1. Abdulaziz, A., Shahrulniza, M.: Cloud-based DDoS http attack detection using covariance matrix approach. J. Comput. Netw. Commun. 2017(38), 1–8 (2017)
2. Adi, E., Baig, Z., Hingston, P.: Stealthy denial of service (DoS) attack modelling and detection for http/2 services. J. Netw. Comput. Appl. 91, S1084804517301637 (2017)
3. Xiao, B., Chen, W., He, Y., Sha, E.M.: An active detecting method against SYN flooding attack. In: International Conference on Parallel & Distributed Systems (2005)
4. Cheng, R., Xu, R., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput. Mater. Continua 55(1), 095–095 (2018)
5. Douglas, D., Santanna, J.J., Schmidt, R.D.O., Granville, L.Z., Pras, A.: Booters: can anything justify distributed denial-of-service (DDoS) attacks for hire? J. Inf. Commun. Ethics Soc. 15(1), 90–104 (2017)