@book{stevens1995tcp,
  title={TCP/IP Illustrated: Vol. 2: The Implementation},
  author={Stevens, W.R. and Wright, G.R.},
  isbn={9780201633542},
  lccn={lc93040000},
  series={Addison-Wesley Professional Computing Series},
  url={http://books.google.com.br/books?id=6H9AxyFd0v0C},
  year={1995},
  publisher={Prentice Hall}
}
@book{stevens2004unix,
  title={UNIX Network Programming: Vol. 1: The Sockets Networking API},
  author={Stevens, W.R. and Fenner, B. and Rudoff, A.M.},
  isbn={9780131411555},
  series={Addison-Wesley Professional Computing Series},
  url={http://books.google.com.br/books?id=ptSC4LpwGA0C},
  year={2004},
  publisher={Prentice Hall}
}
@article{wifiNoCloths,
  title={Your 802.11 Wireless Network has No Clothes},
  author={Arbaugh, William A.  and Shankar, Narendar  and Wan, Y.C. Justin},
  year={2001},
  publisher={IEEE Wireless Communications},
  volume={9},
  pages={44 - 51}  
}
@article{wepSecurity,
  author={Walker, J.},
  title={Unsafe at any key size:an analysis of the WEP encapsulation},
  journal={Tech. Rep. 03628E, IEEE 802.11 committee},
  pages={1-8},
  year={2000}
}
@book{mullett2006wireless,
  title={Wireless Communication},
  author={Mullett, G.J.},
  isbn={9781401886592},
  lccn={2005016547},
  url={http://books.google.com.br/books?id=9D0rNN5uNcIC},
  year={2006},
  publisher={Thomson Delmar Learning}
}
@book{sarkar2006history,
  title={History of Wireless},
  author={Sarkar, T.K. and Mailloux, R. and Oliner, A.A. and Sengupta, D.L.},
  isbn={9780471718147},
  lccn={05022232},
  series={Wiley Series in Microwave and Optical Engineering},
  year={2006},
  publisher={Wiley}
}
@misc{historyWireless,
author = {Shea, John M.},
title = {History of Wireless Communication, From the Birth of Telecommunications to the Modern Era of Cellular Communications and Wireless Local Area Networks},
note = {[Acessado em 13/12/2012]},
year = {2011},
howpublished = {\url{http://wireless.ece.ufl.edu/jshea/HistoryOfWirelessCommunication.html}}
}
@misc{wifiOrg,
author = {Wi-Fi Alliance},
title = {Organization},
year = {2012},
howpublished = {\url{http://www.wi-fi.org/about/organization}},
note = {[Acessado em 13/12/2012]}
}
@article{wepInsecure,
title = {Weaknesses in the Key Scheduling Algorithm of RC4},
author = {Fluhrer, Scott and Mantin, Itsik and Shamir, Adi},
journal={In Eight Annual Workshop on Selected Areas in Cryptography},
year={2001},
pages={1-24}
}
@article{ieee802.11,
title = {Part 11: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY) Specifications},
author = {IEEE Computer Society sponsored by the LAN/MAN Standards Committee},
journal={Revision of IEEE Std 802.11-2007},
year={2012}
}
@article{historiaINternet,
title = {Inventing the Internet},
author = {Abbate, J.},
journal={Cambridge: MIT Press},
year={1999}
}
@book{barken2004wireless,
  title={Wireless Hacking: Projects for Wi-Fi Enthusiasts},
  author={Barken, L. and Bermel, E.},
  isbn={9781931836371},
  url={http://books.google.com.br/books?id=i7XNsrT-rwQC},
  year={2004},
  publisher={Elsevier Science Limited}
}
@article{ieee802.11a,
title = {IEEE Std 802.11a-1999(R2003)},
author = {IEEE Computer Society sponsored by the LAN/MAN Standards Committee},
journal={Supplement to IEEE Std 802.11-1999},
year={2003}
}
@article{OPDM,
title = {A theoretical study of performance of an orthogonal multiplexing data transmission scheme.},
author = {Chang, R.W. and Gibbey, R.A},
journal={IEEE Transactions on Communications Technology},
volume={16},
pages={529 - 540},
year={1968}
}
@misc{802.11table,
author = {The Institute of Electrical and Electronics Engineers, Inc. (IEEE)},
