nd ed., San Francisco: Morgan Kaufmann, 2008.

DORFMAN, R. (Дорфман): «Detection of Defective Members of a Large Population», Annals Math. Statistics, vol. 14, pp. 436–440, 1943.

DU, W. (Ду): «Computer & Internet Security: A Hands-on Approach», 2nd ed., Seattle: Amazon, 2019.

DUTCHER, B. (Датчер): «The NAT Handbook», New York: John Wiley & Sons, 2001.

EL GAMAL, T. (Эль Гамаль): «A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms», IEEE Trans. on Information Theory, vol. IT-1, pp. 469–472, July 1985.

ESPOSITO, V. (Эспозито): «Cryptography for Beginners: a Useful Support for Under­standing», Seattle: Amazon Digital Services, 2018.

FALL, K. (Фолл): «A Delay-Tolerant Network Architecture for Challenged Internets», Proc. SIG-COMM 2003 Conf., ACM, pp. 27–34, Aug. 2003.

FAWAZ, K., and SHIN, K.G. (Фаваз и Шин): «Security and Privacy in the Internet of Things», IEEE Computer, vol. 52, pp. 40–49, Apr. 2019.

FEAMSTER, N., BALAKRISHNAN, H., REXFORD, J., SHAIKH, A., and VAN DER MERWE, J. (Фимстер и др.): «The Case for Separating Routing from Routers», Proc. SIGCOMM Workshop on Future Directions in Network Architecture, ACM, pp. 5–12, 2004.

FEAMSTER, N., and LIVINGOOD, J. (Фимстер и Ливингуд): «Internet Speed Measurement: Current Challenges and Future Recommendations», Commun. of the ACM, ACM, 2020.

FEAMSTER, N., REXFORD, J., and ZEGURA, E. (Фимстер и др.): «The Road to SDN», ACM Queue, vol. 11, p. 20, Dec. 2013.

FENNER, B., HANDLEY, M., HOLBROOK, H., and KOUVELAS, I. (Феннер и др.): «Protocol Independent Multicast-Sparse Mode (PIM-SM)», RFC 4601, Aug. 2006.

FERGUSON, N., SCHNEIER, B., and KOHNO, T. (Фергюсон и др.): «Cryptography Engineering: Design Prin- ciples and Practical Applications», New York: John Wiley & Sons, 2010.

FLETCHER, J. (Флетчер): «An Arithmetic Checksum for Serial Transmissions», IEEE Trans. on Commun., vol. COM-0, pp. 247–252, Jan. 1982.

FLOYD, S., HANDLEY, M., PADHYE, J., and WIDMER, J. (Флойд и др.): «Equation-Based Congestion Control for Unicast Applications», Proc. SIGCOMM 2000 Conf., ACM, pp. 43–56, Aug. 2000.

FLOYD, S., and JACOBSON, V. (Флойд и Джейкобсон): «Random Early Detection for Congestion Avoidance», IEEE/ACM Trans. on Networking, vol. 1, pp. 397–413, Aug. 1993.

FLUHRER, S., MANTIN, I., and SHAMIR, A. (Флюрер и др.): «Weakness in the Key Scheduling Algorithm of RC4», Proc. Eighth Ann. Workshop on Selected Areas in Cryptography, Springer-Verlag LNCS 2259, pp. 1–24, 2001.

FONTUGNE, R., ABRY, P., FUKUDA, K., VEITCH, D., BORGNAT, P., and WENDT, H. (Фонтюнь и др.): «Scaling in Internet Traffic: A 14 Year and 3 Day Longitudinal Study, With Multiscale Analyses and Random Projections», IEEE/ACM Trans. on Networking, vol. 25, pp. 2152–2165, Aug. 2017.

FORD, B. (Форд): «Structured Streams: A New Transport Abstraction», Proc. SIGCOMM 2007 Conf., ACM, pp. 361–372, 2007.

FORD, L.R., Jr., and FULKERSON, D.R. (Форд и Фалкерсон): «Flows in Networks», Princeton, NJ: Princeton University Press, 1962.

FORD, W., and BAUM, M.S. (Форд и Баум): «Secure Electronic Commerce», Upper Saddle River, NJ: Pren tice Hall, 2000.

FORNEY, G.D. (Форни): «The Viterbi Algorithm», Proc. of the IEEE, vol. 61, pp. 268–278, Mar. 1973.

FOSTER, N., HARRISON, R., FREEDMAN, M., MONSANTO, C., REXFORD, J., STORY, A., and WALKER, D. (Фостер и др.): «Frenetic: A Network Programming Language», ACM Sigplan Notices, vol. 46, pp. 279–291, Sep. 2011.

FRANCIS, P. (Фрэнсис): «A Near-Term Architecture for Deploying Pip», IEEE Network Magazine, vol. 7, pp. 30–37, May/June 1993.

FRASER, A.G. (Фрейзер): «Towards a Universal Data Transport System», IEEE J. on Selected Areas in Commun., vol. 5, pp. 803–816, Nov. 1983.

FRIDRICH, J. (Фридрих): «Steganography in Digital Media: Principles, Algorithms, and Applications», Cambridge: Cambridge University Press, 2009.

FULLER, V., and LI, T. (Фуллер и Ли): «Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan», RFC 4632, Aug. 2006.

GALLAGER, R.G. (Галлагер): «A Minimum Delay Routing Algorithm Using Distributed Computation», IEEE Trans. on Commun., vol. COM-5, pp. 73–85, Jan. 1977.

GALLAGER, R.G.: «Low-Density Parity Check Codes», IRE Trans. on Information Theory, vol. 8, pp. 21–28, Jan. 1962.

GARCIA-LUNA-ACEVES, J. (Гарсия-Луна-Асевес): «Carrier-Sense Multiple Access with Collision Avoidance and Detection», Proc. 20th Int’l Conf. on Modelling, Analysis, and Simulation of Wireless and Mobile Systems, ACM, pp. 53–61, Nov. 2017.

GETTYS, J. (Геттис): «Bufferbloat: Dark Buffers in the Internet», IEEE Internet Computing, IEEE, p. 96, 2011.

