Select the link after the article or web resource information to access.
Ptacek, T. H., Newsham, T. N., & SECURE NETWORKS INC CALGARY ALBERTA. (1998). Insertion, evasion, and denial of service: Eluding network intrusion detection
https://apps.dtic.mil/docs/citations/ADA391565
Saltzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278-1308. doi:10.1109/PROC.1975.9939
Read pp.1279-1283
http://portal.lib.fit.edu/login?url=https://ieeexplore.ieee.org/document/1451869
Stolfo, S., Bellovin, S. M., & Evans, D. (2011). Measuring security. IEEE Security & Privacy, 9(3), 60-65. doi:10.1109/MSP.2011.56
http://portal.lib.fit.edu/login?url=https://ieeexplore.ieee.org/document/5772963