1. Alerts AS. Memcached UDP reflection attacks.
https://blogs.akamai.com/2018/02/memcached-udp-reflection-attacks.html
2. Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M, Kumar D, Lever C, Ma Z, Mason J, Menscher D, Seaman C, Sullivan N, Thomas K, Zhou Y (2017) Understanding the Mirai botnet. In: Proceedings of the USENIX Security Symposium (USENIX Security), pp 1093–1110
3. Aqil A, Khalil K, Atya AO, Papalexakis EE, Krishnamurthy SV, Jaeger T, Ramakrishnan KK, Yu P, Swami A (2017) Jaal: towards network intrusion detection at ISP scale
4. Bhowmik S, Tariq MA, Koldehofe B, Durr F, Kohler T, Rothermel K (2017) High performance publish/subscribe middleware in software-defined networks. IEEE/ACM Trans Netw 25(3):1501–1516
5. Bianchi G, Bonola M, Capone A, Cascone C (2014) Openstate: programming platform-independent stateful openflow applications inside the switch. SIGCOMM Comput Commun Rev 44:44–51