GILDER, G. (Гилдер): «Metcalfe’s Law and Legacy», Forbes ASAP, Sept. 13, 1993.

GORALSKI, W. (Горальски): «The Illustrated Network: How TCP/IP Works in a Modern Network», 2nd ed., San Francisco: Morgan Kaufmann, 2017.

GRAYSON, M., SHATZKAMER, K., and WAINNER, S. (Грейсон и др.): «IP Design for Mobile Networks», Indianapolis, IN: Cisco Press, 2009.

GROBE, K., and EISELT, M. (Гроуб и Эйзелт): «Wavelength Division Multiplexing: A Practical Engineering Guide», New York: John Wiley & Sons, 2013.

GROBE, K., and ELBERS, J. (Гроуб и Элберс): «PON in Adolescence: From TDMA to WDM-PON», IEEE Commun. Magazine, vol. 46, pp. 26–34, Jan. 2008.

GROSS, G., KAYCEE, M., LIN, A., MALIS, A., and STEPHENS, J. (Гросс и др.): «The PPP Over AAL5», RFC 2364, July 1998.

GUPTA, A., HARRISON, R., CANINI, M., FEAMSTER, N., REXFORD, J., and WILLINGER, W. (Гупта и др.): «Sonata: Query-driven Streaming Network Telemetry», Proc. SIGCOMM 2018 Conf., ACM, pp. 357–371, 2018.

HA, S., RHEE, I., and LISONG, X. (Ха и др.): «CUBIC: A New TCP-Friendly High-Speed TCP Variant», SIGOPS Oper. Syst. Rev., vol. 42, pp. 64–74, June 2008.

HALLBERG, G. (Халльберг): «Quality of Service in Modern Packet Networks», Seattle: Amazon, 2019.

HALPERIN, D., HEYDT-BENJAMIN, T., RANSFORD, B., CLARK, S., DEFEND, B., MORGAN, W., FU, K., KOHNO, T., and MAISEL, W. (Халперин и др.): «Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses», IEEE Symp. on Security and Privacy, pp. 129–142, May 2008.

HALPERIN, D., HU, W., SHETH, A., and WETHERALL, D. (Халперин и др.): «802.11 with Multiple Antennas for Dummies», Computer Commun. Rev., vol. 40, pp. 19–25, Jan. 2010.

HAMMING, R.W. (Хэмминг): «Error Detecting and Error Correcting Codes», Bell System Tech. J., vol. 29, pp. 147–160, Apr. 1950.

HARTE, L. (Харте): «Introduction to Cable TV (Catv): Systems, Services, Operation, and Technology», Morrisville, NC: DiscoverNet Publishing, 2017.

HARTE, L, BROMLEY, B, and DAVIS, M. (Харте и др.): «Introduction to CDMA», Fayetteville, NC: Phoenix Global Support, 2012.

HARTE, L., KELLOGG, S., DREHER, R., and SCHAFFNIT, T. (Харте и др.): «The Comprehensive Guide to Wireless Technology», Fuquay-Varina, NC: APDG Publishing, 2000.

HAWKINS, J. (Хокинс): Carrier Ethernet, Hanover, MD: Ciena, 2016.

HAWLEY, G.T. (Хоули): «Historical Perspectives on the U.S. Telephone Loop», IEEE Commun. Magazine, vol. 29, pp. 24–28, Mar. 1991.

HEGARTY, M.T., and KEANE, A.J. (Хегарти и Кин): «Steganography, The World of Secret Communications», Amazon CreateSpace, 2018.

HELD, G. (Хелд): «A Practical Guide to Content Delivery Networks», 2nd ed., Boca Raton, FL: CRC Press, 2010.

HEUSSE, M., ROUSSEAU, F., BERGER-SABBATEL, G., DUDA, A. (Хойс и др.): «Performance Anomaly of 802.11b», Proc. INFOCOM Conf., IEEE, pp. 836–843, 2003.

HIERTZ, G., DENTENEER, D., STIBOR, L., ZANG, Y., COSTA, X., and WALKE, B. (Херц и др.): «The IEEE 802.11 Universe», IEEE Commun. Magazine, vol. 48, pp. 62–70, Jan. 2010.

HOE, J. (Хо): «Improving the Start-up Behavior of a Congestion Control Scheme for TCP», Proc. SIGCOMM ’96 Conf., ACM, pp. 270–280, 1996.

HU, Y., and LI, V.O.K. (Ху и Ли): «Satellite-Based Internet: A Tutorial», IEEE Commun. Magazine, vol. 30, pp. 154–162, Mar. 2001.

HUANG, T.Y., JOHARI, R., MCKEOWN, N., TRUNNELL, M. and WATSON, M. (Хуан и др.): «A Buffer-based Approach to Rate Adaptation: Evidence from a Large Video Streaming Ser vice», Proc. SIGCOMM 2014 Conf., ACM, pp. 187–198, 2014.

HUI, R. (Хуэй): «Introduction to Fiber-Optic Communications», London: Academic Press, 2020.

HUITEMA, C. (Уитема): «Routing in the Internet», 2nd ed., Upper Saddle River, NJ: Prentice Hall, 1999.

HULL, B., BYCHKOVSKY, V., CHEN, K., GORACZKO, M., MIU, A., SHIH, E., ZHANG, Y., BALAKRISHNAN, H., and MADDEN, S. (Халл и др.): «CarTel: A Distributed Mobile Sensor Com puting System», Proc. Sensys 2006 Conf., ACM, pp. 125–138, Nov. 2006.

HUSTON, G. (Хьюстон): «The Death of Transit and Beyond», 2018.

IRMER, T. (Ирмер): «Shaping Future Telecommunications: The Challenge of Global Standardiza tion», IEEE Commun. Magazine, vol. 32, pp. 20–28, Jan. 1994.

JACOBSON, V. (Джейкобсон): «Compressing TCP/IP Headers for Low-Speed Serial Links», RFC 1144, Feb. 1990.

JACOBSON, V. (Джейкобсон): «Congestion Avoidance and Control», Proc. SIGCOMM ’88 Conf., ACM, pp. 314–329, 1988.

