Forrásdokumentum 4 (preferált)
WM MKII Rules Errata July 2014
Warmachine MKII Rules Errata Aug 2015
The Directional Attack on Wireless Localization - or - How to Spoof Your Location with a Tin Can Kevin Bauer, Damon McCoy, Eric Anderson, Markus Breitenbach,
Hidden Markov Model Cryptanalysis Chris Karlof and David Wagner.
High Performance Embedded Computing © 2007 Elsevier Chapter 1, part 4: Embedded Computing High Performance Embedded Computing Wayne Wolf.
Hidden Markov Model Cryptanalysis
OOO 133 Readme
High Performance Embedded Computing © 2007 Elsevier Lecture 5: Embedded Systems Issues Embedded Computing Systems Mikko Lipasti, adapted from M. Schulte.