-
Archived from the
original on 30
April 2011.
Retrieved 31
March 2009.
Hjelmvik, Erik; John,
Wolfgang (27 July 2010). "Breaking and
Improving Protocol...
- Software.
Archived from the
original on 2021-04-14.
Retrieved 2015-02-10.
Hjelmvik, Erik (2012-07-17). "WPAD Man in the Middle".
Retrieved 2015-02-10. "Konqueror:...
- to stop it | NordVPN". nordvpn.com. 2022-07-01.
Retrieved 2024-08-21.
Hjelmvik, Erik; John,
Wolfgang (2010-07-27). "Breaking and
Improving Protocol Obfuscation"...
- linux112.com.
Archived from the
original on 2012-04-07.
Retrieved 2011-12-28.
hjelmvik (23
April 2013). "SPID
Statistical Protocol IDentification". SourceForge...
- and
Computer Crime,
Second Edition. Elsevier. ISBN 0-12-163104-4. Erik
Hjelmvik, P****ive
Network Security Analysis with
NetworkMiner http://www.forensicfocus...
-
Death attack • The Register". The Register.
Retrieved 3 July 2017. Erik
Hjelmvik (2016-11-10). "BlackNurse
Denial of
Service Attack -
NETRESEC Blog". Netresec...
- IETF.org.
Archived from the
original on 2017-01-18.
Retrieved 2007-08-26.
Hjelmvik, Erik; John,
Wolfgang (2010-07-27). "Breaking and
Improving Protocol Obfuscation"...
- doi:10.1016/j.comnet.2014.11.001. hdl:2117/28329.
Retrieved 2014-11-10.
Hjelmvik, Erik; John,
Wolfgang (2009). "Statistical
protocol identification with...
-
Archived from the
original on
August 19, 2016.
Retrieved June 27, 2015.
Hjelmvik, Erik (February 2, 2013). "Forensics of
Chinese MITM on GitHub". NETRESEC...
-
Ethernet – Is it the ****ure?". ComputerW****ly.com.
Retrieved 2020-12-04. Erik
Hjelmvik (2008). "P****ive
Network Security Analysis with NetworkMiner". Forensic...