1. Cisco. (2016). Annual Security Report 2016. http://www.cisco.com/c/dam/assets/offers/pdfs/cisco-asr-2016.pdf . Accessed Jan 2016.
2. Zhang, G., Fischer-Hübner, S., & Ehlert, S. (2010). Blocking attacks on SIP VoIP proxies caused by external processing. Telecommunication Systems, 45(1), 61–76.
3. Sun, C., Fan, J., & Liu, B. (2007). A robust scheme to detect SYN flooding attacks. In Second International Conference on Communications and Networking (pp. 397–401).
4. Li, L., & Lee, G. (2005). DDoS attack detection and wavelets. Telecommunication Systems, 28(3–4), 435–451.
5. Zlomislić, V., Fertalj, K., & Sruk, V. (2017). Denial of service attacks, defences and research challenges. Cluster Computing The Journal of Networks, Software Tools and Applications, 20(1), 1–11.