A system for stealthy authentication across closed ports, communication in which information arrives encoded in the form of connection attempts to closed ports.
V. Tondre, D. Thakare, D. Sherekar, and D. Dharaskar. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 1 (5):
01-12(December 2011)
{. Garfinkel, and {. Spafford. Computer security O'Reilly, Bonn u.a., 2. ed., expanded & updated, compl. rewritten and exp. to include Internet security edition, (1996)