JUANG, P., OKI, H., WANG, Y., MARTONOSI, M., PEH, L., and RUBENSTEIN, D. (Цзюань и др.): «Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet», SIGOPS Oper. Syst. Rev., vol. 36, pp. 96–107, Oct. 2002.

KAMOUN, F., and KLEINROCK, L. (Камоун и Клейнрок): «Stochastic Performance Evaluation of Hierarchical Routing for Large Networks», Computer Networks, vol. 3, pp. 337–353, Nov. 1979.

KARAGIANNIS, V., VENITO, A., COELHO, R., BORKOWSKI, M, and FOHLER, G. (Карагианнис и др.): «Edge Computing with Peer to Peer Interactions: Use Cases and Impact», Proc. Workshop on Fog Computing and the IoT, ACM, pp. 46–50, Apr. 2019.

KARN, P. (Карн): «MACA—A New Channel Access Protocol for Packet Radio», ARRL/CRRL Amateur Radio Ninth Computer Networking Conf., pp. 134–140, 1990.

KARN, P. and PARTRIDGE, C. (Карн и Партридж): «Improving Round-Trip Time Estimates in Reliable Transport Protocols», ACM SIGCOMM Computer Commun. Review, ACM, pp. 2–7, 1987.

KASIM, A. (Касим): «Delivering Carrier Ethernet: Extending Ethernet Beyond the LAN», New York: McGraw-Hill, 2008.

KATABI, D., HANDLEY, M., and ROHRS, C. (Катаби и др.): «Congestion Control for High Bandwidth- Delay Product Networks», Proc. SIGCOMM 2002 Conf., ACM, pp. 89–102, 2002.

KATZ, D., and FORD, P.S. (Кац и Форд): «TUBA: Replacing IP with CLNP», IEEE Network Magazine, vol. 7, pp. 38–47, May/June 1993.

KAUFMAN, C., PERLMAN, R., and SPECINER, M. (Кауфман и др.): «Network Secu­rity», Upper Saddle River, NJ: Prentice Hall, 2002.

KENT, C., and MOGUL, J. (Кент и Могул): «Fragmentation Considered Harmful», Proc. SIGCOMM ’87 Conf., ACM, pp. 390–401, 1987.

KHANNA, A. and ZINKY, J. (Кханна и Зинки): «The Revised ARPANET Routing Metric», Proc. SIGCOMM ’89 Conf., ACM, pp. 45–56, 1989.

KIM, H., REICH, J., GUPTA, A., SHAHBAZ, M., FEAMSTER, N. and CLARK, R. (Ким и др.): «Kinetic: Verifiable Dynamic Network Control», 12th USENIX Sym. on Networked Systems Design and Implementation, ACM, pp. 59–72, 2015.

KINNEAR, E., MCMANUS, P., and WOOD, C. (Киннир и др.): «Oblivious DNS over HTTPS», IETF Network Working Group Internet Draft, 2019.

KLEINROCK, L. (Клейнрок): «Power and Other Deterministic Rules of Thumb for Pro­babalistic Problems in Computer Communications», Proc. Int’l Conf. on Commun., pp. 43.1.1– 43.1.10, 1979.

KLEINROCK, L., and TOBAGI, F. (Клейнрок и Тобаги): «Random Access Techniques for Data Transmission over Packet-Switched Radio Channels», Proc. Nat. Computer Conf., pp. 187–201, 1975.

KOHLER, E., HANDLEY, H., and FLOYD, S. (Колер и др.): «Designing DCCP: Congestion Control without Reliability», Proc. SIGCOMM 2006 Conf., ACM, pp. 27–38, 2006.

KOOPMAN, P. (Купман): «32-Bit Cyclic Redundancy Codes for Internet Applications», Proc. Intl. Conf. on Dependable Systems and Networks., IEEE, pp. 459–472, 2002.

KRAFT, J, and WASHINGTON, L. (Крафт и Вашингтон): «An Introduction to Number Theory with Cryptography», 2nd ed., London: Chapman and Hall, 2018.

KUMAR, R. (Кумар): «All about Steganography and Detection of Stegano Images», Riga, Latvia: Lap Lambert Academic Publishing, 2018.

KUROSE, J., and ROSS, K. (Куросе и Росс): «Computer Networking: A Top-Down Appro­ach», 7th ed. Upper Saddle River, NJ: Pearson, 2016.

KUSZYK, A., and HAMMOUDEH, M. (Кушик и Хаммудех): «Contemporary Alternatives to Traditional Processor Design in the Post Moore’s Law Era», Proc. Second Int’l Conf. on Future Networks and Distributed Systems, ACM, Art. 46, 2018.

LABOVITZ, C., AHUJA, A., BOSE, A., and JAHANIAN, F. (Лейбовиц и др.): «Delayed Internet Routing Convergence», IEEE/ACM Trans. on Networking, vol. 9, pp. 293–306, June 2001.

LAINO, J. (Лайно): «The Telecom Handbook», New York: CMP Books, 2017.

LAM, C.K. M., and TAN, B.C. Y. (Лам и Тан): «The Internet Is Changing the Music Industry», Commun. of the ACM, vol. 44, pp. 62–66, Aug. 2001.

LAMPARTER, O., FANG, L., BISCHOFF, J.-C., REITMANN, M., SCHWENDENER, R., ZASOWSKI, T. (Лампартер и др.): «Multi-Gigabit over Copper Access Networks: Architectural Evolution and Techno-Economic Analysis», IEEE Commun. Magazine, vol. 57, pp. 22–27, Aug. 2019.

LE FEUVRE, J., CONCOLATO, C., BOUZAKARIA, N., and NGUYEN, V. (Ле Февр и др.): «MPEG-DASH for Low Latency and Hybrid Streaming Services», Proc. 23rd Int’l conf. on Multimedia, ACM, pp. 751–752, June 2015.

LEMON, J. (Лемон): «Resisting SYN Flood DOS Attacks with a SYN Cache», Proc. BSDCon Conf., USENIX, pp. 88–98, 2002.

