1. Abliz, M.: Internet Denial of Service Attacks and Defense Mechanisms. University of Pittsburgh Technical Report, No. TR-11-178, March 2011
2. Abliz, M, Znati, T.: Defeating DDoS using Productive Puzzles. In: Proccedings of International Conference on Information Systems Security and Privacy (ICISSP). Angers, France, pp. 114–123, Feb 9-11 2015
3. Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou, N., Abu-Nimeh, S., Lee, W., Dagon, D.: From throw-away traffic to bots: detecting the rise of DGA-based Malware. In: Security ’12 Proceedings of The 21st USENIX Conference on Security Symposium. Bellevue, WA, USA, pp. 24–39 Aug 8–10 2012
4. Auriemma, L.: Microsoft Remote Desktop Protocol CVE-2012-0002 Remote Code Execution Vulnerability. SecurityFocus. http://www.securityfocus.com/bid/52353 (2012). Accessed 15 Oct 2013
5. Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secur. Comput. 1(1), 11–33 (2004)