Academic literature on the topic 'IP spoofing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IP spoofing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IP spoofing"

1

Thomsen, Dan. "IP spoofing and session hijacking." Network Security 1995, no. 3 (March 1995): 6–11. http://dx.doi.org/10.1016/s1353-4858(00)80045-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alqurashi, Reem K., Ohoud S. Al-harthi, and Sabah M. Alzahrani. "Detection of IP Spoofing Attack." International Journal of Engineering Research and Technology 13, no. 10 (October 31, 2020): 2736. http://dx.doi.org/10.37624/ijert/13.10.2020.2736-2741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fonseca, Osvaldo, Italo Cunha, Elverton Fazzion, Wagner Meira, Brivaldo Alves da Silva, Ronaldo A. Ferreira, and Ethan Katz-Bassett. "Identifying Networks Vulnerable to IP Spoofing." IEEE Transactions on Network and Service Management 18, no. 3 (September 2021): 3170–83. http://dx.doi.org/10.1109/tnsm.2021.3061486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Jin. "IP Spoofing Detection Technique for Endpoint Security Enhancement." Journal of Korean Institute of Information Technology 15, no. 8 (August 31, 2017): 75–83. http://dx.doi.org/10.14801/jkiit.2017.15.8.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Veeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (September 14, 2020): 1510. http://dx.doi.org/10.3390/electronics9091510.

Full text
Abstract:
The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprietary, expensive, and requires expertise. The Internet is subjected to several other forms of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since 2005, there is no holistic solution available to solve this problem from the gross-root. Also, every solution assumes that the attackers are always from outside networks. In this paper, we provide an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside hosts. We use a modified form of Network Address Translation (NAT) to build our solution framework. We call our framework as NAT++. The proposed infrastructure is robust, crypto-free, and easy to implement. Our simulation results have shown that the proposed NAT++ infrastructure does not consume more than the resources required by a simple NAT.
APA, Harvard, Vancouver, ISO, and other styles
6

Lin, Jin Cherng, Men Jue Koo, and Cheng Sheng Wang. "A Proposal for a Schema for ARP Spoofing Protection." Applied Mechanics and Materials 284-287 (January 2013): 3275–79. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3275.

Full text
Abstract:
IP scheme over Ethernet is one of the world's most widely used network structure. However, ARP Spoofing attacks still remain as one of serious security threats on the local area network. Despite the seriousness, there is no protective mechanism that can effectively protect against ARP Spoofing attacks available yet. This paper proposes an ARP query process mechanism that corresponds with the current IP/MAC mapping correlations based upon the existing ARP protocol and the "Direct Communication" characteristic of the LAN. It can effectively protect against ARP Spoofing attacks without change of network structures or an increase of investments in personnel and equipments.
APA, Harvard, Vancouver, ISO, and other styles
7

Kang, Jung-Ha, Yang Sun Lee, Jae Young Kim, and Eun-Gi Kim. "ARP Modification for Prevention of IP Spoofing." Journal of information and communication convergence engineering 12, no. 3 (September 30, 2014): 154–60. http://dx.doi.org/10.6109/jicce.2014.12.3.154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhenhai Duan, Xin Yuan, and J. Chandrashekar. "Controlling IP Spoofing through Interdomain Packet Filters." IEEE Transactions on Dependable and Secure Computing 5, no. 1 (January 2008): 22–36. http://dx.doi.org/10.1109/tdsc.2007.70224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ehrenkranz, Toby, and Jun Li. "On the state of IP spoofing defense." ACM Transactions on Internet Technology 9, no. 2 (May 2009): 1–29. http://dx.doi.org/10.1145/1516539.1516541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yao, Guang, Jun Bi, and Peiyao Xiao. "VASE: Filtering IP spoofing traffic with agility." Computer Networks 57, no. 1 (January 2013): 243–57. http://dx.doi.org/10.1016/j.comnet.2012.08.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "IP spoofing"

1

Ehrenkranz, Toby, and Toby Ehrenkranz. "Ensuring a Valid Source and Destination for Internet Traffic." Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12445.