LEVY, S. (Леви): «Crypto Rebels», Wired, pp. 54–61, May/June 1993.

LI, B., WANG, Z., LIU, J., and ZHU, W. (Ли и др.): «Two Decades of Internet Video Streaming: A Retrospective View», ACM Trans. on Multimedia Computing, vol. 9, Art. 33, Oct. 2013.

LI, M., AGRAWAL, D., GANESAN, D., and VENKATARAMANI, A. (Ли и др.): «Block-Switched Networks: A New Paradigm for Wireless Transport», Proc. NSDI 2009 Conf., USENIX, pp. 423–436, 2009.

LI, Z., LEVIN, D., SPRING, N., and BHATTACHARJEE, B. (Ли и др.): «Internet Anycast: Performance, Problems, and Potential», Proc. SIGCOMM 2018 Conf., pp. 59–73, Aug. 2018.

LIN, S., and COSTELLO, D. (Линь и Костелло): «Error Control Coding», 2nd ed., Upper Saddle River, NJ: Pearson Education, 2004.

LIOGKAS, N., NELSON, R., KOHIER, E., ZHANG, L. Exploiting BitTorrent for fun (but not profit), 2006.

LUBACZ, J., MAZURCZYK, W., and SZCZYPIORSKI, K. (Любач и др.): «Vice over IP», IEEE Spectrum, pp. 42–47, Feb. 2010.

MCKEOWN, N., ANDERSON, T., BALAKRISHNAN, H., PARULKAR, G., PETERSON, L., REXFORD, J., SHENKER, S. and TURNER, J. (Маккиоун и др.): «OpenFlow: Enabling Innovation in Campus Networks», Computer Commun. Review, vol. 38, pp. 69–74, Apr. 2008.

MACEDONIA, M.R. (Македония): «Distributed File Sharing», IEEE Computer, vol. 33, pp. 99–101, 2000.

MALIS, A., and SIMPSON, W. (Малис и Симпсон): «PPP over SONET/SDH», RFC 2615, June 1999.

MANGLA, T., HALEPOVIC, E., AMMAR, M. and ZEGURA, E. (Мангла и др.): «eMIMIC: Estimating HTTP-Based Video QoE Metrics from Encrypted Network Traffic», Network Traffic Measurement and Analysis Conf., IEEE, pp. 1–8, 2018.

MASSEY, J.L. (Мэсси): «Shift-Register Synthesis and BCH Decoding», IEEE Trans. on Information Theory, vol. IT-5, pp. 122–127, Jan. 1969.

MATSUI, M. (Мацуи): «Linear Cryptanalysis Method for DES Cipher», Advances in Cryptology — Eurocrypt 1993 Proceedings, Springer-Verlag LNCS 765, pp. 386–397, 1994.

MAZIERES, D., and KAASHOEK, M.F. (Мазьер и Каашук): «The Design, Implementation, and Operation of an Email Pseudonym Server», Proc. Fifth Conf. on Computer and Commun. Security, ACM, pp. 27–36, 1998.

MCCULLOUGH, B. (Маккалоу): «How the Internet Happened: From Netscape to the iPhone», New York: Liveright, 2018.

MENASCHE, D.S., ROCHA, D.A., ANTONIO, A., LI, B., TOWSLEY, D. and VENKATARAMANI, A. (Менаше и др.): «Content Availability and Bundling in Swarming Systems», IEEE/ACM Trans. on Networking, IEEE, pp. 580–593, 2013.

MENEZES, A.J., and VANSTONE, S.A. (Менезес и Ванстоун): «Elliptic Curve Cryptosystems and Their Implementation», Journal of Cryptology, vol. 6, pp. 209–224, 1993.

MERKLE, R.C., and HELLMAN, M. (Меркл и Хеллман): «Hiding and Signatures in Trapdoor Knapsacks», IEEE Trans. on Information Theory, vol. IT-4, pp. 525–530, Sept. 1978.

METCALFE, R.M. (Меткалф): «Metcalfe’s Law after 40 Years of Ethernet», IEEE Computer, vol. 46, pp. 26–31, 2013.

METCALFE, R.M. (Меткалф): «Computer/Network Interface Design: Lessons from Arpanet and Ethernet», IEEE J. on Selected Areas in Commun., vol. 11, pp. 173–179, Feb. 1993.

METCALFE, R.M., and BOGGS, D.R. (Меткалф и Боггс): «Ethernet: Distributed Packet Switching for Local Computer Networks», Commun. of the ACM, vol. 19, pp. 395–404, July 1976.

METZ, C. (Мец): «Interconnecting ISP Networks», IEEE Internet Computing, vol. 5, pp. 74–80, Mar.–Apr. 2001.

MISHRA, P.P., KANAKIA, H., and TRIPATHI, S. (Мишра и др.): «On Hop by Hop Rate-Based Congestion Control», IEEE/ACM Trans. on Networking, vol. 4, pp. 224–239, Apr. 1996.

MITRA, J., and NAYAK, T. (Митра и Найек): «Reconfigurable Very High Throughput Low Latency VLSI (FPGA Design Architecture of CRC 32», Integration, vol. 56, pp. 1–14, Jan. 2017.

MOGUL, J. (Могул): «IP Network Performance», in Internet System Handbook, D.C. Lynch and M.Y. Rose (eds.), Boston: Addison-Wesley, pp. 575–575, 1993.

MOGUL, J., and DEERING, S. (Могул и Диринг): «Path MTU Discovery», RFC 1191, Nov. 1990.

MOGUL, J., and MINSHALL, G. (Могул и Миншалл): «Rethinking the Nagle Algorithm», Comput. Commun. Rev., vol. 31, pp. 6–20, Jan. 2001.

MOY, J. (Мой): «Multicast Routing Extensions for OSPF», Commun. of the ACM, vol. 37, pp. 61–66, Aug. 1994.

MUYCO, S.D., and HERNANDEZ, A.A. (Муйко и Эрнандес): «Least Significant Bit Hash Algorithm for Digital Image Watermarking Authentication», Proc. Fifth Int’l Conf. on Computing and Art. Intell, ACM, pp. 150–154, 2019.

