1. Ritchey RW, Ammann P (2000) Using model checking to analyze network vulnerabilities. In: Proceedings 2000 IEEE symposium on security and privacy, S&P 2000, pp 156–165
2. Carl G, Kesidis G, Brooks RR, Rai S (2006) Denial-of-service attack-detection techniques. IEEE Internet Comput 10:82–89
3. Srivastava A, Gupta B, Tyagi A, Sharma A, Mishra A (2011) A recent survey on DDoS attacks and defense mechanisms. In: Advances in parallel distributed computing. Springer, pp 570–580
4. Ferguson P (2000) Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing
5. Raza M, Iqbal M, Sharif M, Haider W (2012) A survey of password attacks and comparative analysis on methods for secure authentication. World Appl Sci J 19:439–444