1. Seemma, P.S., Nandhini, S., Sowmiya, M.: Overview of cyber security. IJARCCE Int. J. Adv. Res. Comput. Commun. Eng. 7(11), 125–128 (2018). https://doi.org/10.17148/IJARCCE.2018.71127
2. Tripathi, N., Mehtre, B.: DoS and DDoS attacks: impact, analysis and countermeasures. In: Conference: Advances in Computing, Networking and Security, 2013 TEQIP II National Conference on 1–6 (2013). https://www.researchgate.net/publication/259941506_DoS_and_DDoS_Attacks_Impact_Analysis_and_Countermeasures
3. Banday, M.T., Qadri, J.A., Shah, N.A.: Study of botnets and their threats to internet security. In: Sprouts: Working Papers on Information Systems, vol. 9, no. 24 (2009). https://www.researchgate.net/publication/227859109_Study_of_Botnets_and_their_threats_to_Internet_Security
4. Singer, P.W., Friedman, A.: Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press, New York (2014). https://book.itep.ru/depository/cyberwar/P.W.Singer_Allan_Friedman_Cybersecurity_and_Cyberwar_What_Everyone_Needs_to_Know_2014_Oxford_University_Press.pdf
5. Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014). https://www.sciencedirect.com/science/article/pii/S0022000014000178#br0120