1. Zhang L, Estrin D, Burke J, Jacobson V, Thornton J, Smetters DK, Zhang B, Tsudik G, Claffy K, Krioukov D, Massey D, Papadopoulos C, Abdelzaher T, Wang L, Crowley P, Yeh E (2010) Named data networking (NDN) project. Xerox Palo Alto Research Center - PARC, Tech. Rep. NDN-0001
2. Xylomenos G, Ververidis CN, Siris VA, Fotiou N, Tsilopoulos C, Vasilakos X, Katsaros KV, Polyzos GC (2013) A survey of information-centric networking research. IEEE Commun Surv Tutor 16(2):1024–1049
3. Mai HL, Nguyen NT, Doyen G, Ploix A, Cogranne R (2016) On the readiness of NDN for a secure deployment: the case of pending interest table. In: IFIP International conference on autonomous infrastructure, management and security, pp 98–110
4. Salah H, Strufe T (2016) Evaluating and mitigating a collusive version of the interest flooding attack in NDN. In: IEEE Symposium on computers and communications (ISCC), pp 938–945
5. Afanasyev A, Mahadevan P, Moiseenko I, Uzun E, Zhang L (2013) Interest flooding attack and countermeasures in named data networking. In: IFIP Networking conference pp 1–9