1. Goodrich, M., & Tamassia, R. (2010). Introduction to computer security. Boston: Addison-Wesley Publishing Company.
2. Ioannidis, J., & Bellovin, S. M. (2002). Implementing pushback: Router-based defense against DDoS attacks. In Proceedings of Network and Distributed System Security Symposium. Retrieved April 7, 2017 from
http://www.internetsociety.org/doc/implementing-pushback-router-based-defense-against-ddos-attacks
3. Elsevier. SCOPUS Database,
www.scopus.com
4. Mell, P., Marks, D., & McLarnon, M. (2000). A denial-of-service resistant intrusion detection architecture. Computer Networks, 34, 641–658.
5. Mamun, M. S. I., & Kabir, A. S. (2010). Hierarchical design based intrusion detection system for wireless ad hoc sensor network. International Journal of Network Security & Its Applications (IJNSA), 2, 102–117.