NAGLE, J. (Нейгл): «On Packet Switches with Infinite Storage», IEEE Trans. on Commun., vol. COM-5, pp. 435–438, Apr. 1987.

NAGLE, J.: «Congestion Control in TCP/IP Internetworks», Computer Commun. Rev., vol. 14, pp. 11–17, Oct. 1984.

NAUGHTON, J. (Нотон): «A Brief History of the Future», Woodstock, NY: Overlook Press, 2000.

NEEDHAM, R.M., and SCHROEDER, M.D. (Нидхем и Шредер): «Authentication Revisited», Operating Systems Rev., vol. 21, p. 7, Jan. 1987.

NEEDHAM, R.M., and SCHROEDER, M.D. (Нидхем и Шредер): «Using Encryption for Authentication in Large Networks of Computers», Commun. of the ACM, vol. 21, pp. 993–999, Dec. 1978.

NELAKUDITI, S., and ZHANG, Z.-L. (Нелакудити и Чжан): «A Localized Adaptive Proportioning Approach to QoS Routing», IEEE Commun. Magazine, vol. 40, pp. 66–71, June 2002.

NIST: «Secure Hash Algorithm», U.S. Government Federal Information Processing Standard 180, 1993.

NORTON, W.B. (Нортон): «The Internet Peering Playbook: Connecting to the Core of the Internet», DrPeering Press, 2011.

NUCCI, A., and PAPAGIANNAKI, D. (Нуччи и Пападжаннаки): «Design, Measurement and Management of Large-Scale IP Networks», Cambridge: Cambridge University Press, 2008.

NUGENT, R., MUNAKANA, R., CHIN, A., COELHO, R., and PUIG-SUARI, J. (Нью­джент и др.): «The Cube-Sat: The PicoSatellite Standard for Research and Education», Proc. SPACE 2008 Conf., AIAA, 2008.

OLEJNIK, L., CASTELLUCIA, C., and DIAZ, C. (Олейник и др.): «The Leaking Battery», Data Privacy Management and Security Assurance Springer, pp. 254–263.

ORAN, D. (Оран): «OSI IS-IS Intra-domain Routing Protocol», RFC 1142, Feb. 1990.

OSTERHAGE, W. (Остерхаге): «Wireless Network Security», 2nd ed., Boca Raton, FL: CRC Press, 2018.

OTWAY, D., and REES, O. (Отуэй и Рис): «Efficient and Timely Mutual Authentication», Operating Systems Rev., pp. 8–10, Jan. 1987.

PADHYE, J., FIROIU, V., TOWSLEY, D., and KUROSE, J. (Падхай и др.): «Modeling TCP Throughput: A Simple Model and Its Empirical Validation», Proc. SIGCOMM ’98 Conf., ACM, pp. 303–314, 1998.

PALMER, M., KRUGER, T., CHANDRASEKARAN, N., and FELDMANN, A. (Палмер и др.): «The QUIC Fix for Optimal Video Streaming», Proc. Workshop on Evolution, Performance, and Interoperability of QUIC, ACM, pp. 43–49, Dec. 2018.

PARAMESWARAN, M., SUSARLA, A., and WHINSTON, A.B. (Парамешваран и др.): «P2P Networking: An Information-Sharing Alternative», IEEE Computer, vol. 34, pp. 31–38, July 2001.

PAREKH, A., and GALLAGER, R. (Парех и Галлагер): «A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple-Node Case», IEEE/ACM Trans. on Networking, vol. 2, pp. 137–150, Apr. 1994.

PAREKH, A., and GALLAGER, R.: «A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case», IEEE/ACM Trans. on Networking, vol. 1, pp. 344–357, June 1993.

PARTRIDGE, C., HUGHES, J., and STONE, J. (Партридж и др.): «Performance of Checksums and CRCs over Real Data», Proc. SIGCOMM ’95 Conf., ACM, pp. 68–76, 1995.

PARTRIDGE, C., MENDEZ, T., and MILLIKEN, W. (Партридж и др.): «Host Anycasting Service», RFC 1546, Nov. 1993.

PATIL, P., BUBANE, V., and PANDHARE, N. (Патил и др.): «Audio Steganography», Riga, Latvia: Lap Lambert Academic Publishing, 2019.

PAXSON, V., and FLOYD, S. (Паксон и Флойд): «Wide-Area Traffic: The Failure of Poisson Modeling», IEEE/ACM Trans. on Networking, vol. 3, pp. 226–244, June 1995.

PEARSON, E. (Пирсон): «Fiber Optic Communications For Beginners: The Basics», Fiber Optic Assoc., 2015.

PERKINS, C.E. (Перкинс): «RTP: Audio and Video for the Internet», Boston: Addison-Wesley, 2003.

PERKINS, C.E.: «IP Mobility Support for IPv4», RFC 3344, Aug. 2002.

PERKINS, C.E. (ed.): «Ad Hoc Networking», Boston: Addison-Wesley, 2001.

PERKINS, C.E.: «Mobile IP Design Principles and Practices», Upper Saddle River, NJ: Prentice Hall, 1998.

PERKINS, C.E., and ROYER, E. (Перкинс и Ройер): «The Ad Hoc On-Demand Distance-Vector Protocol», in Ad Hoc Networking, edited by C. Perkins, Boston: Addison-Wesley, 2001.

PERLMAN, R. (Перлман): «Interconnections», 2nd ed., Boston: Addison-Wesley, 2000.

PERLMAN, R.: «Network Layer Protocols with Byzantine Robustness», Ph.D. thesis, M.I.T., 1988.

PERLMAN, R.: «An Algorithm for the Distributed Computation of a Spanning Tree in an Extended LAN», Proc. SIGCOMM ’85 Conf., ACM, pp. 44–53, 1985.

PERLMAN, R., and KAUFMAN, C. (Перлман и Кауфман): «Key Exchange in IPsec», IEEE Internet Computing, vol. 4, pp. 50–56, Nov.-Dec. 2000.

PERROS, H.G. (Перрос): «Connection-Oriented Networks: SONET/SDH, ATM, MPLS and Optical Networks», New York: John Wiley & Sons, 2005.

