1. Specht SM, Lee RB (2006) Distributed denial of service: taxonomies of attacks, tools, and countermeasures. In: ISCA PDCS, pp 543–550
2. Georgios K, Moschos T, Geneiatakis D, Gritzalis S (2007) A fair solution to dns amplification attacks. In: Digital forensics and incident analysis, 2007. WDFIA 2007. Second international workshop on, pp 38–47. IEEE, 2007
3. Grizzard JB, Sharma V, Nunnery C, Kang BBH, Dagon D (2007) Peer-to-Peer Botnets: overview and case study. HotBots 7:1
4. Kim M-S, Kong H-J, Hong S-C, Chung S-H, Hong JW (2004) A flow based method for abnormal network traffic detection. In: Network operations and management symposium, 2004. NOMS 2004. IEEE/IFIP, vol. 1, pp 599–612. IEEE, 2004
5. Bicakci K, Tavli B (2009) Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comput Stand Interfaces 31(5):931–941