Full text
Abstract:
The Internet has become an indispensable resource for today's society. It is at the center of the today's business, entertainment, and social world. However, the core of our identities on the Internet, the IP addresses that are used to send and receive data throughout the Internet, are insecure. Attackers today are able to send data purporting to be from nearly any location (IP spoofing) and to reroute data destined for victims to the attackers themselves (IP prefix hijacking). Victims of these attacks may experience denial of service, misplaced blame, and theft of their traffic. These attacks are of the utmost importance since they affect the core layer of the Internet. Although the mechanisms of the attacks are different, they are essentially different sides of the same coin; spoofing attacks forge the identity of the sender, while hijacking attacks forge the identity of the receiver. They revolve around the same underlying lack of a secure identity on the Internet. This research reviews the existing state of the art IP spoofing and IP prefix hijacking research and proposes new defenses to close the missing gaps and provide a new level of security to our identities on the Internet. This material is based upon work supported by the National Science Foundation under Grants No. CNS-0520326 and CNS-1118101. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. This dissertation includes both previously published/unpublished and co-authored material.
APA, Harvard, Vancouver, ISO, and other styles
2

Israr, Junaid. "Design of Lightweight Alternatives to Secure Border Gateway Protocol and Mitigate against Control and Data Plane Attacks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22812.

Full text
Abstract:
Border Gateway Protocol (BGP) is the backbone of routing infrastructure in the Internet. In its current form, it is an insecure protocol with potential for propagation of bogus routing information. There have been several high-profiles Internet outages linked to BGP in recent times. Several BGP security proposals have been presented in the literature; however, none has been adopted so far and, as a result, securing BGP remains an unsolved problem to this day. Among existing BGP security proposals, Secure BGP (S-BGP) is considered most comprehensive. However, it presents significant challenges in terms of number of signature verifications and deployment considerations. For it to provide comprehensive security guarantees, it requires that all Autonomous Systems (ASes) in the Internet to adopt the scheme and participate in signature additions and verifications in BGP messages. Among others, these challenges have prevented S-BGP from being deployed today. In this thesis, we present two novel lightweight security protocols, called Credible BGP (C-BGP) and Hybrid Cryptosystem BGP (HC-BGP), which rely on security mechanisms in S-BGP but are designed to address signature verification overhead and deployment challenges associated with S-BGP. We develop original and detailed analytical and simulation models to study performance of our proposals and demonstrate that the proposed schemes promise significant savings in terms of computational overhead and security performance in presence of malicious ASes in the network. We also study the impact of IP prefix hijacking on control plane as well as data plane. Specifically, we analyze the impact of bogus routing information on Inter-Domain Packet Filters and propose novel and simple extensions to existing BGP route selection algorithm to combat bogus routing information.
APA, Harvard, Vancouver, ISO, and other styles
3

Dušek, Jakub. "Penetrační testování ANC." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444606.

Full text
Abstract:
This diploma thesis deals with the evaluation of a security solution that was recently deployed by a British company renting office space. This validation system is based on a database of MAC addresses, a database of clients and active filtering of connected devices. The first part explains the concepts of computer network, VLAN and basic concepts needed to understand the function of dynamic assignment of VLAN and IP addresses. The second part is devoted to measurements based on hypotheses, according to which measures are proposed in the last part to solve these security problems.
APA, Harvard, Vancouver, ISO, and other styles
4

NEIMAN, ADAM M. "HASH STAMP MARKING SCHEME FOR PACKET TRACEBACK." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1130852252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Marček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.

Full text
Abstract:
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Hung-I., and 吳宏毅. "IP Spoofing Detector." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/43352837637508402538.