title = {OFFICIAL IEEE 802.11 WORKING GROUP PROJECT TIMELINES},
year = {2012},
howpublished = {\url{http://grouper.ieee.org/groups/802/11/Reports/802.11_Timelines.htm}},
note = {[Acessado em 13/12/2012]}
}
@article{longRange,
title = {Longer-Range, Faster-Throughput, Multimedia-Grade Wi-Fi Networks\textregistered},
author = {WiFi Alliance\texttrademark},
howpublished = {\url{http://www.wi-fi.org/register.php?file=wp_Wi-Fi_CERTIFIED_n_Industry.pdf}},
year={2009}
}
@article{taxonomy,
title = {A Taxonomy of DDoS Attack and DDoS Defense Mechanisms},
author = {Mirkovic, J. and Reiher, P.},
howpublished = {ACM SIGCOMM Computer Communications Review},
year={2004}
}
@article{stateoftheart,
title = "DDoS attacks and defense mechanisms: classification and state-of-the-art ",
journal = "Computer Networks ",
volume = "44",
number = "5",
pages = "643 - 666",
year = "2004",
author = "Mitokrotsa, A. and Douligeris, C.",
url = "http://www.sciencedirect.com/science/article/pii/S1389128603004250",
}
@article{csma,
title = {Study of different CSMA/CA IEEE 802.11-based implementations},
author = {Oliver, Miquel and Escudero, Ana},
journal = {EUNICE 1999 Contribution},
year={1999},
pages={1-3}
}	
@article{802.11b,
title = {802.11b-1999 Higher Speed Physical Layer Extension in the 2.4 GHz band},
author = {IEEE Computer Society sponsored by the LAN/MAN Standards Committee},
journal={Supplement to IEEE Std 802.11-1999},
year={1999}
}
@book{flickenger2006wireless,
  title={Wireless Networking in the Developing World: A Practical Guide to Planning and Building Low-cost Telecommunicaitons Infrastructure},
  author={Flickenger, R.},
  isbn={9781411678378},
  url={http://books.google.com.br/books?id=BSmcUJo\_qIIC},
  year={2006},
  publisher={Limehouse Book Sprint Team}
}
@article{802.11g,
title = {IEEE 802.11g-2003: Further Higher Data Rate Extension in the 2.4 GHz Band},
author = {IEEE Computer Society sponsored by the LAN/MAN Standards Committee},
journal={Supplement to IEEE Std 802.11-1999},
year={2003}
}
@misc{channels,
author = {Cisco\textregistered},
title = {WLAN Radio Frequency Design Considerations},
year = {2012},
howpublished = {\url{http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/emob41dg/ch3_WLAN.html}},
note = {[Acessado em 15/12/2012]}
}
@article{mimo,
title = {Energy-efficiency of MIMO and Cooperative MIMO in Sensor Networks},
author = {Cui, S. and Goldsmith, A.J. and Bahai, A.},
publisher={Selected Areas in Communications, IEEE Journal on},
year={2004},
volume={22},
pages={1089 - 1098}
}

@misc{802.11nImage,
author = {AirMagnet Inc.},
title = {802.11n Primer},
year = {2008},
howpublished = {\url{http://www.airmagnet.com/assets/whitepaper/WP-802.11nPrimer.pdf}},
note = {[Acessado em 15/12/2012]}
}
@misc{slowloris,
author = {ha.ckers.org},
title = {Slowloris HTTP DoS},
year = {2009},
howpublished = {\url{http://ha.ckers.org/slowloris/}},
note = {[Acessado em 15/12/2012]}
}
@misc{defcom,
author = {Bowne, S.},
title = {Three Generations of DoS Attacks (with Audience Participation, as Victims)},
year = {2011},
howpublished = {\url{http://samsclass.info/defcon.html}},
note = {[Acessado em 12/06/2013]}
}

@article{802.11n,
title = {Amendment 5: Enhancements for Higher Throughput},
author = {IEEE Computer Society sponsored by the LAN/MAN Standards Committee},
journal={Supplement to IEEE Std 802.11-1999},
year={2009}
}
@article{irc,
title = {Trends in Denial of Service Attack Technology},
author = {CERT CC},
journal = {\url{http://www.cert.org/archive/pdf/DoS trends.pdf}},
year={2001}
}
@book{kurose,
  title={Computer Networking: A Top-Down Approach},
  author={Kurose, J.F. and Ross, K.W.},
