1. Chen, D., Chang, G., Sun, D., Jia, J., Wang, X.: Lightweight key management scheme to enhance the security of internet of things. Int. J. Wirel. Mob. Comput. 5(2), 191–198 (2012)
2. Gu, Q., Liu, P.: Denial of service attacks, Department of Computer Science Texas State UniversitySan Marcos School of Information Sciences and Technology Pennsylvania State University Denial of Service Attacks Outline, pp. 1–28 (2007)
3. Kumar, S., Singh, M., Sachdeva, M., Kumar, K.: Flooding based DDoS attacks and their influence on web services. (IJCSIT) Int. J. Comput. Sci. Inf. Technol. 2(3), 1131–1136 (2011)
4. Cambiaso, E., Papaleo, G., Chiola, G., Aiello, M.: Slow DoS attacks: definition and categorisation. Int. J. Trust Manag. Comput. Commun.—In press article (2013)
5. Aiello, M., Cambiaso, E., Scaglione, S., Papaleo, G.: A similarity based approach for application DoS attacks detection. In: The Eighteenth IEEE Symposium on Computers and Communications (2013)