Full text
Abstract:
碩士
國立中央大學
資訊工程研究所
95
In this project, we plan to develop a novice IP spoofing detection solution named IP Spoofing Detector (ISD) to solve this notorious security threat to computers and networks. ISD can accurately recognize whether an IP packet belongs to a TCP connection indicated in the TCP/IP header of that packet and drop all spoofed IP packets. As a result, attackers can no longer launch attacks through spoofed IP packets from the network protected by ISD. ISD will be an edge router-based solution to IP spoofing; hence, to install it there is no requirement to modify any software and hardware in any host of the protected network and there is no need to use any encryption and decryption method to authentication packets. After being installed, ISD can efficiently and effectively detect and block spoofed IP packets no matter how the layout of the protected network is changed and no matter whether mobile IPs are supported by the protected network. Since the IP spoofing problem was reported to the public by S. Bellovin of Bell Lab. in 1989, it have been used by many attackers to either conceal the attack sources (such as DoS/DDoS attacks, port scanning decoy, and IdlesScan) or forge packets as coming from hosts trusted by attacked hosts to get access to the attacked hosts (such as Man-in-the-Middle Attacks and trusted host attack). The former thwarts victims’ capability to make appropriate response to attack traffic. The later disables attacked hosts’ authentication mechanism. Both result in great damage on attacked hosts. According to FBI, in 2003, DoS/DDoS attacks alone caused about sixty-six million dollar lost in the USA. The trend of this kind of attacks continues increasing. According to TCP/IP protocol, the response of a socket to a packet changes when it is in a different state and the state of a socket changes after sending an IP packet. Based on the above principle, we can accurately confirm whether an IP packet was really sent by a specific socket. Besides, unless a 3-way handshaking is finished, a TCP connection can not be built; hence, for all packets claimed to belong to a TCP connection, ISD only needs to confirm the validity of the TCP SYN packet. The above rule can dramatically decrease the number of IP packets whose validity is needed to be verified. Based on the above analysis, we plan to develop and implement ISD on a Linux platform. The precision of the recognition of IDS could be to the socket level. Until now none of the IP spoofing detection solution could achieve such a fine precision level.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Shin-Cheng, and 王信正. "A new mechanism of IP spoofing packet filtering for the 3G network." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/02065797715130115466.

Full text
Abstract:
碩士
國立中興大學
資訊科學與工程學系所
100
The launch of HSDPA and HSPA services in 3G network provides users more bandwidth for uplink and downlink.This allows more network applications to be achieved.The convenience of powerful smart phones makes mobile internet access more and more popular. However, for most mobile terminals,it is not easy and effective to foil virus or hack attacks.As a result,many mobile terminals will most likely to become Corpse computers. IP spoofing has often been exploited to conceal the attack sources since one cannot clearly identify the true source of the attacker.So it is difficult to prevent attacks.In this thesis, we use the GTP (GPRS Tunnelling Protocol) protocol characteristics to design a packet filtering mechanism. It can effectively prevent the 3G mobile devices from any of network attack based on IP spoofing method. Furthermore it can identify the source of attacker correctly.
APA, Harvard, Vancouver, ISO, and other styles
8

Chuang, Yu-Chun, and 莊佑駿. "Design the upnp player which can play rmvb in Linux by using ip spoofing concept." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/63368891590731595069.

Full text
Abstract:
碩士
國立臺灣大學
資訊工程學研究所
96
Because the contribution of UPnP and DLNA, we can build a digit home. We can access the server which is set in home by using any device supported UPnP without installing any driver. Any multimedia put on the UPnP server can be used easier by any UPnP client. Both Linux and Windows have UPnP server software, so it is very easy to set up a UPnP environment. Both operating system have UPnP client, but all the player can not play rmvb movies. For example, mpeg movies can be played through UPnP by using streaming. But no player can play rmvb movies by using UPnP. We want to design a program to play rmvb movies through UPnP. We hope the server supported multimedia can hide the server IP when send the packets to client. This uses the IP spoofing concept to change the server IP when send the streaming packets. The client thinks the packets are come from the IP we change. We can avoid the server attacking by hacker.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "IP spoofing"

1

Lagishetty, Shashank, Pruthvi Sabbu, and Kannan Srinathan. "DMIPS - Defensive Mechanism against IP Spoofing." In Information Security and Privacy, 276–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22497-3_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Vaishali, and S. K. Pandey. "Revisiting Cloud Security Threats: IP Spoofing." In Advances in Intelligent Systems and Computing, 225–36. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0751-9_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moriyama, Eimatsu, Takeshi Takahashi, and Daisuke Miyamoto. "DNS-Based Defense against IP Spoofing Attacks." In Neural Information Processing, 599–609. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34500-5_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kováčik, Michal, Michal Kajan, and Martin Žádník. "Detecting IP Spoofing by Modelling History of IP Address Entry Points." In Lecture Notes in Computer Science, 73–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38998-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ravi, Mangalam, S. Narasimman, G. K. Arun Kumar, and D. Karthikeyan. "A Cryptographic Approach to Defend against IP Spoofing." In Communications in Computer and Information Science, 290–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Meng, Yuxin, and Lam-for Kwok. "Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection." In Network and System Security, 1–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Mihui, and Kijoon Chae. "A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment." In Information Networking. Convergence in Broadband and Mobile Networking, 843–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30582-8_88.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ramos, Manoel F., Bruno L. Dalmazo, and Jeferson C. Nobre. "A Proposal for IP Spoofing Mitigation at Origin in Homenet Using Software-Defined Networking." In Computational Science and Its Applications – ICCSA 2019, 179–92. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24289-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

L., Kavisankar, Chellappan C., and Poovammal E. "Against Spoofing Attacks in Network Layer." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 41–56. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch003.