  series={Always learning},
  year={2012},
  publisher={Pearson}
}
@techreport{codigosHTTP,
   AUTHOR = {Mogul, J. and Compaq and Frystyk, H. and W3C/MIT and Masinter, L. and Xerox and Leach, P. and Microsoft and Berners-Lee, T. and W3C/MIT and Compaq/W3C and Irvine, UC and Gettys, J. and Fielding, R.},
   TITLE = {Hypertext Transfer Protocol -- HTTP/1.1},
   TYPE={RFC},
   NUMBER={2616},
   YEAR = {1999},
   Pages ={57-71},
   URL={http://tools.ietf.org/html/rfc2616}
}

@report{RFCSSL1,
  author = {Dierks, T. and Rescorla, E.},
  year = {2008},
  month = {8},
  title = {The Transport Layer Security (TLS) Protocol Version 1.2}
}
@report{RFCSSL2,
  author = {Dierks, T. and Allen, C.},
  year = {1999},
  month = {1},
  title = {The TLS Protocol Version 1.0}
}
@report{RFC2965,
  author = {Kristol, D. and Montulli, L.},
  year = {2000},
  month = {10},
  title = {HTTP State Management Mechanism}
}
@report{RFC6265,
  author = {Barth, A. and Berkeley, U. C.},
  year = {2011},
  month = {4},
  title = {HTTP State Management Mechanism},
}
@book{cookies,
  title={HTTP Cookies: Standards, privacy, and politics},
  author={Kristol, D.},
  series={ACM Transactions on Internet Technology},
  year={2001}
}
@misc{cookieimg,
author = {ASP.NET},
title = {HTTP Cookies in ASP.NET Web API },
year = {2012},
howpublished = {\url{http://www.asp.net/web-api/overview/working-with-http/http-cookies}},
note = {[Acessado em 04/05/2013]}
}
@book{douligeris2007network,
  title={Network Security: Current Status and Future Directions},
  author={Douligeris, C. and Serpanos, D.N.},
  isbn={9780470099735},
  year={2007},
  publisher={Wiley}
}
@book{harrington2005network,
  title={Network Security: A Practical Approach},
  author={Harrington, J.L.},
  isbn={9780123116338},
  lccn={2005040077},
  series={Morgan Kaufmann Series in Networking},
  url={http://books.google.com.br/books?id=c4WJUzoi2EwC},
  year={2005},
  publisher={Elsevier}
}
@misc{cacheweb,
author = {Abhijit, J.},
title = {Exploring Caching in ASP.NET },
year = {2008},
howpublished = {\url{http://www.codeproject.com/Articles/29899/Exploring-Caching-in-ASP-NET}},
note = {[Acessado em 31/07/2013]}
}
@article{trojan,
title = {Internet intrusions: Global characteristics and prevalence},
author = {Yegneswaran, V. and  Barford, P. and Ullrich, J.},
journal={In Proceedings of the 2003 ACM SIGMETRICS International conference on Measurement and
Modeling of Computer Systems},
pages={138-147},
year={2003}
}
@misc{smurf,
title = {Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht.},
author = {Criscuolo, P. J.},
howpublished = {\url{http://ftp.se.kde.org/pub/security/csir/ciac/ciacdocs/ciac2319.txt}},
note = {[Acessado em 31/07/2013]},
year={2000}
}
@misc{smurfDef,
title = {A Cisco Guide to Defending Against Distributed Denial of Service Attacks.},
author = {Cisco\textregistered Security Intelligence Operations.},
howpublished = {\url{http://www.cisco.com/web/about/security/intelligence/guide_ddos_defense.html\#_Toc374453049}},
note = {[Acessado em 31/07/2013]}
}
@misc{dnsamp,
title = {Anatomy of a DNS DDoS Amplification Attack.},
author = {Piscitello, D.},
howpublished = {\url{http://www.watchguard.com/infocenter/editorial/41649.asp}},
note = {[Acessado em 25/08/2013]},
year={2013}
}
@misc{figSSL,
author = {Slaviero, M.},
title = {TLS/SSL and .NET Framework 4.0 },
year = {2011},
howpublished = {\url{https://www.simple-talk.com/dotnet/.net-framework/tlsssl-and-.net-framework-4.0/}},
note = {[Acessado em 1/11/2013]}

@misc{assimetrica,
title = {Asymmetric cryptography (public-key cryptography)},
author = {Rouse, M.},