PETERSON, L., ANDERSON, T., KATTI, S., MCKEOWN, N. PARULKAR, G., REXFORD, J., SATYANARAYANAN, M., SUNAY, O. and VAHDAT, A. (Петерсон и др.): «Democratizing the Network Edge», Computer Commun. Review, vol. 49, pp. 31–36, Apr. 2019.

PETERSON, W.W., and BROWN, D.T. (Петерсон и Браун): «Cyclic Codes for Error Detection», Proc. IRE, vol. 49, pp. 228–235, Jan. 1961.

PIATEK, M., ISDAL, T., ANDERSON, T., KRISHNAMURTHY, A., and VENKATARAMANI, V. (Пиатек и др.): «Do Incentives Build Robustness in BitTorrent?», Proc. NSDI 2007 Conf., USENIX, pp. 1–14, 2007.

PIATEK, M., KOHNO, T., and KRISHNAMURTHY, A. (Пиатек и др.): «Challenges and Directions for Monitoring P2P File Sharing Networks — or Why My Printer Received a DMCA Takedown Notice», Third Workshop on Hot Topics in Security, USENIX, July 2008.

POSTEL, J. (Постел): «Internet Control Message Protocols», RFC 792, Sept. 1981.

PYLES, J., CARRELL, J.L., and TITTEL, E. (Пайлс и др.): «Guide to TCP/IP: IPv6 and IPv4», 5th ed., Boston: Cengage Learning, 2017.

QUINLAN, J., and SREENAN, C. (Куинлан и Сринан): «Multi-profile Ultra High Definition (UHD) AVC and HEVC 4K DASH Datasets», Proc. Ninth Multimedia Systems Conf., ACM, pp. 375–380, June 2018.

RABIN, J., and MCCATHIENEVILE, C. (Рабин и МакКэтиНевил): «Mobile Web Best Practices 1.0», W3C Recommendation, July 2008.

RAMACHANDRAN, A., DAS SARMA, A., FEAMSTER, N. (Рамачандран и др.): «Bit Store: An Incentive-Compatabile Solution for Blocked Downloads in BitTorrent», Proc. Joint Workshop on Econ. Networked Syst. and Incentive-Based Computing, 2007.

RAMACHANDRAN, S., GRYYA, T., DAPENA, K., and THOMAS, P. (Рамачандран и др.): «The Truth about Faster Internet: It’s Not Worth It», The Wall Street Journal, p. A1, 2019.

RAMAKRISHNAN, K.K., FLOYD, S., and BLACK, D. (Рамакришнан и др.): «The Addition of Explicit Congestion Notification (ECN) to IP», RFC 3168, Sept. 2001.

RAMAKRISHNAN, K.K., and JAIN, R. (Рамакришнан и Джейн): «A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with a Connectionless Network Layer», Proc. SIG-COMM ’88 Conf., ACM, pp. 303–313, 1988.

RIBEZZO, G., SAMELA, G., PALMISANO, V., DE CICCO, L., and MASCOLO, S. (Рибеццо и др.): «A DASH Video Streaming for Immersive Contents», Proc. Ninth Multimedia Systems Conf., ACM, pp. 525–528, June 2018.

RIVEST, R.L. (Ривест): «The MD5 Message-Digest Algorithm», RFC 1320, Apr. 1992.

RIVEST, R.L., SHAMIR, A., and ADLEMAN, L. (Ривест и др.): «On a Method for Obtaining Digital Signatures and Public Key Cryptosystems», Commun. of the ACM, vol. 21, pp. 120–126, Feb. 1978.

ROBERTS, L.G. (Робертс): «Extensions of Packet Communication Technology to a Hand Held Personal Terminal», Proc. Spring Joint Computer Conf., AFIPS, pp. 295–298, 1972.

ROBERTS, L.G.: «Multiple Computer Networks and Intercomputer Communication», Proc. First Symp. on Operating Systems Prin., ACM, pp. 3.1–3.6, 1967.

ROSE, M.T. (Роуз): «The Simple Book», Upper Saddle River, NJ: Prentice Hall, 1994.

ROSE, M.T.: «The Internet Message», Upper Saddle River, NJ: Prentice Hall, 1993.

RUIZ-SANCHEZ, M.A., BIERSACK, E.W., and DABBOUS, W. (Руис-Санчес и др.): «Survey and Taxonomy of IP Address Lookup Algorithms», IEEE Network Magazine, vol. 15, pp. 8–23, Mar.-Apr. 2001.

SALTZER, J.H., REED, D.P., and CLARK, D.D. (Зальцер и др.): «End-to-End Argu­ments in System Design», ACM Trans. on Computer Systems, vol. 2, pp. 277–288, Nov. 1984.

SANTOS, F.R., DA COSTA CORDEIRO, W.L., GASPARY, L.P., and BARCELLOS, M.P. (Сантос и др.): «Funnel: Choking Polluters in BitTorrent File Sharing Communities», IEEE Trans. on Network and Service Management, vol. 8, pp. 310–321, April 2011.

SAROIU, S., GUMMADI, K., and GRIBBLE, S. (Сарою и др.): «Measuring and Analyzing the Characteristics of Napster & Gnutella Hosts», Multim. Syst., vol. 9, pp. 170–184, Aug. 2003.

SCHMITT, P., EDMUNDSON, A., MANKIN, A. and FEAMSTER, N. (Шмитт и др.): «Oblivious DNS: Practical Privacy for DNS Queries», Proc. on Privacy Enhancing Technologies, pp. 228–244, 2019.

SCHNEIER, B. (Шнайер): «Secrets and Lies», New York: John Wiley & Sons, 2004.

SCHNORR, C.P. (Шнорр): «Efficient Signature Generation for Smart Cards», Journal of Cryptology, vol. 4, pp. 161–174, 1991.

SCHWARTZ, M., and ABRAMSON, N. (Шварц и Абрамсон): «The AlohaNet: Surfing for Wireless Data», IEEE Commun. Magazine, vol. 47, pp. 21–25, Dec. 2009.