Full text
Abstract:
In the context of network security, a spoofing attack is a condition in which one person or a program successfully masquerades as another. This is done by providing counterfeit data with the malicious intention of gaining an illegitimate advantage. Spoofing attack which may be generated in various layer of Open Systems Interconnection model (OSI model) is discussed in this chapter. The chapter ends with discussing about the possible spoofing attacks in network layer and the relevant defense mechanism of the same. The detailed analysis and discussion is made on the spoofing attack over the Network layer because, Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks more devastating while using network protocol like Internet Protocol (IP) which have become more of a threat than ever for the past few years.
APA, Harvard, Vancouver, ISO, and other styles
10

Verma, Karan. "IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network." In Advances in Wireless Technologies and Telecommunication, 398–420. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0773-4.ch012.

Full text
Abstract:
Vehicular Ad-Hoc Network (VANET) is a subset of Mobile Ad-Hoc Network (MANET) and it is considered as a substantial component of Intelligent Transportation System (ITS). DoS attacks on VANET are varying and may be overwhelmed by VANET protocols, such as TCP or UDP flooding attacks. Different secure communications models can be used to detect and prevent IP spoofing DoS attacks, by which the attacks are committed by fraudulent and malicious nodes. In this chapter, an efficient detection method has been proposed to detect UDP flooding attacks, called Bloom-Filter-Based IP-CHOCK (BFICK). A prevention method using IP-CHOCK has also been proposed to prevent DoS, called Reference Broadcast Synchronization (RBS). In principle, the combined method is based on the IP-CHOCK filter concept of packets during an attack incident and with busy traffic condition. Fake identities from malicious vehicles can be analyzed with help of the existing reliable IP addresses. Beacon packets were exchanged periodically by all the vehicles to announce their presence and to forward it to the next node.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IP spoofing"

1

Sahri, Nm, and Koji Okamura. "Protecting DNS services from IP spoofing." In CFI '16: The 11th International Conference on Future Internet Technologies. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2935663.2935666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mukaddam, Ayman, Imad Elhajj, Ayman Kayssi, and Ali Chehab. "IP Spoofing Detection Using Modified Hop Count." In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2014. http://dx.doi.org/10.1109/aina.2014.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

John, Emil Kuriakose. "Efficient Defense System for IP Spoofing in Networks." In The Fourth International Workshop on Computer Networks & Communications. Academy & Industry Research Collaboration Center (AIRCC), 2012. http://dx.doi.org/10.5121/csit.2012.2416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gonzalez, J. M., M. Anwar, and J. B. D. Joshi. "A trust-based approach against IP-spoofing attacks." In 2011 Ninth Annual International Conference on Privacy, Security and Trust. IEEE, 2011. http://dx.doi.org/10.1109/pst.2011.5971965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Farhat, Hikmat. "A scalable method to protect from IP spoofing." In 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). IEEE, 2008. http://dx.doi.org/10.1109/icadiwt.2008.4664411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ma, Yunji. "An Effective Method for Defense against IP Spoofing Attack." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mopari, Indrajeet B., S. G. Pukale, and M. L. Dhore. "Detection of DDoS attack and defense against IP spoofing." In the International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1523103.1523200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mavani, Monali, and Krishna Asawa. "Experimental study of IP spoofing attack in 6LoWPAN network." In 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence (Confluence). IEEE, 2017. http://dx.doi.org/10.1109/confluence.2017.7943192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Santhosh, K. R., and C. Fancy. "A dedicated setup to identify spoofing via IP-traceback." In 2017 International Conference on Intelligent Sustainable Systems (ICISS). IEEE, 2017. http://dx.doi.org/10.1109/iss1.2017.8389316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mopari, I. B., S. G. Pukale, and M. L. Dhore. "Detection and defense against DDoS attack with IP spoofing." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787693.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IP spoofing"

1

Ferguson, P., and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC Editor, May 2000. http://dx.doi.org/10.17487/rfc2827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ferguson, P., and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography