1. Anderson, T., Roscoe, T., Wetherall, D.: Preventing internet denial-of-service with capabilities. SIGCOMM Comput. Commun. Rev. 34(1), 39–44 (2004)
2. Angelini, M., Arcuri, M.C., Baldoni, R., Ciccotelli, C., Di Luna, G.A., Montanari, L., Panetta, I.C., Querzoni, L., Verde, N.V.: Italian cyber security report: Critical infrastructure and other sensitive sectors readiness. Technical report, Research Center of Cyber Intelligence and Information Security, University of Rome Sapienza (December 2013)
3. Argyraki, K., Cheriton, D.R.: Scalable network-layer defense against internet bandwidth-flooding attacks. IEEE/ACM Trans. Netw. 17(4), 1284–1297 (2009)
4. Carneiro, G., Fontes, H., Ricardo, M.: Fast prototyping of network protocols through ns-3 simulation model reuse. Simulation Modelling Practice and Theory 19(9), 2063–2075 (2011)
5. Chen, R., Park, J.-M., Marchany, R.: Track: A novel approach for defending against distributed denial-of-service attacks. Technical report, Technical Report TR-ECE-06-02, Dept. of Electrical and Computer Engineering, Virginia Tech. (2006)