SENN, J.A. (Сенн): «The Emergence of M-Commerce», IEEE Computer, vol. 33, pp. 148–150, Dec. 2000.

SEVERANCE, C.R. (Северанс): «Introduction to Networking: How the Internet Works», Amazon Cre ateSpace, 2015.

SHAIKH, A., REXFORD, J., and SHIN, K. (Шейх и др.): «Load-Sensitive Routing of Long-Lived IP Flows», Proc. SIGCOMM ’99 Conf., ACM, pp. 215–226, Sept. 1999.

SHALUNOV, S., and CARLSON, R. (Шалунов и Карлсон): «Detecting Duplex Mismatch on Ethernet», Passive and Active Network Measurement, Springer-Verlag LNCS 3431, pp. 3135–3148, 2005.

SHANNON, C. (Шеннон): «A Mathematical Theory of Communication», Bell System Tech. J., vol. 27, pp. 379–423, July 1948; and pp. 623–656, Oct. 1948.

SHREEDHAR, M., and VARGHESE, G. (Шридхар и Варгезе): «Efficient Fair Queueing Using Deficit Round Robin», Proc. SIGCOMM ’95 Conf., ACM, pp. 231–243, 1995.

SIGANOS, G., FALOUTSOS, M., FALOUTSOS, P., and FALOUTSOS, C. (Сиганос и др.): «Power Laws and the AS-level Internet Topology», IEEE/ACM Trans. on Networking, vol. 11, pp. 514–524, Aug. 2003.

SIMPSON, W. (Симпсон): «Video Over IP», 2nd ed., Burlington, MA: Focal Press, 2008.

SIMPSON, W.: «The Point-to-Point Protocol (PPP)», RFC 1661, July 1994a.

SIMPSON, W.: «PPP in HDLC-like Framing», RFC 1662, July 1994b.

SIU, K., and JAIN, R. (Сиу и Джейн): «A Brief Overview of ATM: Protocol Layers, LAN Emulation, and Traffic», Computer Commun. Review, vol. 25, pp. 6–20, Apr. 1995.

SKOUDIS, E., and LISTON, T. (Скудис и Листон): «Counter Hack Reloaded», 2nd ed., Upper Saddle River, NJ: Prentice Hall, 2006.

SMITH, D.K., and ALEXANDER, R.C. (Смит и Александер): «Fumbling the Future», New York: William Morrow, 1988.

SOOD, K. (Суд): «Kerberos Authentication Protocol: Cryptography and Network Security», Riga, Latvia: Lap Lambert Academic Publishing, 2012.

SOTIROV, A., STEVENS, M., APPELBAUM, J., LENSTRA, A., MOLNAR, D., OSVIK, D., and DE WEGER, B. (Сотиров и др.): «MD5 Considered Harmful Today», Proc. 25th Chaos Commun. Congress, Verlag Art d’Ameublement, 2008.

SOUTHEY, R. (Саути): «The Doctors», London: Longman, Brown, Green and Longmans, 1848.

SPURGEON, C., and ZIMMERMAN, A. (Сперджен и Циммерман): «Ethernet: The Definitive Guide», 2nd ed., Sebastapol, CA: O’Reilly, 2014.

STALLINGS, W. (Сталлингс): «Data and Computer Commun», 10th ed., Upper Saddle River, NJ: Pearson Education, 2013.

STAPLETON, J., and EPSTEIN, W.C. (Стэплтон и Эпштейн): «Security without Obscurity: A Guide to PKI Operations», Boca Raton, FL: CRC Press, 2016.

STEVENS, W.R. (Стивенс): «TCP/IP Illustrated: The Protocols», Boston: Addison Wesley, 1994.

STEVENS, W.R., FENNER, B., and RUDOFF, A.M. (Стивенс и др.): «UNIX Network Programming: The Sockets Network API», Boston: Addison-Wesley, 2004.

STOCKMAN, G.-J., and COOMANS, W. (Стокман и Куманс): «Fiber to the Tap: Pushing Coaxial Cable Networks to Their Limits», IEEE Commun. Magazine, vol. 57, pp. 34–39, Aug. 2019.

STUBBLEFIELD, A., IOANNIDIS, J., and RUBIN, A.D. (Стабблфилд и др.): «Using the Fluhrer, Mantin, and Shamir Attack to Break WEP», Proc. Network and Distributed Systems Security Symp., ISOC, pp. 1–11, 2002.

STUTTARD, D., and PINTO, M. (Статтард и Пинто): «The Web Application Hacker’s Handbook», New York: John Wiley & Sons, 2007.

SU, S. (Су): «The UMTS Air Interface in RF Engineering», New York: McGraw-Hill, 2007.

SUN, L., MKWAWA, I.H., JAMMEH, E., and IFEACHOR, E. (Сунь и др.): «Guide to Voice and Video over IP: For Fixed and Mobile Networks», Berlin: Springer, 2015.

SUNDARESAN, S., De DONATO, W., FEAMSTER, N., TEIXEIRA, R., CRAWFORD, S. and PESCAPE, A. (Сундаресан и др.): «Broadband Internet Performance: A View from the Gateway», Proc. SIGCOMM 2011 Conf., ACM, pp. 134–145, 2011.

SUNSHINE, C.A., and DALAL, Y.K. (Саншайн и Далал): «Connection Management in Transport Protocols», Computer Networks, vol. 2, pp. 454–473, 1978.

SWAMI, R., DAVE, M., and RANGA, V. (Свами и др.): «Software-defined Networking-based DDoS Defense Mechanisms», ACM Computing Surveys, vol. 52, Art. 28, April 2019.

TAN, K., SONG, J., ZHANG, Q., and SRIDHARN, M. (Тань и др.): «A Compound TCP Approach for High-Speed and Long Distance Networks», Proc. INFOCOM Conf., IEEE, pp. 1–12, 2006.

TANENBAUM, A.S., and BOS, H. (Таненбаум и Бос): «Modern Operating Systems», 4th ed., Upper Saddle River, NJ: Prentice Hall, 2015.

