1. Jaideep, Gera, & Bhanu Prakash Battula., (2016). Survey on the present state-of-the-art of P2P networks, their security issues and counter measures. International Journal of Applied Engineering Research, 11(1), 616–620.
2. Zargar, Saman Taghavi, Joshi, James, & Tipper, David. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE COMMUNICATIONS SURVEYS & TUTORIALS, p, 1–24.
3. Bhuyan, Monowar H., Kashyap, H. J., Bhattacharyya, D. K., & Kalita, J. K. (2012). Detecting distributed denial of service attacks: Methods, tools and future directions. The Computer Journal, p, 1–20.
4. Chung, Yoo. (2011). Distributed denial of service is a scalability problem. Cognitive Science, p, 1–6.
5. Purohit, R., & Bhargava, D. (2017). An illustration to secured way of data mining using privacy preserving data mining. Journal of Statistics and Management Systems, 20(4), 637–645.