howpublished = {\url{http://searchsecurity.techtarget.com/definition/asymmetric-cryptography}},
note = {[Acessado em 11/04/2013]},
year={2008}
}
@misc{figassimetrica,
title = {Data Confidentiality},
author = {Microsoft\textregistered patterns \& practices},
howpublished = {\url{http://msdn.microsoft.com/en-us/library/ff650720.aspx}},
note = {[Acessado em 11/04/2013]},
year={2005}
}
@misc{figpacket,
title = {HTTP, Security with SSL},
author = {Hock-Chuan, C.},
howpublished = {\url{http://www.ntu.edu.sg/home/ehchua/programming/webprogramming/HTTP_SSL.html}},
note = {[Acessado em 11/04/2013]},
year={2009}
}
@misc{cipher,
title = {Cipher Suite Definitions},
author = {IBM\textregistered},
howpublished ={\url{http://pic.dhe.ibm.com/infocenter/zos/v1r13/index.jsp?topic=\%2Fcom.ibm.zos.r13.gska100\%2Fcsdcwh.htm}},
note = {[Acessado em 17/04/2013]}
}
@misc{diffie,
title = {Diffie-Hellman-Schlüsselaustausch},
author = {Benutzer S.},
howpublished ={\url{http://pt.wikipedia.org/wiki/Ficheiro:Diffie-Hellman-Schl\%C3\%BCsselaustausch.png}},
year={2006},
note = {[Acessado em 5/01/2013]}
}
@misc{thc,
title = {THC-SSL-DOS},
author = {The Hackers Choice},
howpublished ={\url{https://www.thc.org/thc-ssl-dos/}},
note = {[Acessado em 12/02/2013]}
}
@misc{thc2,
title = {Tool lets low-end PC crash much more powerful webserver},
author = {Goodin D.},
howpublished ={\url{http://www.theregister.co.uk/2011/10/24/ssl_dos_tool_released/}},
note = {[Acessado em 10/02/2014]}
}
@misc{vincent,
title = {SSL computational DoS mitigation},
author = {Bernat V.},
howpublished ={\url{http://vincent.bernat.im/en/blog/2011-ssl-dos-mitigation.html}},
note = {[Acessado em 12/02/2013]}
}
@misc{nsa,
title = {O escândalo da espionagem dos EUA},
author = {O Globo},
howpublished ={\url{http://oglobo.globo.com/mundo/o-escandalo-da-espionagem-dos-eua-10191175}},
note = {[Acessado em 08/04/2014]}
}
@misc{nsa2,
title = {Perfect Forward Secrecy can block the NSA from secure web pages, but no one uses it},
author = {Horowitz M.},
howpublished ={\url{http://blogs.computerworld.com/encryption/22366/can-nsa-see-through-encrypted-web-pages-maybe-so}},
year={2013},
note = {[Acessado em 08/04/2014]}
}
@misc{pfs,
title = {American Tech Companies Wasting Their Time With Perfect Forward Secrecy},
author = {RecordsBackground.com},
howpublished ={\url{http://blog.recordsbackground.com/2013/11/23/american-tech-companies-wasting-their-time-with-perfect-forward-secrecy/}},
year={2013},
note = {[Acessado em 08/04/2014]}
}
@misc{qt,
title = {QT project},
author = {Digia plc\textregistered},
howpublished ={\url{http://qt-project.org/}},
note = {[Acessado em 22/04/2014]}
}
@misc{posix,
title = {POSIX Threads Programming},
author = {Blaise B.},
howpublished ={\url{https://computing.llnl.gov/tutorials/pthreads/}},
note = {[Acessado em 22/04/2014]}
}
@misc{libevent,
title = {Libevent – an event notification library},
author = {Mathewson N. and Provos N.},
howpublished ={\url{http://libevent.org/}},
note = {[Acessado em 22/04/2014]}
}
@misc{libevent2,
title = {Boost network performance with libevent and libev},
author = {Brown M.},
howpublished ={\url{http://www.ibm.com/developerworks/aix/library/au-libev/}},
year ={2010},
note = {[Acessado em 22/04/2014]}
}
@misc{wireshark,
title = {Wireshark\texttrademark \emph{web page}},
author = {Wireshark Foundation},
howpublished ={\url{http://www.wireshark.org/}},
note = {[Acessado em 30/04/2014]}
}
@misc{apache,
title = {Welcome to The Apache Software Foundation!},
author = {The Apache Software Foundation},
howpublished ={\url{http://www.apache.org/}},
note = {[Acessado em 30/04/2014]}
}