TOMLINSON, R.S. (Томлинсон): «Selecting Sequence Numbers», Proc. SIGCOMM/SIGOPS Interprocess Commun. Workshop, ACM, pp. 11–23, 1975.

TUCHMAN, W. (Такман): «Hellman Presents No Shortcut Solutions to DES», IEEE Spectrum, vol. 16, pp. 40–41, July 1979.

TURNER, J.S. (Тернер): «New Directions in Communications (or Which Way to the Information Age)», IEEE Commun. Magazine, vol. 24, pp. 8–15, Oct. 1986.

VANHOEF, M., and PIESSENS, F. (Ванхоф и Писсенс): «Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2», Proc. 2017 SIGSAC Conf. on Computer and Commun. Security, ACM, pp. 1313–1328, 2017.

VARGHESE, G. (Варгезе): «Network Algorithmics», San Francisco: Morgan Kaufmann, 2004.

VARGHESE, G., and LAUCK, T. (Варгезе и Лаук): «Hashed and Hierarchical Timing Wheels: Data Structures for the Efficient Implementation of a Timer Facility», Proc. 11th Symp. on Operating Systems Prin., ACM, pp. 25–38, 1987.

VERIZON BUSINESS: «2009 Data Breach Investigations Report», Verizon, 2009.

VITERBI, A. (Витерби): «CDMA: Principles of Spread Spectrum Communication», Upper Saddle River, NJ: Prentice Hall, 1995.

WAITZMAN, D., PARTRIDGE, C., and DEERING, S. (Вайцман и др.): «Distance Vector Multicast Routing Protocol», RFC 1075, Nov. 1988.

WALDMAN, M., RUBIN, A.D., and CRANOR, L.F. (Уолдман и др.): «Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System», Proc. Ninth USENIX Security Symp., USENIX, pp. 59–72, 2000.

WALTERS, R. (Уолтерс): «Spread Spectrum: Hedy Lamarr and the Mobile Phone», Kindle, 2013.

WANG, B., and REN, F. (Ван и Рен): «Improving Robustness of DASH Against Network Uncertainty», 2019 Int’l Conf. on Multimedia and Expo, IEEE, pp. 448–753, July 2019.

WANG, Z., and CROWCROFT, J. (Ван и Кроукрофт): «SEAL Detects Cell Misordering», IEEE Network Magazine, vol. 6, pp. 8–9, July 1992.

WARE, R., MUKERJEE, M.K., SESHAN, S. and SHERRY J. (Уэр и др.): «Modeling BBR’s Interactions with Loss-Based Congestion Control», Internet Measurement Con­ference, 2019.

WARNEKE, B., LAST, M., LIEBOWITZ, B., and PISTER, K.S. J. (Варнеке и др.): «Smart Dust: Communicating with a Cubic Millimeter Computer», IEEE Computer, vol. 34, pp. 44–51, Jan. 2001.

WEI, D., CHENG, J., LOW, S., and HEGDE, S. (Вэй и др.): «FAST TCP: Motivation, Architecture, Algorithms, Performance», IEEE/ACM Trans. on Networking, vol. 14, pp. 1246–1259, Dec. 2006.

WEISER, M. (Вайзер): «The Computer for the Twenty-First Century», Scientific American, vol. 265, pp. 94–104, Sept. 1991.

WHITE, G. (Уайт): «Low Latency DOCSIS Overview And Performance Characteristics», A Technical Paper prepared for SCTE-ISBE, 2019.

WITTENBERG, N. (Виттенберг): «Understanding Voice Over IP Technology», Clifton Park, NY: Delmar Cengage Learning, 2009.

WOOD, L., IVANCIC, W., EDDY, W., STEWART, D., NORTHAM, J., JACKSON, C., and DA SILVA CURIEL, A. (Вуд и др.): «Use of the Delay-Tolerant Networking Bundle Protocol from Space», Proc. 59th Int’l Astronautical Congress, Int’l Astronautical Federation, pp. 3123–3133, 2008.

WU, T. (У): «Network Neutrality, Broadband Discrimination», Journal on Telecom. and High- Tech. Law, vol. 2, pp. 141–179, 2003.

WYLIE, J., BIGRIGG, M.W., STRUNK, J.D., GANGER, G.R., KILICCOTE, H., and KHOSLA, P.K. (Уайли и др.): «Survivable Information Storage Systems», IEEE Computer, vol. 33, pp. 61–68, Aug. 2000.

YE, Y., LI, T., ADJEROH, D., and ITENGAR, S.S. (Е и др.): «A Survey on Malware Detection Using Data Mining Techniques», ACM Computing Surveys, vol. 50, Art. 41, June 2017.

YU, T., HARTMAN, S., and RAEBURN, K. (Юй и др.): «The Perils of Unauthenticated Encryption: Kerberos Version 4», Proc. NDSS Symposium, Internet Society, Feb. 2004.

YUVAL, G. (Юваль): «How to Swindle Rabin», Cryptologia, vol. 3, pp. 187–190, July 1979.

ZHANG, Y., BRESLAU, L., PAXSON, V., and SHENKER, S. (Чжан и др.): «On the Characteristics and Origins of Internet Flow Rates», Proc. SIGCOMM 2002 Conf., ACM, pp. 309–322, 2002.

ZHANG, Y., YUAN, X., and TZENG, N.-F. (Чжан и др.): «Pseudo-Honeypot: Toward Efficient and Scalable Spam Sniffer», Proc. 49th Int’l Conf. on Dependable Systems and Networks, IEEE, pp. 435–446, 2019.

ZIMMERMANN, P.R. (Циммерман): «The Official PGP User’s Guide», Cambridge, MA: M.I.T. Press, 1995a.

ZIPF, G.K. (Ципф): «Human Behavior and the Principle of Least Effort: An Introduction to Human Ecology», Boston: Addison-Wesley, 1949.

ZIV, J., and LEMPEL, Z. (Зив и Лемпель): «A Universal Algorithm for Sequential Data Compression», IEEE Trans. on Information Theory, vol. IT-3, pp. 337–343, May 1977.



50 Согласно английскому алфавиту. — Примеч. ред.


Загрузка...